Date | Title | Description |
10.11.2024 | The Rise of GraphRAG and Its Impact on AI Development | In the world of artificial intelligence, innovation is the lifeblood. The latest wave of advancement comes from a powerful concept known as Retrieval-Augmented Generation (RAG). This method breathes new life into large language models (LLMs... |
09.11.2024 | IaC и DevSecOps: выбираем лучшие инструменты анализа и защиты инфраструктурного кода | Привет, читатели Habr! С вами Анастасия Березовская, инженер по безопасности процессов разработки приложений в Swordfish Security. Сегодня мы вновь будем говорить об особенностях статического сканирования, но на этот раз переключим фокус с ... |
01.11.2024 | GitHub's Restrictions: A Double-Edged Sword for Developers | In the world of software development, access to tools and resources is paramount. Recently, GitHub has tightened its grip on the accessibility of its vulnerability database for Trivy, a popular container scanning tool. This move has sent ri... |
29.10.2024 | GitHub ограничивает доступ к базе уязвимостей Trivy | В последний месяц разработчики, использующие Trivy для сканирования контейнеров, столкнулись с серьёзной проблемой: при попытке загрузить базу данных уязвимостей из GitHub Container Registry (ghcr.io) возникает ошибка TOOMANYREQUESTS. Это с... |
07.10.2024 | Cybersecurity and Innovation: A Week of Alerts and Achievements | In the fast-paced world of technology, cybersecurity is a battlefield. Each week brings new threats and innovations. This week, two articles highlight significant events in this arena. One focuses on critical vulnerabilities and phishing ca... |
07.10.2024 | Топ-5 ИБ-событий недели по версии Jet CSIRT | Сегодня в ТОП-5 — обновление для библиотеки Libnv, предупреждение агентства CISA о критических уязвимостях, фишинговая кампания Narketing163, уязвимость в Microsoft Office, атака Linux-серверов.
Исправление уязвимости в библиотеке libnv
В н... |
22.09.2024 | Postgresso 8 (69) | PostgreSQL 17 RC1
Вышел 1-й релиз-кандидат. По сравнению с 3-й бетой: откатили MERGE/SPLIT секций. Окончательный релиз (GA) должен появиться 26-го сентября.
Обновления версий Postgres Pro Enterprise 16.4.1, 15.8.1, 14.13.1, 13.16.1, 12.20.1... |
17.09.2024 | Топ-5 ИБ-событий недели по версии Jet CSIRT | Сегодня в ТОП-5 — удар бэкдора Loki по российским компаниям, нацеленные на серверы IIS атаки DragonRank, применение инструментов Kaspersky для отключения EDR, использование серверов Oracle WebLogic для майнинга и DDoS-атак, новые атаки Eart... |
13.09.2024 | Kubernetes attacks are growing: Why real-time threat detection is the answer for enterprises | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
Over the last year 89% of organizations experienced at least one container or Kubernetes security incident, makin... |
14.08.2024 | Aqua Security finds critical vulnerabilities in six AWS services | Aqua Security's cyber research team, Nautilus, has identified critical vulnerabilities in six Amazon Web Services (AWS) offerings. These vulnerabilities pose significant risks, including remote code execution (RCE), full-service user takeov... |
28.06.2024 | Aqua Security finds critical data exposures in SCM systems | Aqua Security has uncovered significant exposure of sensitive enterprise information in leading Source Code Management (SCM) systems. The security research highlights the long-term exposure of credentials, API tokens, and passkeys, collecti... |
26.06.2024 | Enterprise secrets leaked in code management systems | Enterprise secrets could be inadvertently leaking via GitHub repositories, according to new research from Aqua Security.
By scanning the most popular 100 organizations on Github, which collectively includes more than 50,000 publicly accessi... |
08.06.2024 | Удобный CI/CD доступен каждому | Привет, Хабр! Недавно я выступал на Moscow Python Conf, где делился нашим опытом создания и использования CI/CD пайплайнов. В данной статье я расскажу об этих пайплайнах, раскрою их особенности и покажу, как они помогают нам быстро доставля... |
30.05.2024 | Обзор сканеров безопасности для проверки конфигурации Terraform | Для работы с облачными провайдерами существует способ управления инфраструктурой как кодом (англ. Infrastructure-as-Code, сокр. Iac). Для этих задач используется широко известный инструмент под названием Terraform.
