AI-Generated Malware in Panda Image Hides Persistent Linux Threat
Sign in
Contact
Support
We're hiring!
Aqua Security
Platform
Solutions
Resources
Company
Platform
Aqua Platform
Unified Cloud Security
Gain full visibility, reduce cloud and AI security risks, and stop attacks with Aqua’s fully integrated CNAPP.
Platform overview
All platform Integrations
Aqua CNAPP in action
Aqua Open Source
Driving security innovation in the cloud native community
Trivy
Tracee
Code Security
Scanning & Assurance
Scan artifacts across the entire software development lifecycle
Software Supply Chain Security
Protect your code, tools, and processes
Vulnerability Management
Advanced Code-to-Cloud vulnerability management to reduce noise and fix fast
Runtime Security
Container Security
Full lifecycle advanced protection for containerized applications
Cloud Workload Protection (CWPP)
Runtime protection for every cloud native workload
Hybrid-Cloud & Multi-Cloud Security
Code to Cloud security for hybrid and multi-cloud deployments
Posture Management
CI/CD Pipeline Security
Automate DevSecOps
Kubernetes Security
Holistic Kubernetes Security for the Enterprise
Cloud Security Posture Management
Extend traditional CSPM with workload visibility
What's New?
Operationalizing AI Security: Protecting Workloads Where AI Runs
Patch, Ditch, Dodge, or Deal? Your Call on Vulnerabilities
Securing LLM Apps with Aqua: Beyond the OWASP Checklist
What’s Really Happening in Your Containers? Aqua’s Risk Assessment Has the Answer
Solutions
Use Cases
Automate DevSecOps
Security and speed without compromise
GenAI Application Security
Secure GenAI Applications from Code to Runtime
Detection and Response
Cloud native detection & Response (CNDR)
Hybrid-Cloud & Multi-Cloud
Security for hybrid and multi-cloud deployments
Prove Compliance
Controls for PCI, HIPAA, GDPR, and beyond
Solutions
Docker Security
Enterprise-Grade security for Docker environments
AWS Cloud Security
Protect cloud native workloads on AWS
Google Cloud Security
Secure K8s apps on Google Cloud Platform
OpenShift Security
Cloud Native Security for Red Hat OpenShift
VMware Tanzu Security
Native security across VMware Tanzu
Azure Cloud Security
Complete Security for Azure Container Workloads
Industry
Federal
CNAPP solution for Federal Government
Financial Services
One platform for financial services
eBook
Hybrid Cloud, Multi-Cloud, Every Cloud, Secured.
Resources
The best of cloud native
Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Read the Blog
SEC vs. SolarWinds: A Cybersecurity Game Changer for CISOs
Accenture and Aqua Partner to Empower Cloud Security
Resources
Resources Center
eBooks, Data sheets, Whitepapers, Webinars, and much more
The Cloud Native Channel
Cloud native security webinars & videos
Aquademy
The Aqua academy
Cloud Native Wiki
The educational center for everything cloud native
Docker Containers
Software supply chain security
Cloud security
Kubernetes
Application Security
DevSecOps
Aqua research team
Security research focused on the cloud native stack to identify new threats and attack vectors
More security research
2023 Annual Aqua Nautilus Research
A Comprehensive Cloud Native Threat Report
Company
Recognized Leadership
CISO Choice Awards
Winner for Cloud Workload Protection Platform (CWPP)
Forrester Consulting: The Total Economic Impact™ of Aqua CNAPP
90% Reduction in vulnerability research and detection time
Frost & Sullivan CNAPP report
Top innovation leader
About Us
Newsroom
Customers
Partners
Careers
Support
Services
Upcoming Events
Connect
Contact
Twitter
Facebook
Linkedin
Instagram
News
Trivy Partner Connect Welcomes Root, Strengthens Open Source Security Ecosystem
Aqua Security and Akamai Forge Strategic Partnership to Secure AI in the Enterprise
Aqua Security Launches Secure AI Advisory Program
Search
Get Started
Announcing General Availability of CloudSploit by Aqua for GCP
Aqua Cloud Native Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance.
