Knowledge

Aqua Security: Difference between revisions

Source ๐Ÿ“

833:</ref><ref>{{Cite web |last=Lyons |first=Jessica |date=4 February 2023 |title=HeadCrab bots pinch 1,000+ Redis servers to mine coins |url=https://www.theregister.com/2023/02/04/headcrab_botnet_aqua/ |access-date=2024-07-18 |website=]}}</ref><ref>{{Cite web |last= |first= |date=2021-07-31 |title=Aqua Security: 97% unaware of crucial cloud native security principles |url=https://venturebeat.com/security/aqua-security-97-percent-unaware-of-crucial-cloud-native-security-principles/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Spadafora |first=Anthony |date=2020-09-14 |title=Most cloud cyberattacks just want to mine cryptocurrency |url=https://www.techradar.com/news/most-cloud-cyberattacks-just-want-to-mine-cryptocurrency |access-date=2024-07-18 |website=] |language=en}}</ref><ref>{{Cite web |last=Vaughan-Nichols |first=Steven J. |date=2023-08-09 |title=Aqua Security Uncovers Major Kubernetes Attacks |url=https://thenewstack.io/aqua-security-uncovers-major-kubernetes-attacks/ |access-date=2024-07-18 |website=The New Stack |language=en-US}}</ref><ref>{{Cite web |last=Arghire |first=Ionut |date=June 27, 2024 |title='Phantom' Source Code Secrets Haunt Major Organizations |url=https://www.securityweek.com/phantom-source-code-secrets-haunt-major-organizations/ |access-date=2024-07-18 |website=SecurityWeek}}</ref><ref>{{Cite web |last=Bradley |first=Tony |title=Aqua Security Reveals Crucial Insights On Kinsing Malware |url=https://www.forbes.com/sites/tonybradley/2024/05/07/aqua-security-reveals-crucial-insights-on-kinsing-malware/ |access-date=2024-07-18 |website=Forbes |language=en}}</ref><ref>{{Cite web |date=2024-06-06 |title=Kinsing malware still on the rise |url=https://www.it-daily.net/en/it-security-en/cybercrime-en/kinsing-malware-continues-to-gain-ground |access-date=2024-07-18 |language=en-US}}</ref><ref>{{Cite web |title=Ubuntu 'command-not-found' tool can be abused to spread malware |url=https://www.bleepingcomputer.com/news/security/ubuntu-command-not-found-tool-can-be-abused-to-spread-malware/ |access-date=2024-07-18 |website=BleepingComputer |language=en-us}}</ref><ref>{{Cite web |title=Millions of GitHub repositories vulnerable to RepoJacking: Report |url=https://www.csoonline.com/article/643153/millions-of-github-repositories-vulnerable-to-repojacking-report.html |access-date=2024-07-18 |website=CSO Online |language=en}}</ref><ref>{{Cite web |date=2023-07-03 |title=Memory-based attacks increase as attackers dodge cloud defenses |url=https://betanews.com/2023/07/03/memory-based-attacks-increase-as-attackers-dodge-cloud-defenses/ |access-date=2024-07-18 |website=BetaNews |language=en}}</ref> 823:</ref><ref>{{Cite web |last=Lyons |first=Jessica |date=4 February 2023 |title=HeadCrab bots pinch 1,000+ Redis servers to mine coins |url=https://www.theregister.com/2023/02/04/headcrab_botnet_aqua/ |access-date=2024-07-18 |website=]}}</ref><ref>{{Cite web |last= |first= |date=2021-07-31 |title=Aqua Security: 97% unaware of crucial cloud native security principles |url=https://venturebeat.com/security/aqua-security-97-percent-unaware-of-crucial-cloud-native-security-principles/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Spadafora |first=Anthony |date=2020-09-14 |title=Most cloud cyberattacks just want to mine cryptocurrency |url=https://www.techradar.com/news/most-cloud-cyberattacks-just-want-to-mine-cryptocurrency |access-date=2024-07-18 |website=] |language=en}}</ref><ref>{{Cite web |last=Vaughan-Nichols |first=Steven J. |date=2023-08-09 |title=Aqua Security Uncovers Major Kubernetes Attacks |url=https://thenewstack.io/aqua-security-uncovers-major-kubernetes-attacks/ |access-date=2024-07-18 |website=The New Stack |language=en-US}}</ref><ref>{{Cite web |last=Arghire |first=Ionut |date=June 27, 2024 |title='Phantom' Source Code Secrets Haunt Major Organizations |url=https://www.securityweek.com/phantom-source-code-secrets-haunt-major-organizations/ |access-date=2024-07-18 |website=SecurityWeek}}</ref><ref>{{Cite web |last=Bradley |first=Tony |title=Aqua Security Reveals Crucial Insights On Kinsing Malware |url=https://www.forbes.com/sites/tonybradley/2024/05/07/aqua-security-reveals-crucial-insights-on-kinsing-malware/ |access-date=2024-07-18 |website=Forbes |language=en}}</ref><ref>{{Cite web |date=2024-06-06 |title=Kinsing malware still on the rise |url=https://www.it-daily.net/en/it-security-en/cybercrime-en/kinsing-malware-continues-to-gain-ground |access-date=2024-07-18 |language=en-US}}</ref><ref>{{Cite web |title=Ubuntu 'command-not-found' tool can be abused to spread malware |url=https://www.bleepingcomputer.com/news/security/ubuntu-command-not-found-tool-can-be-abused-to-spread-malware/ |access-date=2024-07-18 |website=BleepingComputer |language=en-us}}</ref><ref>{{Cite web |title=Millions of GitHub repositories vulnerable to RepoJacking: Report |url=https://www.csoonline.com/article/643153/millions-of-github-repositories-vulnerable-to-repojacking-report.html |access-date=2024-07-18 |website=CSO Online |language=en}}</ref><ref>{{Cite web |date=2023-07-03 |title=Memory-based attacks increase as attackers dodge cloud defenses |url=https://betanews.com/2023/07/03/memory-based-attacks-increase-as-attackers-dodge-cloud-defenses/ |access-date=2024-07-18 |website=BetaNews |language=en}}</ref> 1339:|url=https://www.darkreading.com/cloud-security/aqua-security-introduces-industry-first-kubernetes-vulnerability-scanning-with-trivy-kbom |access-date=2024-09-26 |website=www.darkreading.com |language=en}}</ref> It performs a proactive security assessment by scanning for common security issues and weaknesses, such as open ports, insecure configurations, and other potential risks.<ref>{{Cite web |last=Vaughan-Nichols |first=Steven J. |date=2023-08-09 |title=Aqua Security Uncovers Major Kubernetes Attacks |url=https://thenewstack.io/aqua-security-uncovers-major-kubernetes-attacks/ |access-date=2024-09-26 |website=The New Stack |language=en-US}}</ref> Kube-hunter is widely used by administrators and security teams to strengthen Kubernetes deployments, providing actionable insights to mitigate identified threats. Its ease of use and ability to simulate real-world attack scenarios make it a valuable tool for improving the security posture of Kubernetes environments.<ref>{{Cite book |last=Binnie |first=Chris |url=https://www.google.com.ua/books/edition/Cloud_Native_Security/iSw0EAAAQBAJ?hl=uk&gbpv=1&dq=Aqua+Security+hunter&pg=PT80&printsec=frontcover |title=Cloud Native Security |last2=McCune |first2=Rory |date=2021-06-18 |publisher=John Wiley & Sons |isbn=978-1-119-78224-7 |language=en}}</ref><ref>{{Cite book |last=Ortega |first=Candel Jose Manuel |url=https://www.google.com.ua/books/edition/DevOps_and_Containers_Security/D7tIEAAAQBAJ?hl=uk&gbpv=1&dq=Aqua+Security+hunter&pg=SA7-PA44&printsec=frontcover |title=DevOps and Containers Security |date=2020-03-23 |publisher=BPB Publications |isbn=978-93-89423-54-9 |language=en}}</ref><ref>{{Cite book |last=Huang |first=Kaizhe |url=https://www.google.com.ua/books/edition/Learn_Kubernetes_Security/fmDwDwAAQBAJ?hl=uk&gbpv=1&dq=Aqua+Security+hunter&pg=PA278&printsec=frontcover |title=Learn Kubernetes Security: Securely orchestrate, scale, and manage your microservices in Kubernetes deployments |last2=Jumde |first2=Pranjal |date=2020-07-09 |publisher=Packt Publishing Ltd |isbn=978-1-83921-218-5 |language=en}}</ref> 1100:
emerging cloud security trend offers 'good news' to businesses |url=https://venturebeat.com/security/why-an-emerging-cloud-security-trend-offers-good-news-to-businesses/ |access-date=2024-07-18 |website=VentureBeat |language=en-US}}</ref><ref>{{Cite web |title=Aqua Security buys CloudSploit, expands into cloud security {{!}} TechTarget |url=https://www.techtarget.com/searchitoperations/news/252473866/Aqua-Security-buys-CloudSploit-expands-into-cloud-security |access-date=2024-07-18 |website=IT Operations |language=en}}</ref> The company acquired Argon, a startup with capabilities for securing the software supply chain in December 2021.<ref>{{Cite web |last=Alspach |first=Kyle |date=2021-12-01 |title=Aqua Security acquires Argon to protect the software supply chain |url=https://venturebeat.com/security/aqua-security-acquires-argon-to-protect-the-software-supply-chain/ |access-date=2024-07-18 |website=VentureBeat |language=en-US}}</ref> The same year, Aqua acquired tfsec, an ] security scanner for ] (IaC). The acquisition brought integration of tfsec into Aqua Trivy, adding IaC security scanning capabilities. Tfsec's co-founders also joined Aqua following the acquisition.<ref>{{Cite web |last=Vizard |first=Mike |date=2021-07-12 |title=Aqua Security Acquires tfsec to Advance DevSecOps |url=https://devops.com/aqua-security-acquires-tfsec-to-advance-devsecops/ |access-date=2024-07-18 |website=DevOps.com |language=en-US}}</ref><ref>{{Cite web |date=2021-07-12 |title=Aqua Security buys open-source 'infrastructure as code' scanning tool tfsec |url=https://siliconangle.com/2021/07/12/aqua-security-buys-open-source-infrastructure-code-scanning-tool-tfsec/ |access-date=2024-07-18 |website=SiliconANGLE |language=en-US}}</ref>
