<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CONTAINER SECURITY - Aqua</title>
	<atom:link href="https://www.aquasec.com/category/container-security/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Cloud Native Security, Container Security &#38; Serverless Security</description>
	<lastBuildDate>Sun, 09 Nov 2025 15:59:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>A Brief History of Containers: From the 1970s Till Now</title>
		<link>https://www.aquasec.com/blog/a-brief-history-of-containers-from-1970s-chroot-to-docker-2016/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Wed, 10 Sep 2025 17:00:00 +0000</pubDate>
				<category><![CDATA[CONTAINER SECURITY]]></category>
		<category><![CDATA[Container Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=15671</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/a-brief-history-of-containers-from-1970s-chroot-to-docker-2016/" title="A Brief History of Containers: From the 1970s Till Now" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2020/01/Brief-Container-History-Blog-Image.jpg" alt="A Brief History of Containers: From the 1970s Till Now" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>When we first published this blog post in 2017, the technology landscape for containers was quite different than it is today. Over the past few years, we have seen significant changes take place that have affected, and continue to affect how Containers are adopted. Read on to understand the changes and developments we saw and&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Aqua Helps Close the DevSec Gap with Shift Left Security</title>
		<link>https://www.aquasec.com/blog/aqua-helps-close-the-devsec-gap-with-shift-left-security/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Wed, 25 Jun 2025 12:00:48 +0000</pubDate>
				<category><![CDATA[CONTAINER SECURITY]]></category>
		<category><![CDATA[CNAPP]]></category>
		<category><![CDATA[Container Security]]></category>
		<category><![CDATA[shift Left security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=25774</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/aqua-helps-close-the-devsec-gap-with-shift-left-security/" title="Aqua Helps Close the DevSec Gap with Shift Left Security" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/06/Social-Aqua-Helps-Close-DevSec-Gap-1.jpg" alt="Aqua Helps Close the DevSec Gap with Shift Left Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Shifting security left has many benefits. Developers today have more ownership and responsibility for secure coding practices than ever before. However, this does not mean that the entire security burden falls on developers. Cloud native environments evolve rapidly. Teams rely on open source packages, build and deploy containers on demand, and push changes through CI/CD&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>What’s Really Happening in Your Containers? Aqua’s Risk Assessment Has the Answer</title>
		<link>https://www.aquasec.com/blog/container-security-risk-assessment/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Wed, 23 Apr 2025 12:00:10 +0000</pubDate>
				<category><![CDATA[CONTAINER SECURITY]]></category>
		<category><![CDATA[Container Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=25309</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/container-security-risk-assessment/" title="What’s Really Happening in Your Containers? Aqua’s Risk Assessment Has the Answer" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/04/Social-CSRA-blog-image.jpg" alt="What’s Really Happening in Your Containers? Aqua’s Risk Assessment Has the Answer" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Containers may be mainstream, but securing them in production remains a moving target. As AI adoption scales and environments grow more complex, so too do the risks, especially at runtime, where traditional tools struggle to provide meaningful visibility. These are not legacy exploits like port scans or brute force attempts. Attackers are targeting what happens&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>GigaOm Radar: Aqua Leads in Container Security</title>
		<link>https://www.aquasec.com/blog/gigaom-radar-aqua-leads-container-security/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 18 Feb 2025 13:00:57 +0000</pubDate>
				<category><![CDATA[CONTAINER SECURITY]]></category>
		<category><![CDATA[Container Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=24471</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/gigaom-radar-aqua-leads-container-security/" title="GigaOm Radar: Aqua Leads in Container Security" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/02/social-gigaom-container-security-2025-blog-1200x628-1.jpg" alt="GigaOm Radar: Aqua Leads in Container Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Securing containerized applications demands a multi-layered strategy that spans the entire lifecycle from development to production, a challenge Aqua has spent nearly a decade mastering. Aqua’s Container Security solution provides full lifecycle protection by identifying vulnerabilities early in the build phase, integrating acceptance gates in the CI/CD pipeline to minimize risks, and offering real-time runtime&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Securing Container Workloads on Azure Container Apps (ACA)</title>
		<link>https://www.aquasec.com/blog/securing-azure-container-apps-aca/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Thu, 06 Feb 2025 13:02:44 +0000</pubDate>
				<category><![CDATA[CONTAINER SECURITY]]></category>
		<category><![CDATA[Azure security]]></category>
		<category><![CDATA[Container Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=24463</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/securing-azure-container-apps-aca/" title="Securing Container Workloads on Azure Container Apps (ACA)" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/02/aca-blog-social-text-1200x628-1.jpg" alt="Securing Container Workloads on Azure Container Apps (ACA)" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Azure Container Apps (ACA) is a serverless platform for scalable containerized applications, while abstracting the underlying infrastructure. Since it runs without providing access to its underlying operating system, it has inherent security benefits, but it also presents a challenge for security and compliance tools that were not purpose-built to support such an environment. Aqua is&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Cloud Security Trends: Predictions and Strategies for Resilience</title>
		<link>https://www.aquasec.com/blog/cloud-security-trends-predictions-and-strategies-for-resilience/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Wed, 18 Dec 2024 05:28:51 +0000</pubDate>
				<category><![CDATA[CONTAINER SECURITY]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=23893</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/cloud-security-trends-predictions-and-strategies-for-resilience/" title="Cloud Security Trends: Predictions and Strategies for Resilience" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2024/12/blog-main-Cloud-Security-trends-1200x628-2024-final.jpg" alt="Cloud Security Trends: Predictions and Strategies for Resilience" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>In 2025, cloud native security is set to undergo transformative progress. As Chief Information Security Officer at Aqua, I’ve seen how rapidly evolving threats and operational demands are driving organizations to redefine their approach to security. The focus is no longer just on adapting to challenges—it’s about deeply embedding security into every facet of development&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Embracing the Future: AWS Customers Leverage Fargate for ECS and EKS Deployments</title>
		<link>https://www.aquasec.com/blog/embracing-the-future-aws-customers-leverage-fargate-for-ecs-and-eks-deployments/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Wed, 11 Sep 2024 06:27:53 +0000</pubDate>
				<category><![CDATA[CONTAINER SECURITY]]></category>
		<category><![CDATA[AWS Security]]></category>
		<category><![CDATA[ECS]]></category>
		<category><![CDATA[EKS]]></category>
		<category><![CDATA[Fargate]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=22452</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/embracing-the-future-aws-customers-leverage-fargate-for-ecs-and-eks-deployments/" title="Embracing the Future: AWS Customers Leverage Fargate for ECS and EKS Deployments" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2024/09/blog-main-AWS-Fargate-1200x628-2024-final-copy.jpg" alt="Embracing the Future: AWS Customers Leverage Fargate for ECS and EKS Deployments" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>As organizations advance in their cloud native journey, the adoption of AWS Fargate for ECS (Elastic Container Service) and EKS (Elastic Kubernetes Service) increases. Many customers begin their cloud journey with Amazon ECS, with around 65% of new AWS container customers opting for ECS. This popularity is driven by Fargate’s serverless compute engine, which allows&#160;&mldr;]]></description>
		