В основном он используетс... |
20.05.2024 | Token Security Emerges From Stealth With $7M, Introducing the Machine-First Era in Identity Security | Token Security powers the evolution of identity security, helping minimize security risk while maintaining operational integrity in the age of AI-generated identities
TEL AVIV, Israel–(BUSINESS WIRE)–May 20, 2024–
Token Security today emerg... |
08.05.2024 | Wiz Soars to New Heights with $1 Billion Funding Round | Wiz, the cloud security company, has secured a massive $1 billion in funding at a staggering $12 billion valuation. This funding round, led by top investors like Andreessen Horowitz and Lightspeed Venture Partners, propels Wiz to the forefr... |
07.05.2024 | Wiz raises $1B at a $12B valuation to expand its cloud security platform through acquisitions | Wiz, the buzzy startup building an all-in-one cloud security platform, is on an acquisition march to expand its business quickly en route to an IPO.
Now, it has closed a major round of funding of $1 billion to help on that march.
The Series... |
23.04.2024 | Почему безопасник должен расти из программиста | По каждому из направлений в ИТ есть свои так называемые «приколы» и особенности в части поиска и обучения сотрудников, взаимодействия с софтом, заказчиками и так далее. В моей области, то есть в области информационной безопасности, все еще ... |
17.04.2024 | Evolution Equity Partners: Leading the Charge in Cybersecurity Investment | Cybersecurity investment has hit a rough patch, but Evolution Equity Partners is leading the charge in turning the tide. Despite a 40% drop in sector investment, there are signs of a recovery on the horizon.
Chief information security offic... |
16.04.2024 | Evolution Equity Partners raises $1.1B for new cybersecurity and AI fund | Cybersecurity has had a rough go of it lately, with investment in the sector dropping a precipitous 40% compared to the year prior. But there are promising early, even preliminary, signs of a recovery.
The vast majority of chief information... |
02.04.2024 | Defending against IoT ransomware attacks in a zero-trust world | Join us in Atlanta on April 10th and explore the landscape of security workforce. We will explore the vision, benefits, and use cases of AI for security teams. Request an invite here.
IoT sensors and the smart devices they’re connected to a... |
13.03.2024 | Opal Security Expands Executive Team with Seasoned Leaders from Slack, Snyk and Aqua Security | - |
19.02.2024 | Log4j lessons learned: A blueprint for zero-day defence | Two years ago, the zero-day vulnerability, known as Log4Shell unwrapped itself spoiling holiday celebrations for many across the globe leaving organizations scrambling for a fix before it could be exploited.
The vulnerability was discovered... |
02.02.2024 | На GitHub больше 1 000 уязвимых репозиториев: в чём суть угрозы и что с этим делать | Привет, Хабр! На связи технический директор MTC RED Денис Макрушин и команда Advanced Research Team: Павел Гусь, Иван Бессарабов и Андрей Сомсиков.
В январе разработчики GitLab нашли в своей системе две критические уязвимости. Из-за ошибок ... |
08.01.2024 | Exclusive: Venrock ups its find size for the first time in a decade, raising $650M for tenth fund | It was mid-December as Venrock partner Bryan Roberts waltzed into one of the conference rooms of the venture capital firm he’s been running since 2007—his German Shepherd close at his heels with a tennis ball.
When I asked how he’s been, he... |
04.01.2024 | Aqua Security: $60 Million Funding Raised At Over $1 Billion Valuation | Aqua Security – a pioneer in cloud-native security – recently announced it had secured $60 million in funding, led by new investor Evolution Equity Partners, with participation from existing investors Insight Partners, Lightspeed Venture Pa... |
03.01.2024 | Aqua Security Secures $60M in Funding | Aqua Security, a Boston, MA- and Ramat Gan, IL-based company which specializes in cloud native security, raised $60M in funding.