1108:
emerging cloud security trend offers 'good news' to businesses |url=https://venturebeat.com/security/why-an-emerging-cloud-security-trend-offers-good-news-to-businesses/ |access-date=2024-07-18 |website=VentureBeat |language=en-US}}</ref><ref>{{Cite web |title=Aqua Security buys CloudSploit, expands into cloud security {{!}} TechTarget |url=https://www.techtarget.com/searchitoperations/news/252473866/Aqua-Security-buys-CloudSploit-expands-into-cloud-security |access-date=2024-07-18 |website=IT Operations |language=en}}</ref> The company acquired Argon, a startup with capabilities for securing the software supply chain in December 2021.<ref>{{Cite web |last=Alspach |first=Kyle |date=2021-12-01 |title=Aqua Security acquires Argon to protect the software supply chain |url=https://venturebeat.com/security/aqua-security-acquires-argon-to-protect-the-software-supply-chain/ |access-date=2024-07-18 |website=VentureBeat |language=en-US}}</ref> The same year, Aqua acquired tfsec, an ] security scanner for ] (IaC). The acquisition brought integration of tfsec into Aqua Trivy, adding IaC security scanning capabilities. Tfsec's co-founders also joined Aqua following the acquisition.<ref>{{Cite web |last=Vizard |first=Mike |date=2021-07-12 |title=Aqua Security Acquires tfsec to Advance DevSecOps |url=https://devops.com/aqua-security-acquires-tfsec-to-advance-devsecops/ |access-date=2024-07-18 |website=DevOps.com |language=en-US}}</ref><ref>{{Cite web |date=2021-07-12 |title=Aqua Security buys open-source 'infrastructure as code' scanning tool tfsec |url=https://siliconangle.com/2021/07/12/aqua-security-buys-open-source-infrastructure-code-scanning-tool-tfsec/ |access-date=2024-07-18 |website=SiliconANGLE |language=en-US
1307:|url=https://www.google.com.ua/books/edition/Proceedings_of_the_Sixth_International_S/RNOYEAAAQBAJ?hl=uk&gbpv=1&dq=Aqua+Security+Tracee&pg=PA116&printsec=frontcover |title=Proceedings of the Sixth International Scientific Conference โ€œIntelligent Information Technologies for Industryโ€ (IITIโ€™22) |last2=Sukhanov |first2=Andrey |last3=Akperov |first3=Imran |last4=Ozdemir |first4=Sebnem |date=2022-10-30 |publisher=Springer Nature |isbn=978-3-031-19620-1 |language=en}}</ref> Tracee provides deep visibility into the behavior of running processes, allowing users to identify anomalies, detect security threats, and conduct forensic investigations.<ref>{{Cite web |date=2024-08-08 |title=Aqua Security unveils Traceeshark at Black Hat Conference 2024 |url=https://www.securityinfowatch.com/cybersecurity/press-release/55131739/aqua-security-aqua-security-unveils-traceeshark-at-black-hat-conference-2024 |access-date=2024-09-26 |website=Security Info Watch |language=en}}</ref> It is particularly useful for monitoring containerized applications and uncovering potential vulnerabilities or exploits in real-time. With its focus on runtime security, Tracee is widely adopted in the DevOps and cloud-native communities to enhance system monitoring and threat detection.<ref>{{Cite book |last=Rice |first=Liz |url=https://www.google.com.ua/books/edition/Learning_eBPF/OqCyEAAAQBAJ?hl=uk&gbpv=1&dq=Aqua+Security+Tracee&pg=PT194&printsec=frontcover |title=Learning eBPF: Programming the Linux Kernel for Enhanced Observability, Networking, and Security |date=2023-03-07 |publisher="O'Reilly Media, Inc." |isbn=978-1-0981-3508-9 |language=en}}</ref> 884:.<ref name=":3">{{Cite web |last=Alspach |first=Kyle |date=2022-01-21 |title='Mass demand' is building for cloud-native security, Aqua CEO says |url=https://venturebeat.com/security/mass-demand-is-building-for-cloud-native-security-aqua-ceo-says/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Wiggers |first=Kyle |date=2021-03-10 |title=Aqua Security protects containerized apps and infrastructure, raises $ 135M |url=https://venturebeat.com/business/aqua-security-protects-containerized-apps-and-infrastructure-raises-135m/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Janofsky |first=Adam |date=May 6, 2019 |title=Container Technology Brings Security Surprises |url=https://www.wsj.com/articles/container-technology-brings-security-surprises-11557160749 |access-date=July 17, 2024 |website=]}}</ref> The company initially focused on ] workload protection and added serverless and VMs in 2017 to achieve comprehensive ] (CWPP) capabilities.<ref>{{Cite web |last=Alspach |first=Kyle |date=2021-11-23 |title=Why an emerging cloud security trend offers 'good news' to businesses |url=https://venturebeat.com/security/why-an-emerging-cloud-security-trend-offers-good-news-to-businesses/ |access-date=2024-07-18 |website=] |language=en-US}}</ref> 873:|url=https://venturebeat.com/security/mass-demand-is-building-for-cloud-native-security-aqua-ceo-says/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Wiggers |first=Kyle |date=2021-03-10 |title=Aqua Security protects containerized apps and infrastructure, raises $ 135M |url=https://venturebeat.com/business/aqua-security-protects-containerized-apps-and-infrastructure-raises-135m/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Janofsky |first=Adam |date=May 6, 2019 |title=Container Technology Brings Security Surprises |url=https://www.wsj.com/articles/container-technology-brings-security-surprises-11557160749 |access-date=July 17, 2024 |website=]}}</ref> The company initially focused on ] workload protection and added serverless and VMs in 2017 to achieve comprehensive ] (CWPP) capabilities.<ref>{{Cite web |last=Alspach |first=Kyle |date=2021-11-23 |title=Why an emerging cloud security trend offers 'good news' to businesses |url=https://venturebeat.com/security/why-an-emerging-cloud-security-trend-offers-good-news-to-businesses/ |access-date=2024-07-18 |website=] |language=en-US}}</ref> 914:
Security Raises $ 9 Million |url=https://www.wsj.com/articles/aqua-security-raises-9-million-1474975806 |access-date=July 17, 2024 |website=]}}</ref> It was followed by a $ 25 million series B funding in 2017.<ref name=":2">{{Cite web |last=Wiggers |first=Kyle |date=2019-04-03 |title=Aqua Security raises $ 62 million for containerized computing tools |url=https://venturebeat.com/business/aqua-security-raises-62-million-for-containerized-computing-tools/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite news |date=2017-07-18 |title=The Latest App Coding Trend Is a Hacker's Dream |url=https://www.bloomberg.com/news/articles/2017-07-18/the-latest-app-coding-trend-is-a-hacker-s-dream |access-date=2024-07-18 |work=Bloomberg.com |language=en}}</ref> In the spring of 2017 the company opened its ] office.<ref>{{Cite web |date=2024-01-04 |title=Israeli tech unicorn Aqua Security raises $ 60M for its cloud-based cybersecurity approach โ€” TFN |url=https://techfundingnews.com/israeli-tech-unicorn-aqua-security-raises-60m-for-its-cloud-based-cybersecurity-approach/ |access-date=2024-07-18 |website=Tech Funding News |language=en}}</ref>
906:
Security Raises $ 9 Million |url=https://www.wsj.com/articles/aqua-security-raises-9-million-1474975806 |access-date=July 17, 2024 |website=]}}</ref> It was followed by a $ 25 million series B funding in 2017.<ref name=":2">{{Cite web |last=Wiggers |first=Kyle |date=2019-04-03 |title=Aqua Security raises $ 62 million for containerized computing tools |url=https://venturebeat.com/business/aqua-security-raises-62-million-for-containerized-computing-tools/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite news |date=2017-07-18 |title=The Latest App Coding Trend Is a Hacker's Dream |url=https://www.bloomberg.com/news/articles/2017-07-18/the-latest-app-coding-trend-is-a-hacker-s-dream |access-date=2024-07-18 |work=Bloomberg.com |language=en}}</ref> In the spring of 2017 the company opened its ] office.<ref>{{Cite web |date=2024-01-04 |title=Israeli tech unicorn Aqua Security raises $ 60M for its cloud-based cybersecurity approach โ€” TFN |url=https://techfundingnews.com/israeli-tech-unicorn-aqua-security-raises-60m-for-its-cloud-based-cybersecurity-approach/ |access-date=2024-07-18 |website=Tech Funding News |language=en}}</ref>