		
		<enclosure url="https://1665891.fs1.hubspotusercontent-na1.net/hubfs/1665891/Fargate%20Video_Final-CTA_Guide.mp4" length="41305603" type="video/mp4" />

			</item>
		<item>
		<title>Go deeper: Linux runtime visibility meets Wireshark</title>
		<link>https://www.aquasec.com/blog/go-deeper-linux-runtime-visibility-meets-wireshark/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Wed, 07 Aug 2024 15:57:42 +0000</pubDate>
				<category><![CDATA[CONTAINER SECURITY]]></category>
		<category><![CDATA[RUNTIME SECURITY]]></category>
		<category><![CDATA[Aqua Open Source]]></category>
		<category><![CDATA[Tracee]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=21380</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/go-deeper-linux-runtime-visibility-meets-wireshark/" title="Go deeper: Linux runtime visibility meets Wireshark" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2024/08/Tracee-shark-blog-social.jpg" alt="Go deeper: Linux runtime visibility meets Wireshark" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Aqua Tracee is an open source runtime security and forensics tool for Linux, built to address common Linux security issues. Tracee’s main use case is to be installed in a production environment and continuously monitor system activity and detect suspicious behavior. Some alternative use cases which Tracee can be used for are dynamic malware analysis,&#160;&mldr;]]></description>
		
		
		<enclosure url="https://1665891.fs1.hubspotusercontent-na1.net/hubfs/1665891/Tracee%20live%20capture.mp4" length="5122181" type="video/mp4" />

			</item>
		<item>
		<title>Elevating AWS Kubernetes Security and Compliance  </title>
		<link>https://www.aquasec.com/blog/aws-kubernetes-security-and-compliance/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Wed, 15 May 2024 12:00:09 +0000</pubDate>
				<category><![CDATA[CONTAINER SECURITY]]></category>
		<category><![CDATA[AWS Security]]></category>
		<category><![CDATA[Container Security]]></category>
		<category><![CDATA[Kubernetes Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=20010</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/aws-kubernetes-security-and-compliance/" title="Elevating AWS Kubernetes Security and Compliance  " class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2024/05/blog-main-AWS-EKS-1200x628-2024.jpg" alt="Elevating AWS Kubernetes Security and Compliance  " class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Amazon Elastic Kubernetes Service (Amazon EKS) streamlines the process of deploying, managing, and scaling Kubernetes clusters on Amazon Web Services (AWS), sparing users the complexities of setting up and maintaining their own Kubernetes control plane. Kubernetes itself is an open-source platform designed to automate the management, scaling, and deployment of applications within containers.    In&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>CVE-2024-3094: Newly Discovered Backdoor in XZ tools</title>
		<link>https://www.aquasec.com/blog/cve-2024-3094-newly-discovered-backdoor-in-xz-tools/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Mon, 01 Apr 2024 15:49:06 +0000</pubDate>
				<category><![CDATA[CONTAINER SECURITY]]></category>
		<category><![CDATA[Security Threats]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=19576</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/cve-2024-3094-newly-discovered-backdoor-in-xz-tools/" title="CVE-2024-3094: Newly Discovered Backdoor in XZ tools" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2024/04/Blog-image-Backdoor-in-xz-web-image.jpg" alt="CVE-2024-3094: Newly Discovered Backdoor in XZ tools" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>The xz-utils is a popular compression tool used widely across Linux systems, indicating its critical role in the software ecosystem. The xz-utils backdoor, discovered on March 29, 2024, exposes systems to potential backdoor access and remote code execution. It specifically targets versions 5.6.0 and 5.6.1 of xz-utils on systems using glibc, systemd, and patched OpenSSH.&#160;&mldr;]]></description>
		
		
		
			</item>
	</channel>
</rss>