The funding, an extension of the company’s Series E round, places Aqua’s valuation above $1B.
The round was led... |
03.01.2024 | Aqua Security nabs $60M at $1B valuation to secure enterprise cloud applications
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our mission t... | Aqua Security Inc., a startup helping enterprises protect their cloud workloads from vulnerable and malicious code, today announced that it has raised $60 million in funding.
Evolution Equity Partners led the investment. It was joined by In... |
03.01.2024 | Cloud-native cybersecurity startup Aqua Security raises $60M and remains a unicorn | Aqua Security, an Israeli cybersecurity startup that helps companies protect their cloud services, has raised $60 million in funding, extending its previously announced $135 million Series E round of funding to $195 million.
Founded in 2015... |
03.01.2024 | Aqua Security Closes $60M in Series E Extension |
BOSTON, MA, Aqua Security announced it has secured $60M in funding, led Evolution Equity Partners. The funding places Aqua's valuation above $1B.
>> Click here for more funding data on Aqua Security
>> To export Aqua Securit... |
10.12.2023 | Protecting against new Kubernetes threats in 2024 and beyond | Join leaders in San Francisco on January 10 for an exclusive night of networking, insights, and conversation. Request an invite here.
A wave of new attacks targeted Kubernetes in 2023: Dero and Monero crypto miners, Scarleteel and RBAC-Bust... |
08.12.2023 | Безопасность Supply Chain. Глава 2: как злонамеренные библиотеки проникают в проект и как этому помешать | Bob: Alice, ты в прошлый раз меня убедила, что мне необходимо проверить свои сторонние зависимости в проекте на риски атак через цепочку поставок (Supply Chain). По итогу уже нашлось три подозрительные библиотеки. Я вообще не понимаю, как о... |
13.11.2023 | Security Week 2346: Ducktail, атака на специалистов по маркетингу | На прошлой неделе специалисты «Лаборатории Касперского» разбирали свежую атаку под кодовым названием Ducktail. За этой киберкриминальной кампанией предположительно стоит группировка из Вьетнама. Характерной чертой Ducktail в ее последней ве... |
23.08.2023 | Один YAML до катастрофы: «детские» ошибки администраторов Kubernetes | Когда речь заходит о безопасности кластеров Kubernetes, вспоминаются сложные методики, выверенные практики, высокий уровень сопровождения. Но так бывает не всегда. Нам встретилась статья, авторы которой изучили множество кластеров и выяснил... |
17.08.2023 | Top 20 cloud native application protection platforms of 2023 | Head over to our on-demand library to view sessions from VB Transform 2023. Register Here
Exploiting gaps in cloud infrastructure that are leaving endpoints, identities and microservices exposed is a quick way for an attacker to steal crede... |
17.08.2023 | Эксперты AquaSec раскрыли уязвимости безопасности в работе репозитория PowerShell Gallery, Microsoft год их исправляет | Эксперты AquaSec (Aqua Security) обнаружили значительные уязвимости безопасности в работе открытого партнёрского сервиса и репозитория для обмена исходными кодами для работы в PowerShell под названием PowerShell Gallery. Разработчики из Mic... |
26.07.2023 | Protect AI raises $35M to build a suite of AI-defending tools | Protect AI, a startup building tools to harden the security around AI systems, today announced that it raised $35 million in a Series A round led by Evolution Equity Partners with participation from Salesforce Ventures, Acrew Capital, bolds... |
03.07.2023 | Memory-based attacks increase as attackers dodge cloud defenses | A new report shows a 1,400 percent increase in fileless or memory-based attacks, which exploit existing software, applications, and protocols to perform malicious activities against cloud-based systems.
The research from Aqua Security's Nau... |
30.06.2023 | Aqua Security Study Finds 1,400% Increase in Memory Attacks | Image: tippapatt/Adobe Stock
Threat actors are honing their focus on exploits that evade detection and remain unnoticed within systems, according to Aqua Security’s 2023 Cloud Native Threat Report, which examined memory attacks in networks ... |
23.06.2023 | Palo Alto Networks CTO Talks Securing ‘Code to Cloud’ | Image: Timon/Adobe Stock
Palo Alto Networks held its annual Code to Cloud Cybersecurity Summit Thursday, focusing on cloud, DevOps and security. Experts discussed trends, opportunities and challenges with coding and the cloud.