1275:|first=Luigi |url=https://www.google.com.ua/books/edition/Security_for_Containers_and_Kubernetes/uwHCEAAAQBAJ?hl=uk&gbpv=1&dq=Aqua+Security+Trivy&pg=PA391&printsec=frontcover |title=Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments (English Edition) |date=2023-05-31 |publisher=BPB Publications |isbn=978-93-5551-843-9 |language=en}}</ref> Trivy scans a variety of popular container base images, such as Alpine, CentOS, and Ubuntu, and its integration with major CI/CD platforms like Jenkins and GitLab.<ref>{{Citation |title=aquasecurity/trivy-plugin-aqua |date=2024-09-24 |url=https://github.com/aquasecurity/trivy-plugin-aqua |access-date=2024-09-26 |publisher=Aqua Security}}</ref> Trivy's ability to provide real-time vulnerability detection makes it an essential component of DevOps security.<ref>{{Cite web |last=Giannakopoulosj |date=2023-06-23 |title=SAST โ€” Security Scan with AquaSec Trivy |url=https://medium.com/@giannakopoulosj/security-scan-with-trivy-f9f87881493b |access-date=2024-09-26 |website=Medium |language=en}}</ref> 806:">{{Cite web |last=Lardinois |first=Frederic |date=2021-03-10 |title=Aqua Security raises $ 135M at a $ 1B valuation for its cloud native security platform |url=https://techcrunch.com/2021/03/10/aqua-security-raises-135m-at-a-1b-valuation-for-its-cloud-native-security-service/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Alspach |first=Kyle |date=2022-03-17 |title=Cybersecurity has 53 unicorns. Here are 10 to watch |url=https://venturebeat.com/security/cybersecurity-has-53-unicorns-here-are-10-to-watch/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last1=Joyner |first1=April |last2=Bort |first2=Julie |title=Over 340 US startups became unicorns in a record-breaking 2021. Here's the full list and their investors. |url=https://www.businessinsider.com/us-unicorn-list-startups-venture-capital-investors-2021-12 |access-date=2024-07-18 |website=] |language=en-US}}</ref> 527:">{{Cite web |last=Lardinois |first=Frederic |date=2021-03-10 |title=Aqua Security raises $ 135M at a $ 1B valuation for its cloud native security platform |url=https://techcrunch.com/2021/03/10/aqua-security-raises-135m-at-a-1b-valuation-for-its-cloud-native-security-service/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Alspach |first=Kyle |date=2022-03-17 |title=Cybersecurity has 53 unicorns. Here are 10 to watch |url=https://venturebeat.com/security/cybersecurity-has-53-unicorns-here-are-10-to-watch/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last1=Joyner |first1=April |last2=Bort |first2=Julie |title=Over 340 US startups became unicorns in a record-breaking 2021. Here's the full list and their investors. |url=https://www.businessinsider.com/us-unicorn-list-startups-venture-capital-investors-2021-12 |access-date=2024-07-18 |website=] |language=en-US}}</ref> 1179:|title=Aqua Security Tracee |date=2024-07-18 |url=https://github.com/aquasecurity/tracee |access-date=2024-07-18 |publisher=]}}</ref> Trivy Vulnerability Scanner was acquired by Aqua open source team in 2019. Teppei Fukuda, the developer behind Trivy, joined the Aqua Security team after the acquisition. Other tools include Kube-bench, Kube-hunter, and chain-bench.<ref>{{Cite web |last=Zorz |first=Mirko |date=2023-11-08 |title=Aqua Trivy open-source security scanner now finds Kubernetes security risks |url=https://www.helpnetsecurity.com/2023/11/08/aqua-trivy-open-source-security-scanner/ |access-date=2024-07-18 |website=Help Net Security |language=en-US}}</ref><ref>{{Cite web |title=8 vulnerability management tools to consider in 2023 {{!}} TechTarget |url=https://www.techtarget.com/searchsecurity/tip/Vulnerability-management-tools-to-consider |access-date=2024-07-18 |website=Security |language=en}}</ref> 1171:|title=Aqua Security Tracee |date=2024-07-18 |url=https://github.com/aquasecurity/tracee |access-date=2024-07-18 |publisher=]}}</ref> Trivy Vulnerability Scanner was acquired by Aqua open source team in 2019. Teppei Fukuda, the developer behind Trivy, joined the Aqua Security team after the acquisition. Other tools include Kube-bench, Kube-hunter, and chain-bench.<ref>{{Cite web |last=Zorz |first=Mirko |date=2023-11-08 |title=Aqua Trivy open-source security scanner now finds Kubernetes security risks |url=https://www.helpnetsecurity.com/2023/11/08/aqua-trivy-open-source-security-scanner/ |access-date=2024-07-18 |website=Help Net Security |language=en-US}}</ref><ref>{{Cite web |title=8 vulnerability management tools to consider in 2023 {{!}} TechTarget |url=https://www.techtarget.com/searchsecurity/tip/Vulnerability-management-tools-to-consider |access-date=2024-07-18 |website=Security |language=en}}</ref> 1211:
popular open-source tools like Trivy for vulnerability scanning, Kube-hunter for Kubernetes security testing, and Tracee for runtime security. These features make it a widely used option for businesses looking to secure their cloud environments.<ref>{{Cite web |last=Alspach |first=Kyle |date=2021-11-23 |title=Why an emerging cloud security trend offers โ€˜good newsโ€™ to businesses |url=https://venturebeat.com/security/why-an-emerging-cloud-security-trend-offers-good-news-to-businesses/ |access-date=2024-09-25 |website=VentureBeat |language=en-US}}</ref><ref>{{Cite book |last=Bhuyan |first=Aditya Pratap |url=https://books.google.com/books/about/Mastering_Cloud_Native.html?id=v1oWEQAAQBAJ&redir_esc=y |title=Mastering Cloud Native: A Comprehensive Guide to Containers, DevOps, CI/CD, and Microservices |date=2024-07-26 |publisher=Aditya Pratap Bhuyan |language=en}}</ref>
1152:
enforcement. Aquaโ€™s image scanning tool checks container images for vulnerabilities and malware, ensuring only trusted images are deployed in production. Its runtime protection monitors container behavior in real time, detecting and mitigating threats, while the platform enforces compliance with industry standards by integrating with CI/CD pipelines and container orchestration tools like Kubernetes.<ref>{{Cite book |last=Bhuyan |first=Aditya Pratap |url=https://www.google.de/books/edition/Mastering_Cloud_Native/v1oWEQAAQBAJ?hl=en&gbpv=1&dq=%22aqua+security%22&pg=PA149&printsec=frontcover |title=Mastering Cloud Native: A Comprehensive Guide to Containers, DevOps, CI/CD, and Microservices |date=2024-07-26 |publisher=Aditya Pratap Bhuyan |language=en}}</ref>
1243:
risk |url=https://www.techradar.com/news/misconfigured-registries-are-putting-hundreds-of-top-businesses-at-risk |access-date=2024-09-26 |website=TechRadar |language=en}}</ref><ref>{{Cite web |last=Stadler |first=Tobias |date=7 February 2023 |title=Antivirenprogramme chancenlos: Sicherheitsexperten warnen vor neuer Malware |url=https://www.chip.de/news/Sicherheitsexperten-warnen-vor-neuer-Malware-Antivirenprogramme-haben-keine-Chance_184642479.html |website=Chip Magazine}}</ref>
1110:}}</ref> Aqua Security's cloud-native application protection platform (CNAPP) was highlighted by Gartner Inc. as having a "high impact" in its 2022 top strategic technology trends, although the firm also projected that widespread adoption of CNAPP could take five to ten years.<ref>{{Cite web |title=Aqua Security makes its largest acquisition |url=https://www.bizjournals.com/boston/news/2021/12/01/aqua-security-acquires-argon.html |access-date=2024-09-25 |website=www.bizjournals.com 1956:(eBPF) technology. Tracee provides deep visibility into the behavior of running processes, allowing users to identify anomalies, detect security threats, and conduct forensic investigations. It is particularly useful for monitoring containerized applications and uncovering potential vulnerabilities or exploits in real-time. With its focus on runtime security, Tracee is widely adopted in the DevOps and cloud-native communities to enhance system monitoring and threat detection. 1698: 1902:(IaC). The acquisition brought integration of tfsec into Aqua Trivy, adding IaC security scanning capabilities. Tfsec's co-founders also joined Aqua following the acquisition. Aqua Security's cloud-native application protection platform (CNAPP) was highlighted by Gartner Inc. as having a "high impact" in its 2022 top strategic technology trends, although the firm also projected that widespread adoption of CNAPP could take five to ten years. 1480: 1439: 992:><ref>{{Cite web |last=Holmes |first=Aaron |title=Investors sunk billions into these 14 cybersecurity startups as the pandemic and massive hacks like SolarWinds made the industry more vital than ever |url=https://www.businessinsider.com/cybersecurity-startups-unicorns-billion-dollar-valuation-snyk-sentinelone-netskope-cato-2021-4 |access-date=2024-07-18 |website=Business Insider |language=en-US}}</ref> 71: 1911:
enforcement. Aquaโ€™s image scanning tool checks container images for vulnerabilities and malware, ensuring only trusted images are deployed in production. Its runtime protection monitors container behavior in real time, detecting and mitigating threats, while the platform enforces compliance with industry standards by integrating with CI/CD pipelines and container orchestration tools like Kubernetes.
