While agentless tools such as cloud security posture management (CSPM) have found massive interest thanks in part to their ease of deployment, the limitations of the tools for directly improving security outcomes became widely evident this year, Aqua Security CEO Dror Davidoff said in an interview with CRN.
Aqua researchers Yakir Kadkoda and Assaf Morag said they found Kubernetes secrets in public repositories that allow access to sensitive environments in the Software Development Life Cycle (SDLC) and open a severe supply chain attack threat.
BOSTON—Nov. 20, 2023—Aqua Security, the pioneer in cloud native security, today announced it was selected as the 2023 CISO Choice Award winner in the Cloud Workload Protection Platform (CWPP) category. Honoring security vendors of all types, sizes and maturity levels, the award program recognizes top-tier differentiated solutions from innovative security solution providers worldwide. A panel …
BOSTON—Nov. 9, 2023—Aqua Security, the pioneer in cloud native security, today published the results of a commissioned study conducted by Forrester Consulting titled The Total Economic Impact™ (TEI) Of Aqua Platform, which illustrates the cost savings and business benefits delivered by the Aqua Platform. The study revealed $5.45 million in benefits over three years with …
The Aqua Trivy open-source scanner now supports vulnerability scanning for Kubernetes components and Kubernetes Bill of Materials (KBOM) generation. Now, companies can better understand the components within their Kubernetes environment and how secure they are to reduce risk.
According to cloud security firm Aqua Security, the group behind Kinsing has exploited the Looney Tunables vulnerability in recent attacks.
BOSTON—Nov. 6, 2023—Aqua Security, the pioneer in cloud native security, today announced its open source solution Trivy now supports vulnerability scanning for Kubernetes components in addition to Kubernetes Bill of Materials (KBOM) generation. Now, companies can better understand the components within their Kubernetes environment and how secure they are in order to substantially reduce risk. …
“Intriguingly, the attacker is also broadening the horizons of their cloud-native attacks by extracting credentials from the Cloud Service Provider (CSP),” cloud security firm Aqua said in a report shared with The Hacker News.