Recently, Pal... |
23.06.2023 | Исследователи: миллионы репозиториев GitHub уязвимы для атак RepoJacking | Группа безопасности компании Nautilus проанализировала выборку из 1,25 млн репозиториев GitHub и обнаружила, что около 2,95% из них уязвимы для атак RepoJacking. Они позволяют злоумышленникам развернуть атаки цепочки поставок, затрагивающие... |
15.06.2023 | More Than a Third of UK Organisations Believe Inadequate Software Supply Chain Security Is the Biggest Security Risk to Their Business, Reveals New Aqua Security Study | Aqua Security, the pioneer in cloud native security, has announced the results of a new study which reveals that, whilst UK firms are realising the benefits of cloud native security, the software supply chain has become a top security conce... |
12.05.2023 | Aqua Enhances Software Supply Chain Security with Pipeline Integrity Scanning | Real-Time eBPF monitoring technology prevents code tampering throughout build and delivery
Aqua Security, the pioneer in cloud native security, announced it added pipeline integrity scanning to prevent software supply chain attacks and assu... |
20.04.2023 | Why agentless security is not real security | Many security professionals have been misled into believing in the overhyped promise of agentless security. But it looks like the long-lasting 'agentless vs. agent' debate is finally over and the result is finally in -- if you want great cl... |
10.04.2023 | Clearing visibility and unifying security tools with a cloud-native application protection platform (CNAPP) | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Cybersecurity has become a complex and rapidly evolving game. To keep up with cyber-criminals, ent... |
17.03.2023 | How access management helps protect identities in the cloud | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Things are rapidly growing more challenging on the security front in 2023. Many CISOs didn’t expec... |
14.03.2023 | CrowdStrike report shows identities under siege, cloud data theft up | Cyberattacks exploiting gaps in cloud infrastructure — to steal credentials, identities and data — skyrocketed in 2022, growing 95%, with cases involving “cloud-conscious” threat actors tripling year-over-year. That’s according to CrowdStri... |
15.02.2023 | How monitoring libraries rather than containers is key to open-source security | The security of open-source projects leaves a lot to be desired. With 84% of codebases containing an open-source security vulnerability, organizations need to be much more proactive in identifying potential entry points in downstream softwa... |
15.02.2023 | Cloud security: Top trends and threats to watch out for in 2023 | As security professionals assess the cloud security challenges that lie ahead for the coming year, one thing is certain. Threat actors will continue to double down on their efforts, utilizing new techniques and refining pre-existing methods... |
14.02.2023 | Getting to grips with cloud-native application protection platform (CNAPP) security -- to protect everything, everywhere, all of the time | As many CISOs are discovering, protecting cloud native environments requires a fundamental shift in thinking when it comes to keeping threats at bay. The huge change in the technology stack, the rapid delivery of software updates, and the u... |
08.02.2023 | The cloud’s growing impact on cybersecurity | Check out all the on-demand sessions from the Intelligent Security Summit here.
Cybersecurity’s most proven innovation catalyst continues to be the many challenges of securing cloud infrastructure. The cloud has won the enterprise, dominati... |
07.02.2023 | ARMO shows how ChatGPT can help protect Kubernetes | Check out all the on-demand sessions from the Intelligent Security Summit here.
The impact of ChatGPT and generative AI on the security landscape is difficult to gauge. While threat actors can use these AI-driven solutions to generate phish... |
30.01.2023 | 32 Executives Recognized By APPEALIE with Software Leadership Award - 2022 SaaS Leader Awards Announced | “Beyond specific achievements - whether increases in gross retention rates or setting record SQLs - ‘human-first’ and ‘authentic’ leadership were common themes cited in our winners’ peer nominations,” commented Arabella Solaybar, Executive ... |
16.12.2022 | Open-source code is everywhere; GitHub expands security tools to help secure it | Check out all the on-demand sessions from the Intelligent Security Summit here.