1546: 1965:
configurations, and other potential risks. Kube-hunter is widely used by administrators and security teams to strengthen Kubernetes deployments, providing actionable insights to mitigate identified threats. Its ease of use and ability to simulate real-world attack scenarios make it a valuable tool for improving the security posture of Kubernetes environments.
962:
billions into these 14 cybersecurity startups as the pandemic and massive hacks like SolarWinds made the industry more vital than ever |url=https://www.businessinsider.com/cybersecurity-startups-unicorns-billion-dollar-valuation-snyk-sentinelone-netskope-cato-2021-4 |access-date=2024-07-18 |website=Business Insider |language=en-US}}</ref>
1942:
Aqua Security's Trivy is a comprehensive, open-source vulnerability scanner used to detect security flaws in container images. Featured in the book Kubernetes in Production Best Practices, Trivy is highlighted as a critical tool for securing CI/CD pipelines. Trivy scans a variety of popular container
1242:
Aqua Nautilus is the dedicated research team within Aqua Security, focused on identifying and analyzing security threats in cloud-native environments.<ref>{{Cite web |last=published |first=Sead Fadilpaลกiฤ‡ |date=2023-04-24 |title=Misconfigured registries are putting hundreds of top businesses at
1178:
Aqua Security has an open-source development team responsible for several open-source tools, including Trivy<ref>{{Citation |title=Aqua Security Trivy |date=2024-07-18 |url=https://github.com/aquasecurity/trivy |access-date=2024-07-18 |publisher=]}}</ref> and Tracee.<ref>{{Citation
1170:
Aqua Security has an open-source development team responsible for several open-source tools, including Trivy<ref>{{Citation |title=Aqua Security Trivy |date=2024-07-18 |url=https://github.com/aquasecurity/trivy |access-date=2024-07-18 |publisher=]}}</ref> and Tracee.<ref>{{Citation
1923:
The Aqua Platform is a cloud-native security solution that helps protect applications, workloads, and infrastructure across multiple cloud environments. It includes tools for vulnerability scanning, runtime protection, and compliance management throughout the development process. Aqua also provides
1210:
The Aqua Platform is a cloud-native security solution that helps protect applications, workloads, and infrastructure across multiple cloud environments. It includes tools for vulnerability scanning, runtime protection, and compliance management throughout the development process. Aqua also provides
961:
Aqua raised $ 30 million in a series D round closed in May 2020.<ref name=":0" /> In March 2021 Aqua raised $ 135 million in series E funding, led by ION Crossover Partners at a $ 1 billion valuation.<ref name=":1" /><ref>{{Cite web |last=Holmes |first=Aaron |title=Investors sunk
1914:
Aqua Security has an open-source development team responsible for several open-source tools, including Trivy and Tracee. Trivy Vulnerability Scanner was acquired by Aqua open source team in 2019. Teppei Fukuda, the developer behind Trivy, joined the Aqua Security team after the acquisition. Other
1794:
is a cloud-native application protection platform and an eponymous company that develops security solutions for applications and infrastructure. Founded in Israel in 2015, the company reached a $ 1 billion valuation in 2021. Aqua Security is known for its key open-source tools, including Trivy, a
1021:
In June 2022 Aqua Security and the ] (CIS) released the first formal guidelines for ] security. CIS Software Supply Chain Security Guide provides enterprises with foundational recommendations for securing the software supply chain against threat actors.<ref>{{Cite web |last=Keary |first=Tim
1013:
In June 2022 Aqua Security and the ] (CIS) released the first formal guidelines for ] security. CIS Software Supply Chain Security Guide provides enterprises with foundational recommendations for securing the software supply chain against threat actors.<ref>{{Cite web |last=Keary |first=Tim
913:
In September 2016, the company raised $ 9 million in Series A funding led by ]. Previous investors TLV Partners and ] also participated in the round, bringing Aqua's total investment to date to $ 13.5 million.<ref>{{Cite web |last=Zakrzewski |first=Cat |date=September 27, 2016 |title=Aqua
905:
In September 2016, the company raised $ 9 million in Series A funding led by ]. Previous investors TLV Partners and ] also participated in the round, bringing Aqua's total investment to date to $ 13.5 million.<ref>{{Cite web |last=Zakrzewski |first=Cat |date=September 27, 2016 |title=Aqua
1964:
Kube-hunter is an open-source Kubernetes security tool developed by Aqua Security, designed to identify vulnerabilities and misconfigurations in Kubernetes clusters. It performs a proactive security assessment by scanning for common security issues and weaknesses, such as open ports, insecure
1274:
Aqua Security's Trivy is a comprehensive, open-source vulnerability scanner used to detect security flaws in container images. Featured in the book Kubernetes in Production Best Practices, Trivy is highlighted as a critical tool for securing CI/CD pipelines.<ref>{{Cite book |last=Aversa
1107:
In 2019 Aqua Security acquired CloudSploit, a cloud security posture management company, which tracks and enforces practices on the security of user and service accounts on public cloud platforms such as ], ] and ].<ref>{{Cite web |last=Alspach |first=Kyle |date=2021-11-23 |title=Why an
1099:
In 2019 Aqua Security acquired CloudSploit, a cloud security posture management company, which tracks and enforces practices on the security of user and service accounts on public cloud platforms such as ], ] and ].<ref>{{Cite web |last=Alspach |first=Kyle |date=2021-11-23 |title=Why an
1910:
Aqua Security offers a range of security features designed for containerized and cloud-native environments through its Aqua Platform. This platform provides protection for applications deployed in containers, focusing on key areas such as image scanning, runtime protection, and compliance
1151:
Aqua Security offers a range of security features designed for containerized and cloud-native environments through its Aqua Platform. This platform provides protection for applications deployed in containers, focusing on key areas such as image scanning, runtime protection, and compliance
1338:
Kube-hunter is an open-source Kubernetes security tool developed by Aqua Security, designed to identify vulnerabilities and misconfigurations in Kubernetes clusters.<ref>{{Cite web |title=Aqua Security Introduces Industry-First Kubernetes Vulnerability Scanning With Trivy KBOM
1306:
Tracee is an open-source runtime security and forensics tool developed by Aqua Security. It is designed to detect and analyze suspicious activity in cloud-native environments by leveraging Linux's extended ] (eBPF) technology.<ref>{{Cite book |last=Kovalev |first=Sergey
939:
Aqua Security raised $ 62 million in 2019 in funding led by ], with participation from ], M12 (]), TLV Partners, and Shlomo Kramer.<ref name=":2" /><ref>{{Cite web |last=Miller |first=Ron |date=2019-04-03 |title=Container security startup Aqua lands $ 62M Series C
931:
Aqua Security raised $ 62 million in 2019 in funding led by ], with participation from ], M12 (]), TLV Partners, and Shlomo Kramer.<ref name=":2" /><ref>{{Cite web |last=Miller |first=Ron |date=2019-04-03 |title=Container security startup Aqua lands $ 62M Series C
1811:, Israel in 2015 by Dror Davidoff, who serves as the CEO and Amir Jerbi, CTO. They both have experience in high-tech industries. Jerbi specializes in the technological side of operations, while Davidoff focuses on business and marketing. The company initially focused on 1053:
In January 2024, the company raised $ 60 million, extending its Series E round of funding to $ 195 million.<ref name=":4">{{Cite web |last=Sawers |first=Paul |date=2024-01-03 |title=Cloud-native cybersecurity startup Aqua Security raises $ 60M and remains a unicorn
1045:
In January 2024, the company raised $ 60 million, extending its Series E round of funding to $ 195 million.<ref name=":4">{{Cite web |last=Sawers |first=Paul |date=2024-01-03 |title=Cloud-native cybersecurity startup Aqua Security raises $ 60M and remains a unicorn
820:
research team, Aqua Nautilus, focused on ] research of the cloud native ecosystem.<ref>{{Cite web |last=Lyons |first=Jessica |date=16 August 2023 |title=PowerShell? More like PowerHell: Microsoft won't fix flaws in package gallery ripe for supply chain attacks
541:
research team, Aqua Nautilus, focused on ] research of the cloud native ecosystem.<ref>{{Cite web |last=Lyons |first=Jessica |date=16 August 2023 |title=PowerShell? More like PowerHell: Microsoft won't fix flaws in package gallery ripe for supply chain attacks
161: 1022:|date=2022-06-22 |title=Aqua Security and CIS release first formal guidelines for software supply chain security |url=https://venturebeat.com/security/software-supply-chain-security/ |access-date=2024-07-18 |website=VentureBeat |language=en-US}}</ref> 1014:|date=2022-06-22 |title=Aqua Security and CIS release first formal guidelines for software supply chain security |url=https://venturebeat.com/security/software-supply-chain-security/ |access-date=2024-07-18 |website=VentureBeat |language=en-US}}</ref> 872:
Aqua Security was founded in ], Israel in 2015 by Dror Davidoff, who serves as the CEO and Amir Jerbi, CTO.<ref name=":3">{{Cite web |last=Alspach |first=Kyle |date=2022-01-21 |title='Mass demand' is building for cloud-native security, Aqua CEO says
63: 1924:
popular open-source tools like Trivy for vulnerability scanning, Kube-hunter for Kubernetes security testing, and Tracee for runtime security. These features make it a widely used option for businesses looking to secure their cloud environments.