CLOUD SECURITY
Announcing General Availability of CloudSploit by Aqua for GCP
Aqua Security announced the general availability of CloudSploit by Aqua for Google Cloud Platform (GCP). This release comes after an extended beta program, during which we worked closely with our customers to develop and deliver a robust set of out-of-the-box policies for GCP. This release also includes a Center for Internet Security (CIS) benchmark certification …
CONTAINER SECURITY
A Brief History of Containers: From the 1970s Till Now
When we first published this blog post in 2017, the technology landscape for containers was quite different than it is today. Over the past few years, we have seen significant changes take place that have affected, and continue to affect how Containers are adopted. Read on to understand the changes and developments we saw and …
Aqua Trivy
A Deep Dive into eBPF: The Technology that Powers Tracee
Tracee, by Aqua Security, is an open source, lightweight, and easy to use container and system tracing utility. Tracee allows you to trace events that were generated within containers only, without needing to filter out other system processes.
VULNERABILITY MANAGEMENT
Pluggable Image Vulnerability Scanners for Harbor
Harbor is an open source cloud native artifact registry, sponsored by the CNCF, that you can use as a repository for your container images. Harbor provides support for vulnerability scanning of images to make sure they are safe to deploy. We’ve been working with the Harbor team to extend its capabilities with support for pluggable …
VULNERABILITY MANAGEMENT
Cloud Native Security Best Practices: Vulnerability Management
After four years of securing cloud native applications, our team at Aqua has learned a thing or two about applying best practices in the real world. We’ve seen many organizations succeed in establishing a sound process and tooling to achieve their security goals, and we’ve also seen those who struggle to prioritize and manage their …
CLOUD SECURITY
Aqua Integrates with AWS Security Hub: Closing the Gap on Cloud Native Security
The AWS Security Hub SecOps tool provides a comprehensive view of security and compliance alerts across various AWS accounts. Security findings are collected and summarized on integrated dashboards, allowing security professionals to continuously monitor their environment using automated compliance checks. The Aqua Cloud Native Security Platform collects security insights that are unique to the development, …
Aqua Trivy
DevSecOps with Trivy and GitHub Actions
The premise of DevSecOps is that in the Software Development Life Cycle (SDLC), each member is responsible for security. This unifies the operations and development teams in terms of security operations. DevSecOps’ goal is to add security to each step of the development process by integrating security controls and processes as early as possible in …
KUBERNETES SECURITY
Impressions from KubeSec, Our Third Enterprise Summit for K8s Security
Yesterday more than 300 cloud native professionals assembled for KubeSec, what has now become a fixture as a “day zero” event for KubeCon/CloudNativeCon. As with previous events, the emphasis was on end-user organizations’ experiences in securing production environments. While many technical aspects and best practices were covered, this year a recurring theme was tackling the …
CLOUD SECURITY
Expanding into CSPM with CloudSploit and Deepening Security for Cloud VMs
IT spend on public cloud will more than double by 2023 (IDC) and hybrid multi-clouds will soon be the more common environment for enterprises. The benefits of using cloud infrastructure including the ability to scale, ease of use and speed of application delivery are too attractive to ignore, however, the complexity of managing and administering …
Aqua Trivy
Tracee: Tracing Containers with eBPF
This week at Velocity Berlin, I’ll be giving a talk called A Beginner’s Guide to eBPF. To coincide with it, we’re opening up a new Aqua Security open source project called Tracee, which uses eBPF to trace events in containers. This isn’t something that most developers need to do on a day-to-day basis, but for those …
SECURITY RESEARCH
Maneuver Docker API for Host Takeover
Threat Alert
Docker clients can communicate with the daemon either locally, via a unix socket, or over a network via a TCP socket. Aqua’s research team discovered an interesting attack vector running on top of an unsecured Docker socket API. Instead of running a malicious Docker image, the attacker changes the traditional entry-point to take control over …
CONTAINER SECURITY
Optimized Logging for Container Workloads Using AWS FireLens
Managing a growing number of systems and applications can be complicated and time consuming, making it particularly important to find a way to centralize and optimize your data. As a result, AWS has recently released FireLens which, working with Fluentd and Fluent Bit, allows you to route your logs to a large number of AWS …
Page 30 of 38
‹ Prev
26
27
28
29
30
31
32
33
34
Next ›
Aqua Security