Techday’s 10 Minute IT Jams features Aqua Security Area VP for APAC and Japan Rob D’Amico, who shares with us some insight around the company’s role in providing cloud native security solutions to a wide range of markets.
The move to IaC has its challenges but done right can fundamentally improve an organization’s overall security posture. An Aqua Security expert shares insights in this contributed article.
The supply chain threat has been dubbed “Package Planting” by researchers from cloud security firm Aqua. “Up until recently, NPM allowed adding anyone as a maintainer of the package without notifying these users or getting their consent,” Aqua’s Yakir Kadkoda said in a report published Tuesday.
BOSTON — April 26, 2022 — Aqua Security, the leading pure-play cloud native security provider, announced today that the Boston Business Journal has named the company a 2022 Best Place to Work. The BBJ’s exclusive ranking honors Massachusetts companies that have built outstanding work environments for their people. “Aqua’s values are at the core of everything we …
BOSTON — April 26, 2022 — Aqua Security, the leading pure-play cloud native security provider, today issued new research, which shows that nearly 70% of chief information security officers (CISOs) believe open source security solutions provide a faster way to secure their environments. Likewise, 78% of CISOs believe open source solutions provide them with access …
New research released Wednesday from Aqua Security found that while cryptominers were the most common malware observed, the researchers discovered increased use of backdoors, rootkits, and credential stealers — signs that intruders have more than cryptomining in their plans.
Attackers focused on the cloud are using more sophisticated tactics to aim at Kubernetes and the software supply chain, says Aqua Security.
BOSTON — April 20, 2022 — Aqua Security, the leading pure-play cloud native security provider, today published new research from Aqua’s threat research team, Nautilus, that demonstrates attackers are finding new ways to target cloud native environments. The research shows that adversaries are adopting more sophisticated techniques, leveraging multiple attack components, and shifting attention to …