1943:
base images, such as Alpine, CentOS, and Ubuntu, and its integration with major CI/CD platforms like Jenkins and GitLab. Trivy's ability to provide real-time vulnerability detection makes it an essential component of DevOps security.
2888: 3347: 974:
web |last1=Elder |first1=Jeff |last2=Vedantam |first2=Keerthi |title=Developer security is booming as hack-prevention starts earlier than ever: Here are the 25 startups you need to know in this red-hot space
3273: 1951:
Tracee is an open-source runtime security and forensics tool developed by Aqua Security. It is designed to detect and analyze suspicious activity in cloud-native environments by leveraging Linux's extended
1881:
In 2019 Aqua Security acquired CloudSploit, a cloud security posture management company, which tracks and enforces practices on the security of user and service accounts on public cloud platforms such as
3502: 1830:
also participated in the round, bringing Aqua's total investment to date to $ 13.5 million. It was followed by a $ 25 million series B funding in 2017. In the spring of 2017 the company opened its
3529: 1054:|url=https://techcrunch.com/2024/01/03/cloud-native-cybersecurity-startup-aqua-security-raises-60m-and-remains-a-unicorn/ |access-date=2024-07-18 |website=TechCrunch |language=en-US}}</ref> 1046:|url=https://techcrunch.com/2024/01/03/cloud-native-cybersecurity-startup-aqua-security-raises-60m-and-remains-a-unicorn/ |access-date=2024-07-18 |website=TechCrunch |language=en-US}}</ref> 15: 3475: 3069: 1852:
Aqua raised $ 30 million in a series D round closed in May 2020. In March 2021 Aqua raised $ 135 million in series E funding, led by ION Crossover Partners at a $ 1 billion valuation.
3399: 3373: 818:
its key open-source tools, including Trivy, a vulnerability scanner, Kube-hunter, a Kubernetes security testing tool, and Tracee, a runtime security and forensic tool. Also, it has a
1795:
vulnerability scanner, Kube-hunter, a Kubernetes security testing tool, and Tracee, a runtime security and forensic tool. Also, it has a research team, Aqua Nautilus, focused on
979:/www.businessinsider.com/startups-devsecopps-developer-security-operations-cybersecurity-snyk-contrast-auth0-2020-11 |access-date=2024-07-18 |website=] |language=en-US}}</ref 990:/techcrunch.com/2021/03/10/aqua-security-raises-135m-at-a-1b-valuation-for-its-cloud-native-security-service/ |access-date=2024-07-18 |website=] |language=en-US}}</ref 1863:
security. CIS Software Supply Chain Security Guide provides enterprises with foundational recommendations for securing the software supply chain against threat actors.
3425: 1490: 2790: 882:. They both have experience in high-tech industries. Jerbi specializes in the technological side of operations, while Davidoff focuses on business and marketing 179: 2736: 986:
web |last=Lardinois |first=Frederic |date=2021-03-10 |title=Aqua Security raises $ 135M at a $ 1B valuation for its cloud native security platform |url=https:
3254: 940:|url=https://techcrunch.com/2019/04/03/container-security-startup-aqua-lands-62m-series-c/ |access-date=2024-07-18 |website=] |language=en-US}}</ref> 932:|url=https://techcrunch.com/2019/04/03/container-security-startup-aqua-lands-62m-series-c/ |access-date=2024-07-18 |website=] |language=en-US}}</ref> 2945: 1894:. The company acquired Argon, a startup with capabilities for securing the software supply chain in December 2021. The same year, Aqua acquired tfsec, an 217: 144: 168: 2683: 1932:
Aqua Nautilus is the dedicated research team within Aqua Security, focused on identifying and analyzing security threats in cloud-native environments.
2840: 2791:"Investors sunk billions into these 14 cybersecurity startups as the pandemic and massive hacks like SolarWinds made the industry more vital than ever" 2763: 2161: 3620: 2469: 2400: 2295: 2445: 3610: 3019: 2519: 1615: 981:> In March 2021 Aqua raised $ 135 million in series E funding, led by ION Crossover Partners at a $ 1 billion valuation.<ref name=":1" 2737:"Developer security is booming as hack-prevention starts earlier than ever: Here are the 25 startups you need to know in this red-hot space" 2094: 3229: 1505: 3187: 2921: 2574: 1869:
The company's global headquarters is located in Ramat Gan, Israel, with US headquarters in Boston, Massachusetts, and R&D Center in
1388:* Liz Rice, ''Container Security: Fundamental Technology Concepts that Protect Containerized Applications'', 2020 {{ISBN|9781492056706}} 175: 3275:
Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments (English Edition)
2970: 2632: 2658: 72: 2424: 2019: 3212: 2493: 2140: 156: 93: 31: 28: 1625:
Feel free to improve the article, but do not remove this notice before the discussion is closed. For more information, see the
3615: 3605: 3539: 3512: 3485: 3409: 3357: 3283: 2215: 1669: 3600: 3162: 186: 3349:
Proceedings of the Sixth International Scientific Conference โ€œIntelligent Information Technologies for Industryโ€ (IITIโ€™22)
2546: 2323: 1641: 2709: 1558: 3044: 2188: 1983: 1816: 111: 3138: 2375: 677:
02 |title=ืืงื•ื•ื” ืกืงื™ื•ืจื™ื˜ื™ ืจื•ื›ืฉืช ื—ื‘ืจื” ื™ืฉืจืืœื™ืช ืฉืชื’ืŸ ืขืœ ืžืคืชื—ื™ ืชื•ื›ื ื” |url=https://www.ice.co.il/finance/news/article/836868
1995: 1648: 1590: 1527: 1466: 821:|url=https://www.theregister.com/2023/08/16/microsoft_powershell_gallery_flaws/ |access-date=2024-07-18 |website=]}} 542:|url=https://www.theregister.com/2023/08/16/microsoft_powershell_gallery_flaws/ |access-date=2024-07-18 |website=]}} 152: 89: 1566: 1509: 100: 3531:
Learn Kubernetes Security: Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
1655: 1562: 1452: 2243:"PowerShell? More like PowerHell: Microsoft won't fix flaws in package gallery ripe for supply chain attacks" 2242: 132:
Altered title. Add: authors 1-1. Removed parameters. Some additions/deletions were parameter name changes. |
3322: 1866:
In January 2024, the company raised $ 60 million, extending its Series E round of funding to $ 195 million.
1856: 1812: 880:
Aqua Security was founded in ], Israel in 2015 by Dror Davidoff, who serves as the CEO and Amir Jerbi, CTO
3450: 2350: 2216:"Over 340 US startups became unicorns in a record-breaking 2021. Here's the full list and their investors" 1637: 2601: 1842: 1626: 2995: 2889:"Aqua Security announces $ 135 million series E funding, to double Hyderabad R&D centre headcount" 1620: 2815: 2684:"Israeli tech unicorn Aqua Security raises $ 60M for its cloud-based cybersecurity approach โ€” TFN" 3401:
Learning eBPF: Programming the Linux Kernel for Enhanced Observability, Networking, and Security
2269: 1953: 1899: 210: 107: 3214:
Mastering Cloud Native: A Comprehensive Guide to Containers, DevOps, CI/CD, and Microservices
3071:
Mastering Cloud Native: A Comprehensive Guide to Containers, DevOps, CI/CD, and Microservices
1860: 1823: 66: 3426:"Aqua Security Introduces Industry-First Kubernetes Vulnerability Scanning With Trivy KBOM" 1662: 2816:"Aqua Security and CIS release first formal guidelines for software supply chain security" 8: 1887: 2864: 2764:"Aqua Security raises $ 135M at a $ 1B valuation for its cloud native security platform" 2162:"Aqua Security raises $ 135M at a $ 1B valuation for its cloud native security platform" 1497: 1458: 1406:* Chris Binnie and Rory McCune, ''Cloud Native Security,'' 2021 {{ISBN|978-1119782230}} 1399:* Chris Binnie and Rory McCune, ''Cloud Native Security,'' 2021 {{ISBN|978-1119782230}} 3535: 3508: 3481: 3405: 3353: 3279: 2896: 2841:"Cloud-native cybersecurity startup Aqua Security raises $ 60M and remains a unicorn" 1991: 1979: 1796: 3299: 2114: 2069: 2045: 2741: 2220: 1838: 16: 1815:
workload protection and added serverless and VMs in 2017 to achieve comprehensive
3346:
Kovalev, Sergey; Sukhanov, Andrey; Akperov, Imran; Ozdemir, Sebnem (2022-10-30).