Whether directly or indirectly, nearly all organizations depend on software created by the open-source community. In fact, an incredible 97% of applications inc... |
13.12.2022 | Why the manufacturing sector must make zero trust a top priority in 2023 | Check out all the on-demand sessions from the Intelligent Security Summit here.
By making zero trust a high priority in 2023, manufacturers can close the IT and operational technology (OT) gaps that keep them open to attack. Despite million... |
09.12.2022 | Kubernetes receives new cybersecurity and management features
Show your support for our mission by joining our Cube Club and Cube Event Community of experts. Join the community that includes Amazon W... | The developers of Kubernetes have released new features for the software container management platform that will make it easier to secure and maintain.
The features are available in Kubernetes 1.26, the latest version of the platform, which... |
10.11.2022 | Как построить Security Сenter для Kubernetes-платформы | Эта статья будет полезна специалистам по безопасности и DevSecOps, платформенным командам и DevOps, и вообще всем, кто сталкивался или может столкнуться с более, чем одним кластером Kubernetes в продакшене.
За основу взято выступление Алекс... |
09.11.2022 | Aqua Security Offers Only Enterprise-Grade Software Supply Chain Solution | Aqua helps software vendors meet compliance requirements in under 30 days to prepare for 2023 deadline
Aqua Security, the leading pure-play cloud native security provider, announced that it is the only enterprise-grade vendor providing soft... |
25.10.2022 | Open-source initiative Pyrsia fuels up to boost trust in software supply chain | Register now for your free virtual pass to the Low-Code/No-Code Summit this November 9. Hear from executives from Service Now, Credit Karma, Stitch Fix, Appian, and more. Learn more.
Open-source is everywhere, a critical element of nearly e... |
14.10.2022 | ТОП-3 ИБ-событий недели по версии Jet CSIRT | Компания Microsoft выпустила октябрьские обновления безопасности
В рамках Patch Tuesday корпорация Microsoft выпустила патчи безопасности, закрывающие 84 уязвимости, 13 из которых являются критическими. Обновления включают в себя устранение... |
21.09.2022 | Aqua Security secures the supply chain with latest solution | Aqua Security secures the supply chain with latest solution
Aqua Security, a pure-play cloud native security provider, is introducing an end-to-end software supply chain security solution, ensuring protection across the entire software deve... |
13.09.2022 | Aqua Security Launches Google Cloud Marketplace Private Offers | With the Aqua Platform, Google Cloud customers can now secure their complete cloud native application lifecycle and stop cloud native attacks
/EIN News/ -- BOSTON, Sept. 13, 2022 (GLOBE NEWSWIRE) -- Aqua Security, the leading pure-play clou... |
22.08.2022 | Отслеживание сетевого трафика в Kubernetes: примеры кода и практические советы | Команда VK Cloud перевела статью об основных принципах работы сети в Kubernetes: как кластер принимает и отправляет пакеты начиная с исходного веб-запроса и до размещения приложения в контейнере.
Требования к сети в Kubernetes
Сначала давай... |
29.07.2022 | SBOMs: What they are and why organizations need them | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
In the continuously rippling wake of cyberattacks, hacks and ransomware, organizations want — and need — to clean up th... |
24.07.2022 | Безопасная разработка приложений — на что обратить внимание при работе с открытым кодом | Мы в T1 Cloud продолжаем рассказывать о процессах безопасной разработки приложений Secure SDLC. Сегодня подробнее поговорим о потенциальных уязвимостях в компонентах open source и как от них защититься./ Unsplash.com / Chris Barbalis
Подавл... |
22.06.2022 | Aqua Security and CIS release first formal guidelines for software supply chain security | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Today, cloud native security provider, Aqua Secur... |
13.06.2022 | Credentials for thousands of open source projects free for the taking—again! | Enlarge
Getty Images reader comments 42 with 28 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
A service that helps open source developers write and test software is leaking thousands of authentica... |
27.04.2022 | First fully open-source Kubernetes security platform ARMO raises $30M | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Today, security company ARMO announced that it ha... |
20.04.2022 | Evolving attack techniques target cloud-native systems | Attackers are finding new ways to target cloud-native environments according to a new report from Aqua Security's Nautilus threat research team.
