Aqua Security raises $62M in funding to expand its platform and market presence

Aqua Security, the market leader in protecting container-based, serverless and cloud native applications, announced that it has closed a Series C round of $62M led by Insight Partners. Aqua’s existing investors – Lightspeed Venture Partners, M12 (Micro… Continue reading Aqua Security raises $62M in funding to expand its platform and market presence

Aqua Security Closes $62M in Funding to Cement Its Leadership in Cloud Native Security

Led by Insight Partners, the investment round will enable Aqua to expand its platform and market presence, addressing the growing need to secure microservices applications running on containers and serverless infrastructure Boston, MA and Tel Aviv, Isr… Continue reading Aqua Security Closes $62M in Funding to Cement Its Leadership in Cloud Native Security

Aqua Security and Pivotal Team Up to Bring New Application Security Solution to the Enterprise

Collaboration Allows Pivotal Cloud Foundry Users to Leverage Aqua Security for Securing Applications from Development to Deployment   Boston, MA, October 9, 2018 – Aqua Security today announced the general availability of Aqua Security for (… Continue reading Aqua Security and Pivotal Team Up to Bring New Application Security Solution to the Enterprise

DevSecOps is maturing, 62% of organizations have a team in place

During RSA Conference 2018, Aqua Security surveyed 80 security professionals to gain their unfiltered, high-level perspective on the fast-emerging discipline of DevSecOps. According to the survey respondents, DevSecOps is quickly gaining support and tr… Continue reading DevSecOps is maturing, 62% of organizations have a team in place

New infosec products of the week​: March 9, 2018

Discover, secure and govern personal data in motion StreamSets Data Protector reduces risk of violations by helping companies meet requirements for GDPR, HIPAA and other compliance regimes. It extends protection to the point of initial data ingestion, … Continue reading New infosec products of the week​: March 9, 2018

SecBlvd Chats: Aqua Security Seeks to Lock Down Container Security

The migration to container-based application infrastructure is accelerating at a faster pace even than we saw with hypervisor-based infrastructure 18 or so years ago. Hand in hand with this is the race to provide better security solutions that are native to—and purpose-built for—containerized environments. Aqua Security is one such company doing that. It has established..

The post SecBlvd Chats: Aqua Security Seeks to Lock Down Container Security appeared first on Security Boulevard.

Continue reading SecBlvd Chats: Aqua Security Seeks to Lock Down Container Security

New infosec products of the week​: October 20, 2017

Ransomware protection intercepts threats targeting enterprise data FileCloud announced FileCloud Breach Intercept, which offers ransomware protection. FileCloud offers branding and customization tools, allowing you to set your own policies, and design your own emails and alerts. Customized emails and UX reduce spoofing risk as hackers can’t run a mass spoofing unless they have an exact copy of an email from one of your employees. Nfusion 2 provides stronger misattribution environments for online investigation Ntrepid announced … More Continue reading New infosec products of the week​: October 20, 2017

Enterprise container security: There’s room for improvement

With companies such as Facebook, Netflix and Google heralding the use of containers for their agility, portability, and cost benefits – enterprises are following suit. But the introduction of new processes and changes to infrastructure require a significant shift in focus. To learn the current state of container security in the enterprise, Aqua Security surveyed 512 individuals meeting the criteria of using containers in development or production today, or planning to use them in the … More Continue reading Enterprise container security: There’s room for improvement

Attack Uses Docker Containers To Hide, Persist, Plant Malware

Abuse of the Docker API allows remote code execution on targeted system, which enables hackers to escalate and persists thanks to novel attacks called Host Rebinding Attack and Shadow Containers. Continue reading Attack Uses Docker Containers To Hide, Persist, Plant Malware

Keys, tokens and too much trust found in container images

We are all aware of the risks introduced by good old third party code. Where would we be without it? Apparently not very far. It is estimated that between 30 to 70 percent of code comes from 3rd party applications. This is why we patch up old libraries and update open source packages. While the risks of 3rd party code are well known, the risks of using 3rd party containers are more obscure. In this … More Continue reading Keys, tokens and too much trust found in container images