Author Page

The Cloud Native Experts

"The Cloud Native Experts" at Aqua Security specialize in cloud technology and cybersecurity. They focus on advancing cloud-native applications, offering insights into containers, Kubernetes, and cloud infrastructure. Their work revolves around enhancing security in cloud environments and developing solutions to new challenges.
Rani Osnat
Rani is the SVP of Strategy at Aqua. Rani has worked in enterprise software companies more than 25 years, spanning project management, product management and marketing, including a decade as VP of marketing for innovative startups in the cyber-security and cloud arenas. Previously Rani was also a management consultant in the London office of Booz & Co. He holds an MBA from INSEAD in Fontainebleau, France. Rani is an avid wine geek, and a slightly less avid painter and electronic music composer.
Amit Sheps
Amit is the Director of Technical Product Marketing at Aqua. With an illustrious career spanning renowned companies such as CyberX (acquired by Microsoft) and F5, he has played an instrumental role in fortifying manufacturing floors and telecom networks. Focused on product management and marketing, Amit's expertise lies in the art of transforming applications into cloud-native powerhouses. Amit is an avid runner who relishes the tranquility of early morning runs. You may very well spot him traversing the urban landscape, reveling in the quietude of the city streets before the world awakes.
Lena Fuks
Lena Fuks is a Product Marketing Manager at Aqua. With a background in public relations for technology companies, Lena now writes blogs, whitepapers, and articles to help people understand the value of Aqua. She is passionate about simplifying complex things and engaging with audiences through storytelling. In her free time, Lena enjoys working out and watching beautiful Mediterranean sunsets.
Erin Stephan
Erin Stephan is the Principal Product Marketer for Aqua's Cloud Security portfolio. Erin has more than 10 years of product marketing experience in data protection and cybersecurity. She enjoys connecting with people, helping to articulate their challenges, and bringing products and solutions to the market that help solve those challenges. In her free time, you can find her catching a flight to a new city, shopping for new home décor, or taking a spin class.
Articles by The Cloud Native Experts
What Is Container Security?
As of 2024, more than sixty percent of businesses are using Kubernetes, and twenty percent deploy at least 5,000 individual containers. At most other organizations, the total number of containers in operation is in at least the hundreds.
A Guide to Managing Docker CVEs
Docker, a platform for building and running containers, offers plenty of benefits, like the ability to run applications with less resource overhead than conventional virtualization and to move apps easily between systems.
What Is Risk-Based Vulnerability Management?
In a world where security researchers discover more than 2,000 new vulnerabilities every month, it’s easy to feel like you’re drowning in vulnerability alerts – and to struggle to address them quickly. In fact, according to a 2023 study, it takes organizations between 88 and 208 days, on average, to patch vulnerabilities after discovering them.
Vulnerability Exploitability eXchange (VEX) - Definition & Use Cases
Finding vulnerabilities using a vulnerability scanner is one thing. Determining whether a vulnerability you've discovered actually presents a risk for your specific application and environment is quite another. It often happens that a vulnerability is not exploitable under a particular configuration, which means the vulnerability doesn't pose a serious risk.
7 Dimensions of Cloud Security, Top 10 Risks and How to Defend
Cloud computing is becoming the default option for enterprise IT. 65% of IT decision makers say that cloud computing is the default option for new computing projects. At the same time, cloud security concerns are mounting, with 82% of all security breaches involving data stored in the cloud. In a recent survey, 27% of organizations have experienced a public cloud security incident
Cloud Computing Security Architecture: 5 Key Components
A cloud security architecture is a broad set of policies, technologies, controls, and services that protect data, applications, and the associated infrastructure of cloud computing. It's designed to provide a secure environment where business-critical operations can be executed without the risk of data loss or leakage.
Cloud Security Assessment: 8-Step Process and Checklist
Cloud security assessment is the process of evaluating the security posture of a cloud computing environment, such as a cloud service provider's infrastructure, platform, or software services. The goal is to identify and assess security risks and vulnerabilities in the cloud environment, as well as to evaluate the effectiveness of the security controls and measures that have been implemented to mitigate those risks.
Digital Operational Resilience Act (DORA)
Financial institutions are a prime target for cyberattacks. According to the IBM X-Force Threat Intelligence Index, the finance industry has the second-highest frequency of cyber attacks (after manufacturing), with 18.5% of all cyber attacks targeted at financial and insurance organizations.