While cryptominers are the most common malware observed, with increasing frequency researchers ... |
17.04.2022 | Lessons learned from 633 destructive ransomware events | The threat landscape continues to see rapid evolution, especially as the digital world grows increasingly connected and more organizations outsource business services. Adversaries are getting smarter, and their techniques are getting more a... |
14.03.2022 | Cyberwarfare plays growing role in the Russia-Ukraine conflict | As we reported last week, cyberattacks are being used on both sides of the Russia-Ukraine conflict. Two new reports out today take a deeper look at how the cyber aspect of the conflict is developing.
Accenture's Cyber Threat Intelligence te... |
27.01.2022 | Report: Software supply chain attacks increased 300% in 2021 | Did you miss a session from the Future of Work Summit? Head over to our Future of Work Summit on-demand library to stream.
Software supply chain attacks grew by more than 300% in 2021, according to a study from Argon Security, recently acqu... |
27.01.2022 | Report: Software supply chain attacks increased 300% in 2021 | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Software supply chain attacks grew by more than 3... |
27.01.2022 | Sonatype, which secures open source code, lays groundwork for IPO | Did you miss a session from the Future of Work Summit? Head over to our Future of Work Summit on-demand library to stream.
Let the OSS Enterprise newsletter guide your open source journey! Sign up here.
As security for software development ... |
27.01.2022 | Sonatype, which secures open source code, lays groundwork for IPO | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Let the OSS Enterprise newsletter guide your open... |
26.01.2022 | Slim.AI lands $31M to make container security ‘easy’ for developers | Did you miss a session from the Future of Work Summit? Head over to our Future of Work Summit on-demand library to stream.
The insecurity of the software supply chain has turned into an impossible-to-ignore issue. There are the high-profile... |
26.01.2022 | Slim.AI lands $31M to make container security ‘easy’ for developers | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
The insecurity of the software supply chain has t... |
21.01.2022 | ‘Mass demand’ is building for cloud-native security, Aqua CEO says | Did you miss a session from the Future of Work Summit? Head over to our Future of Work Summit on-demand library to stream.
Enterprises are poised to accelerate their adoption of security for cloud-native technologies starting this year, wit... |
21.01.2022 | ‘Mass demand’ is building for cloud-native security, Aqua CEO says | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Enterprises are poised to accelerate their adopti... |
19.01.2022 | Supply chain attacks more than triple in 2021 | Software supply chain attacks grew by more than 300 percent in 2021 compared to 2020 as attackers focused on open source vulnerabilities and poisoning, code integrity issues, and exploiting the software supply chain process and supplier tru... |
01.12.2021 | Aqua Security acquires Argon to protect the software supply chain | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Cloud-native application protection firm Aqua Sec... |
01.12.2021 | Aqua Security acquires Argon to protect the software supply chain | Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at the Future of Work Summit this January 12, 2022. Learn more
Cloud-native application protection firm Aqua Security announced today it has acquired Argon, ... |
26.11.2021 | Attackers step up attack on cloud platforms to mine cryptos | Team TC 26 Nov, 2021
Cyber attackers have intensified attacks on poorly configured cloud Instances to mine cryptocurrencies. Out of the 50 Google Cloud Platform (GCP) Instances that were compromised recently, 86% were used for cryptocurrenc... |
16.11.2021 | Aqua Security Receives Investment from Capital One Ventures | Aqua Security, a Boston, MA-based pure-play cloud native security provider, received a strategic investment from Capital One Ventures.
The amount of the deal was not disclosed.