1891: 1422:* Luigi Aversa, ''Security for Containers and Kubernetes {{ISBN|9789355518439}}'' 1415:* Luigi Aversa, ''Security for Containers and Kubernetes {{ISBN|9789355518439}}'' 969:
Aqua raised $ 30 million in a series D round closed in May 2020.<ref name=":0"
1501: 137: 118: 3594: 3255:"Antivirenprogramme chancenlos: Sicherheitsexperten warnen vor neuer Malware" 3139:"Aqua Trivy open-source security scanner now finds Kubernetes security risks" 3020:"Aqua Security buys open-source 'infrastructure as code' scanning tool tfsec" 2900: 2520:"Aqua Security protects containerized apps and infrastructure, raises $ 135M" 1827: 1822:
In September 2016, the company raised $ 9 million in Series A funding led by
133: 47: 2274: 2247: 205: 2946:"Aqua Security buys CloudSploit, expands into cloud security | TechTarget" 2095:"ืืงื•ื•ื” ืกืงื™ื•ืจื™ื˜ื™ ื”ื•ืคื›ืช ืœื—ื“ ืงืจืŸ: "ื™ืฉ 'ื”ื™ื™ืค' ื‘ืขื ืฃ, ืื‘ืœ ืœื ื• ื™ืฉ ื‘ื™ืฆื•ืขื™ื ื—ื–ืงื™ื"" 3581: 3230:"Misconfigured registries are putting hundreds of top businesses at risk" 3111: 2637: 2579: 2524: 2300: 2193: 2024: 1895: 3572: 3085: 2296:"Aqua Security: 97% unaware of crucial cloud native security principles" 3188:"Why an emerging cloud security trend offers 'good news' to businesses" 2922:"Why an emerging cloud security trend offers 'good news' to businesses" 2768: 2714: 2575:"Why an emerging cloud security trend offers 'good news' to businesses" 2166: 1697: 2633:"Aqua Security raises $ 62 million for containerized computing tools" 2328: 2145: 2099: 1870: 1846: 1808: 1740: 669:
fdfbb0b00000 |website=]}}</ref><ref>{{Cite web |date=2021
3562: 2020:"'Mass demand' is building for cloud-native security, Aqua CEO says" 3163:"8 vulnerability management tools to consider in 2023 | TechTarget" 2971:"Aqua Security acquires Argon to protect the software supply chain" 2470:"Millions of GitHub repositories vulnerable to RepoJacking: Report" 2070:"Dror Davidoff, Aqua Security Software Ltd: Profile and Biography" 1555:
may have been created or edited in return for undisclosed payments
2494:"Memory-based attacks increase as attackers dodge cloud defenses" 2446:"Ubuntu 'command-not-found' tool can be abused to spread malware" 3374:"Aqua Security unveils Traceeshark at Black Hat Conference 2024" 3585: 3576: 3117: 3091: 2046:"Amir Jerbi, Aqua Security Software Ltd: Profile and Biography" 1883: 1831: 1744: 3345: 2141:"ืืงื•ื•ื” ืกืงื™ื•ืจื™ื˜ื™ ื’ื™ื™ืกื” 60 ืžื™ืœื™ื•ืŸ ื“ื•ืœืจ ื‘ืฉื•ื•ื™ ืฉืœ ืœืคื ื™ ืฉืœื•ืฉ ืฉื ื™ื" 1675:%5B%5BWikipedia%3AArticles+for+deletion%2FAqua+Security%5D%5D 1837:
Aqua Security raised $ 62 million in 2019 in funding led by
1545: 3557: 2401:"Aqua Security Reveals Crucial Insights On Kinsing Malware" 2324:"Most cloud cyberattacks just want to mine cryptocurrency" 2606: 2551: 2376:"'Phantom' Source Code Secrets Haunt Major Organizations" 2270:"HeadCrab bots pinch 1,000+ Redis servers to mine coins" 1915:
tools include Kube-bench, Kube-hunter, and chain-bench.
2865:"Aqua Security Software Ltd - Company Profile and News" 2115:"ืืงื•ื•ื” ืกืงื™ื•ืจื™ื˜ื™ ืจื•ื›ืฉืช ื—ื‘ืจื” ื™ืฉืจืืœื™ืช ืฉืชื’ืŸ ืขืœ ืžืคืชื—ื™ ืชื•ื›ื ื”" 200:
added multiple reliable sources, github, added software
2710:"Container security startup Aqua lands $ 62M Series C" 1783: 565:
security solutions for applications and infrastructure
54: 3567: 2189:"Cybersecurity has 53 unicorns. Here are 10 to watch" 1561:. It may require cleanup to comply with Knowledge's 1508:, and by adding encyclopedic content written from a 2996:"Aqua Security Acquires tfsec to Advance DevSecOps" 1687:
Israeli cloud-native application protection company
1610:An editor has nominated this article for deletion. 3451:"Aqua Security Uncovers Major Kubernetes Attacks" 2659:"The Latest App Coding Trend Is a Hacker's Dream" 2351:"Aqua Security Uncovers Major Kubernetes Attacks" 3592: 2547:"Container Technology Brings Security Surprises" 3448: 3320: 2348: 1859:(CIS) released the first formal guidelines for 140:. | Suggested by Eastmain | #UCB_webform 41/339 3045:"Aqua Security makes its largest acquisition" 3528:Huang, Kaizhe; Jumde, Pranjal (2020-07-09). 3473: 1467:Learn how and when to remove these messages 329:as hack-prevention starts earlier than ever 3527: 3474:Binnie, Chris; McCune, Rory (2021-06-18). 2599: 1696: 3501:Ortega, Candel Jose Manuel (2020-03-23). 3449:Vaughan-Nichols, Steven J. (2023-08-09). 3323:"SAST โ€” Security Scan with AquaSec Trivy" 3228:published, Sead Fadilpaลกiฤ‡ (2023-04-24). 3227: 2761: 2734: 2349:Vaughan-Nichols, Steven J. (2023-08-09). 2321: 2159: 1591:Learn how and when to remove this message 1528:Learn how and when to remove this message 3621:Technology companies established in 2015 2544: 1799:research of the cloud native ecosystem. 3252: 3185: 2968: 2919: 2630: 2572: 2517: 2373: 2186: 2017: 1990:Security for Containers and Kubernetes 1905: 1429:Revision as of 11:27, 26 September 2024 153:Revision as of 11:27, 26 September 2024 90:Revision as of 01:31, 16 September 2024 3593: 3500: 3271: 3210: 3067: 2993: 2838: 2707: 2600:Zakrzewski, Cat (September 27, 2016). 2213: 1826:. Previous investors TLV Partners and 1489:contains content that is written like 3611:Israeli companies established in 2015 2813: 2626: 2624: 2267: 2240: 1677: 3397: 3211:Bhuyan, Aditya Pratap (2024-07-26). 3136: 3068:Bhuyan, Aditya Pratap (2024-07-26). 2092: 2013: 2011: 1849:), TLV Partners, and Shlomo Kramer. 1602: 1539: 1473: 1432: 80: 46: 3253:Stadler, Tobias (7 February 2023). 2425:"Kinsing malware still on the rise" 2398: 2138: 1855:In June 2022 Aqua Security and the 553:cloud-native application protection 216: 203: 198: 167: 150: 143: 130: 99: 87: 13: 2832: 2788: 2762:Lardinois, Frederic (2021-03-10). 2755: 2728: 2621: 2602:"Aqua Security Raises $ 9 Million" 2268:Lyons, Jessica (4 February 2023). 2160:Lardinois, Frederic (2021-03-10). 2153: 1817:Cloud Workload Protection Platform 1674: 1613:You are welcome to participate in 1431: 35: 3632: 3551: 2322:Spadafora, Anthony (2020-09-14). 2241:Lyons, Jessica (16 August 2023). 2093:ืขืžืจื™, ื–ืจื—ื•ื‘ื™ืฅ' (March 10, 2021). 2008: 1448:This article has multiple issues. 2735:Elder, Jeff; Vedantam, Keerthi. 2374:Arghire, Ionut (June 27, 2024). 