Aqua Security is featured in a list of tools to help secure software supply chains, along with a brief description of their offerings.
In this episode of DOS Won’t Hunt, Tsvi Korren, field CTO, Aqua Security joins thought leaders and Shane Snider, senior writer, InformationWeek to discuss ways cloud security must evolve.
Underlying processes within Git-based Source Code Management systems (SCMs) cause code to remain accessible even after being deleted or overwritten, continuing to expose previously leaked secrets, new Aqua Security research shows.
By scanning the most popular 100 organizations on Github, which collectively includes more than 50,000 publicly accessible repositories, Aqua researchers found active secrets from open source organizations and enterprises such as Cisco and Mozilla providing access to sensitive data and software.
BOSTON—June 26, 2024—Aqua Security, the pioneer in cloud native security, today revealed new research that shows how credentials, API tokens, and passkeys – collectively referred to as secrets – from organizations around the globe were exposed for years. By scanning the most popular 100 organizations on Github, which collectively includes more than 50,000 publicly accessible …
Two cloud security unicorns — Aqua Security and Orca Security — recently announced a partnership to integrate their runtime protection and visibility capabilities. Their CEOs emphasized that this collaboration will enable them to better compete with industry giants like Palo Alto Networks, while showcasing a superior alternative to the acquisition-driven model.
BOSTON, June 20, 2024 – Aqua Security, the pioneer in cloud native security, today announced that it has been granted a patent (12001543) for its Dynamic Threat Analysis (DTA) technology. This innovative capability assesses the risks that container images pose before they are run as containers in a live environment. With Aqua’s newly patented technology, …
Yakir Kadkoda, lead security researcher at Aqua Security, warned that “from this large amount of data, attackers can extract tokens and sensitive information, identify vulnerabilities by examining the code, and discover internal and external domain names and IP addresses.”