In conjunction with the deal, rhe company appointed Capital One... |
15.11.2021 | Aqua Security announces strategic investment from Capital One Ventures | Investment and appointment of Capital One CISO Chris Betz to Aqua’s Executive Advisory Board solidify Aqua as a leading cloud native security solution for financial services
LONDON — 15th November 2021 — Aqua Security, the leading pure-play... |
14.10.2021 | Aqua Security Unveils Industry-First Detection & Response for Zero-Day Attacks in Cloud Native Environments | Aqua Security, the leading pure-play cloud native security provider, unveiled the most powerful cloud native detection and response (CNDR) capabilities in the industry. CNDR uses a growing body of more than 80 behavioral indicators to ident... |
12.10.2021 | Software supply chain breaches are ‘staggeringly high,’ report finds | The Transform Technology Summits start October 13th with Low-Code/No Code: Enabling Enterprise Agility. Register now!
Software supply chain weaknesses have become pervasive in the enterprise. That’s according to a new report from BlueVoyant... |
12.10.2021 | Software supply chain breaches are ‘staggeringly high,’ report finds | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Software supply chain weaknesses have become perv... |
27.09.2021 | Создание и проверка подписей образов контейнеров: Интеграция Notary V1 и Connaisseur в Kubernetes | Полезные ссылки
Описание Docker Content Trust
О типах ключей в DCT и Notary, а также как ими управлять
Описание CLI NotaryВведение
Угрозы безопасности не стоят на месте. С развитием и популяризацией концепции микросервисов, большую распрост... |
27.08.2021 | Security alert: The threat is coming from inside your Docker container images | Image: o_m/Shutterstock
There’s a new threat cybersecurity teams need to watch out for: malicious Docker containers hiding on legitimate sites like Docker Hub, where Aqua Security’s threat research arm, Team Nautilus, found five images acco... |
31.07.2021 | Aqua Security: 97% unaware of crucial cloud native security principles | All the sessions from Transform 2021 are available on-demand now. Watch now.
Ninety-seven percent of cloud-native security practitioners are broadly unaware of essential container security principles, according to a report from Aqua Securit... |
31.07.2021 | Aqua Security: 97% unaware of crucial cloud native security principles | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Ninety-seven percent of cloud-native security pra... |
22.07.2021 | 97 percent don't recognize the security limitations of containers | A new study finds that only three percent of respondents recognize that a container, in and of itself, is not a security boundary, suggesting that the default security capabilities of containers are overestimated.
The survey, from cloud sec... |
12.07.2021 | Aqua Security Acquires tfsec | Adds Infrastructure as Code Security Capabilities to Its Open Source Portfolio and Cloud Native Security Platform
Aqua Security, the pure-play cloud native security leader, announced the acquisition of tfsec, an open source security scanner... |
25.06.2021 | Aqua Trivy Chosen As The New Default Container Scanner For GitLab | Aqua Trivy and GitLab partner to provide users comprehensive security tools needed to successfully shift left
Aqua Security, the pure-play cloud native security leader, announces that Aqua Trivy is now the default open source container scan... |
21.06.2021 | Aqua Security Launches on AWS CloudFormation Public Registry for IaC Automation | |
21.06.2021 | Sophisticated new attacks target container supply chains and infrastructure | New research reveals a continued rise in cyberattacks targeting container infrastructure and supply chains, and shows that it can take less than an hour to exploit vulnerable container infrastructure.
The latest threat report from cloud-nat... |
13.05.2021 | Cloud Misconfigurations Become Commonplace for Many Companies:63GB of Sensitive Data Hampers Microsoft | Joseph Henry, Tech Times 13 May 2021, 11:05 pm
Cloud misconfigurations have been rampant among major companies, and the problems in the multi-cloud environments persist despite advanced systems in their services.
According to Aqua Security,... |
12.05.2021 | Cloud misconfigurations make 90 percent of companies vulnerable | A large majority of companies that move to multi-cloud environments are not properly configuring their cloud-based services according to a new report from Aqua Security.
Over 12 months, Aqua's research team analysed anonymised cloud infrast... |
11.03.2021 | Aqua Security tops $1B valuation | Aqua Security has raised $135 million in Series E funding led by Ion Crossover Partners, bringing its valuation to more than $1 billion. The company, which is jointly based in Massachusetts and Israel, operates a cloud-based security platfo... |