1927: 1918: 1544: 1478: 1437: 695:}}</ref><ref>{{Cite 416:}}</ref><ref>{{Cite 3521: 3494: 3467: 3442: 3418: 3391: 3366: 3339: 3314: 3292: 3265: 3246: 3221: 3204: 3179: 3155: 3130: 3104: 3078: 3061: 3037: 3012: 2987: 2962: 2938: 2913: 2881: 2857: 2807: 2782: 2701: 2676: 2651: 2593: 2566: 2538: 2511: 2486: 2462: 2438: 2417: 2392: 2367: 2342: 2315: 2288: 2261: 2234: 1876: 1456:or discuss these issues on the 3504:DevOps and Containers Security 3321:Giannakopoulosj (2023-06-23). 3301:aquasecurity/trivy-plugin-aqua 2545:Janofsky, Adam (May 6, 2019). 2207: 2180: 2132: 2107: 2086: 2062: 2038: 1974:Chris Binnie and Rory McCune, 1959: 271:application protection company 1: 2139:ื“ื•ืจ, ืื•ืคื™ืจ (3 January 2024). 2002: 1968: 1807:Aqua Security was founded in 1557:, a violation of Knowledge's 1427: 1384: 1334: 1323: 1314: 1302: 1291: 1282: 1270: 1259: 1250: 1238: 1227: 1218: 1206: 1195: 1186: 1159: 1147: 1103: 1095: 1017: 1009: 965: 957: 876: 868: 829: 545: 354:to know in this red-hot space 260: 3616:Companies based in Ramat Gan 3606:Software companies of Israel 3272:Aversa, Luigi (2023-05-31). 3186:Alspach, Kyle (2021-11-23). 2969:Alspach, Kyle (2021-12-01). 2920:Alspach, Kyle (2021-11-23). 2631:Wiggers, Kyle (2019-04-03). 2573:Alspach, Kyle (2021-11-23). 2518:Wiggers, Kyle (2021-03-10). 2214:Joyner, April; Bort, Julie. 2187:Alspach, Kyle (2022-03-17). 2018:Alspach, Kyle (2022-01-21). 1857:Center for Internet Security 499:access-date=2024-07-18 |work 18:Browse history interactively 7: 3601:Computer security companies 3563:Aqua Research Team Nautilus 3304:, Aqua Security, 2024-09-24 2994:Vizard, Mike (2021-07-12). 2839:Sawers, Paul (2024-01-03). 1843:Lightspeed Venture Partners 1621:whether or not to retain it 10: 3637: 3404:. "O'Reilly Media, Inc.". 3137:Zorz, Mirko (2023-11-08). 2708:Miller, Ron (2019-04-03). 1841:, with participation from 1802: 1140:== Open source products == 1133:== Open source products == 697:web |last=ื“ื•ืจ |first=ืื•ืคื™ืจ 3480:. John Wiley & Sons. 2814:Keary, Tim (2022-06-22). 1946: 1779: 1760: 1750: 1736: 1732:Dror Davidoff, Amir Jerbi 1728: 1720: 1712: 1704: 1695: 1391: 1332: 1321: 1312: 1300: 1289: 1280: 1268: 1257: 1248: 1236: 1225: 1216: 1204: 1193: 1184: 1157: 1145: 1062: 1059: 922: 919: 836: 653:article/.premium/0000017f 555:platform and an eponymous 523:valuation.<ref name=": 227: 224: 149: 86: 3534:. Packt Publishing Ltd. 3398:Rice, Liz (2023-03-07). 1935: 1847:Microsoft's venture fund 567:.<ref>{{Cite web | 187:Extended confirmed users 3217:. Aditya Pratap Bhuyan. 3074:. Aditya Pratap Bhuyan. 2121:(in Hebrew). 2021-12-02 1616:the deletion discussion 549:'''Aqua Security''' is 264:'''Aqua Security''' is 85: 1976:Cloud Native Security, 1954:Berkeley Packet Filter 1900:Infrastructure as Code 3558:Aqua Security website 3477:Cloud Native Security 1898:security scanner for 1861:software supply chain 1819:(CWPP) capabilities. 1567:neutral point of view 1510:neutral point of view 1231:=== Aqua Nautilus === 1199:=== Aqua Platform === 3507:. BPB Publications. 3278:. BPB Publications. 3113:Aqua Security Tracee 1906:Open source products 1619:, which will decide 3430:www.darkreading.com 3378:Security Info Watch 3352:. Springer Nature. 3087:Aqua Security Trivy 3049:www.bizjournals.com 1769:Dror Davidoff (CEO) 1692: 1502:promotional content 1327:=== Kube-hunter === 1263:=== '''Trivy''' === 2893:The Times of India 1824:Microsoft Ventures 1690: 1504:and inappropriate 1090:== Acquisitions == 1083:== Acquisitions == 679:|access-date=2024- 400:|access-date=2024- 165: 97: 3541:978-1-83921-218-5 3514:978-93-89423-54-9 3487:978-1-119-78224-7 3411:978-1-0981-3508-9 3359:978-3-031-19620-1 3285:978-93-5551-843-9 3143:Help Net Security 2688:Tech Funding News 1789: 1788: 1685: 1684: 1673: 1627:guide to deletion 1601: 1600: 1593: 1583: 1582: 1538: 1537: 1530: 1471: 1426: 785:in Israel in 2015 780:=]}}</ref> 726:ืฉืœ ืœืคื ื™ ืฉืœื•ืฉ ืฉื ื™ื 635:|url=https://www. 491:over-1b-valuation 356:|url=https://www. 151: 88: 68: 3628: 3546: 3545: 3525: 3519: 3518: 3498: 3492: 3491: 3471: 3465: 3464: 3462: 3461: 3446: 3440: 3439: 3437: 3436: 3422: 3416: 3415: 3395: 3389: 3388: 3386: 3385: 3370: 3364: 3363: 3343: 3337: 3336: 3334: 3333: 3318: 3312: 3311: 3310: 3309: 3296: 3290: 3289: 3269: 3263: 3262: 3250: 3244: 3243: 3241: 3240: 3225: 3219: 3218: 3208: 3202: 3201: 3199: 3198: 3183: 3177: 3176: 3174: 3173: 3159: 3153: 3152: 3150: 3149: 3134: 3128: 3127: 3126: 3125: 3108: 3102: 3101: 3100: 3099: 3082: 3076: 3075: 3065: 3059: 3058: 3056: 3055: 3041: 3035: 3034: 3032: 3031: 3016: 3010: 3009: 3007: 3006: 2991: 2985: 2984: 2982: 2981: 2966: 2960: 2959: 2957: 2956: 2942: 2936: 2935: 2933: 2932: 2917: 2911: 2910: 2908: 2907: 2885: 2879: 2878: 2876: 2875: 2861: 2855: 2854: 2852: 2851: 2836: 2830: 2829: 2827: 2826: 2811: 2805: 2804: 2802: 2801: 2795:Business Insider 2786: 2780: 2779: 2777: 2776: 2759: 2753: 2752: 2750: 2749: 2742:Business Insider 2732: 2726: 2725: 2723: 2722: 2705: 2699: 2698: 2696: 2695: 2680: 2674: 2673: 2671: 2670: 2655: 2649: 2648: 2646: 2645: 2628: 2619: 2618: 2616: 2614: 2597: 2591: 2590: 2588: 2587: 2570: 2564: 2563: 2561: 2559: 2542: 2536: 2535: 2533: 2532: 2515: 2509: 2508: 2506: 2505: 2490: 2484: 2483: 2481: 2480: 2466: 2460: 2459: 2457: 2456: 2450:BleepingComputer 2442: 2436: 2435: 2433: 2432: 2421: 2415: 2414: 2412: 2411: 2396: 2390: 2389: 2387: 2386: 2371: 2365: 2364: 2362: 2361: 2346: 2340: 2339: 2337: 2336: 2319: 2313: 2312: 2310: 2309: 2292: 2286: 2285: 2283: 2282: 2265: 2259: 2258: 2256: 2255: 2238: 2232: 2231: 2229: 2228: 2221:Business Insider 2211: 2205: 2204: 2202: 2201: 2184: 2178: 2177: 2175: 2174: 2157: 2151: 2150: 2136: 2130: 2129: 2127: 2126: 2111: 2105: 2104: 2090: 2084: 2083: 2081: 2080: 2066: 2060: 2059: 2057: 2056: 2042: 2036: 2035: 2033: 2032: 2015: 1839:Insight Partners 1772:Amir Jerbi (CTO) 1700: 1693: 1689: 1679: 1676: 1672: 1631: 1603: 1596: 1589: 1578: 1575: 1563:content policies 1548: 1540: 1533: 1526: 1522: 1519: 1513: 1491:an advertisement 1482: 1481: 1474: 1463: 1441: 1440: 1433: 1367:== Literature == 1360:== Literature == 802:.<ref name=": 758:article/0000018c 288:>{{Cite web | 214: 213: 201: 193: 183: 164: 159: 141: 125: 115: 96: 69: 60: 59: 57: 52: 50: 42: 39: 21: 19: 3636: 3635: 3631: 3630: 3629: 3627: 3626: 3625: 3591: 3590: 3554: 3549: 3542: 3526: 3522: 3515: 3499: 3495: 3488: 3472: 3468: 3459: 3457: 3447: 3443: 3434: 3432: 3424: 3423: 3419: 3412: 3396: 3392: 3383: 3381: 3372: 3371: 3367: 3360: 3344: 3340: 3331: 3329: 3319: 3315: 3307: 3305: 3298: 3297: 3293: 3286: 3270: 3266: 3251: 3247: 3238: 3236: 3226: 3222: 3209: 3205: 3196: 3194: 3184: 3180: 3171: 3169: 3161: 3160: 3156: 3147: 3145: 3135: 3131: 3123: 3121: 3110: 3109: 3105: 3097: 3095: 3084: 3083: 3079: 3066: 3062: 3053: 3051: 3043: 3042: 3038: 3029: 3027: 3018: 3017: 3013: 3004: 3002: 2992: 2988: 2979: 2977: 2967: 2963: 2954: 2952: 2944: 2943: 2939: 2930: 2928: 2918: 2914: 2905: 2903: 2887: 2886: 2882: 2873: 2871: 2863: 2862: 2858: 2849: 2847: 2837: 2833: 2824: 2822: 2812: 2808: 2799: 2797: 2789:Holmes, Aaron. 2787: 2783: 2774: 2772: 2760: 2756: 2747: 2745: 2733: 2729: 2720: 2718: 2706: 2702: 2693: 2691: 2682: 2681: 2677: 2668: 2666: 2657: 2656: 2652: 2643: 2641: 2629: 2622: 2612: 2610: 2598: 2594: 2585: 2583: 2571: 2567: 2557: 2555: 2543: 2539: 2530: 2528: 2516: 2512: 2503: 2501: 2492: 2491: 2487: 2478: 2476: 2468: 2467: 2463: 2454: 2452: 2444: 2443: 2439: 2430: 2428: 2423: 2422: 2418: 2409: 2407: 2399:Bradley, Tony. 2397: 2393: 2384: 2382: 2372: 2368: 2359: 2357: 2347: 2343: 2334: 2332: 2320: 2316: 2307: 2305: 2294: 2293: 2289: 2280: 2278: 2266: 2262: 2253: 2251: 2239: 2235: 2226: 2224: 2212: 2208: 2199: 2197: 2185: 2181: 2172: 2170: 2158: 2154: 2137: 2133: 2124: 2122: 2113: 2112: 2108: 2091: 2087: 2078: 2076: 2068: 2067: 2063: 2054: 2052: 2044: 2043: 2039: 2030: 2028: 2016: 2009: 2005: 1971: 1962: 1949: 1940: 1930: 1921: 1908: 1892:Microsoft Azure 1879: 1805: 1775: 1763: 1753: 1688: 1681: 1680: 1638:"Aqua Security" 1632: 1630: 1612: 1597: 1586: 1585: 1584: 1579: 1573: 1570: 1565:, particularly 1549: 1534: 1523: 1517: 1514: 1495: 1483: 1479: 1442: 1438: 1423: 1416: 1407: 1400: 1389: 1380: 1375: 1368: 1361: 1352: 1347: 1340: 1328: 1317: 1308: 1296: 1285: 1276: 1264: 1253: 1244: 1232: 1221: 1212: 1200: 1189: 1180: 1172: 1162: 1153: 1141: 1134: 1125: 1120: 1113: 1111: 1101: 1091: 1084: 1075: 1070: 1055: 1047: 1037: 1032: 1025: 1024: 1015: 1005: 1000: 993: 991: 987: 984: 980: 976: 972: 963: 953: 948: 941: 933: 915: 907: 897: 892: 885: 883: 874: 864: 857: 848: 843: 834: 825: 824: 819: 816: 813: 809: 805: 801: 797: 793: 790: 786: 783: 779: 775: 771: 767: 763: 759: 755: 751: 747: 743: 739: 735: 731: 727: 724: 721: 718: 715: 712: 709: 706: 702: 698: 694: 690: 686: 682: 678: 674: 670: 666: 662: 658: 654: 650: 646: 642: 641:technation/2021 638: 634: 631: 628: 625: 622: 619: 616: 613: 609: 606: 603: 600: 597: 593: 590: 586: 582: 578: 574: 570: 566: 563: 560: 556: 552: 543: 540: 537: 534: 530: 526: 522: 518: 515: 511: 508: 505:}}</ref> 504: 500: 496: 492: 488: 484: 480: 476: 472: 468: 464: 460: 456: 452: 448: 445: 442: 439: 436: 433: 430: 427: 423: 419: 415: 411: 407: 403: 399: 395: 391: 387: 383: 379: 375: 371: 367: 363: 359: 358:businessinsider 355: 352: 349: 346: 343: 340: 337: 334: 330: 327: 324: 321: 318: 314: 313:|first2=Keerthi 311: 307: 303: 299: 295: 291: 287: 283: 280: 277: 274: 270: 267: 256: 251: 244: 237: 220: 215: 209: 204: 202: 199: 197: 196: 195: 191: 189: 173: 171: 166: 160: 155: 147: 145:โ† Previous edit 142: 131: 129: 128: 127: 123: 121: 105: 103: 98: 92: 84: 83: 82: 81: 79: 78: 77: 76: 75: 74: 65: 61: 55: 53: 48: 45: 43: 40: 38:Content deleted 37: 34: 29:โ† Previous edit 26: 25: 24: 17: 12: 11: 5: 3634: 3624: 3623: 3618: 3613: 3608: 3603: 3589: 3588: 3579: 3570: 3565: 3560: 3553: 3552:External links 3550: 3548: 3547: 3540: 3520: 3513: 3493: 3486: 3466: 3441: 3417: 3410: 3390: 3365: 3358: 3338: 3313: 3291: 3284: 3264: 3245: 3220: 3203: 3178: 3154: 3129: 3103: 3077: 3060: 3036: 3011: 2986: 2961: 2937: 2912: 2895:. 2021-03-11. 2880: 2856: 2831: 2806: 2781: 2754: 2727: 2700: 2675: 2650: 2620: 2592: 2565: 2537: 2510: 2485: 2461: 2437: 2416: 2391: 2366: 2341: 2314: 2287: 2260: 2233: 2206: 2179: 2152: 2131: 2106: 2085: 2061: 2037: 2006: 2004: 2001: 2000: 1999: 1988:Luigi Aversa, 1986: 1984:978-1119782230 1970: 1967: 1961: 1958: 1948: 1945: 1939: 1934: 1929: 1926: 1920: 1917: 1907: 1904: 1878: 1875: 1804: 1801: 1787: 1786: 1781: 1777: 1776: 1774: 1773: 1770: 1766: 1764: 1761: 1758: 1757: 1754: 1751: 1748: 1747: 1738: 1734: 1733: 1730: 1726: 1725: 1722: 1718: 1717: 1714: 1710: 1709: 1706: 1702: 1701: 1686: 1683: 1682: 1624: 1608: 1606: 1599: 1598: 1581: 1580: 1574:September 2024 1552: 1550: 1543: 1536: 1535: 1518:September 2024 1506:external links 1486: 1484: 1477: 1472: 1446: 1445: 1443: 1436: 1430: 1425: 1424: 1421: 1419: 1417: 1414: 1412: 1409: 1408: 1405: 1403: 1401: 1398: 1396: 1393: 1392: 1390: 1387: 1385: 1382: 1381: 1378: 1376: 1373: 1370: 1369: 1366: 1364: 1362: 1359: 1357: 1354: 1353: 1350: 1348: 1345: 1342: 1341: 1337: 1335: 1333: 1330: 1329: 1326: 1324: 1322: 1319: 1318: 1315: 1313: 1310: 1309: 1305: 1303: 1301: 1298: 1297: 1295:=== Tracee === 1294: 1292: 1290: 1287: 1286: 1283: 1281: 1278: 1277: 1273: 1271: 1269: 1266: 1265: 1262: 1260: 1258: 1255: 1254: 1251: 1249: 1246: 1245: 1241: 1239: 1237: 1234: 1233: 1230: 1228: 1226: 1223: 1222: 1219: 1217: 1214: 1213: 1209: 1207: 1205: 1202: 1201: 1198: 1196: 1194: 1191: 1190: 1187: 1185: 1182: 1181: 1177: 1175: 1173: 1169: 1167: 1164: 1163: 1160: 1158: 1155: 1154: 1150: 1148: 1146: 1143: 1142: 1139: 1137: 1135: 1132: 1130: 1127: 1126: 1123: 1121: 1118: 1115: 1114: 1112:}}</ref> 1109: 1106: 1104: 1102: 1098: 1096: 1093: 1092: 1089: 1087: 1085: 1082: 1080: 1077: 1076: 1073: 1071: 1068: 1065: 1064: 1061: 1057: 1056: 1052: 1050: 1048: 1044: 1042: 1039: 1038: 1035: 1033: 1030: 1027: 1026: 1023: 1020: 1018: 1016: 1012: 1010: 1007: 1006: 1003: 1001: 998: 995: 994: 989: 985: 982: 978: 973: 970: 968: 966: 964: 960: 958: 955: 954: 951: 949: 946: 943: 942: 938: 936: 934: 930: 928: 925: 924: 921: 917: 916: 912: 910: 908: 904: 902: 899: 898: 895: 893: 890: 887: 886: 881: 879: 877: 875: 871: 869: 866: 865: 862: 860: 858: 855: 853: 850: 849: 846: 844: 841: 838: 837: 835: 832: 830: 827: 826: 822: 817: 814: 811: 807: 803: 799: 795: 791: 788: 784: 781: 777: 773: 769: 765: 761: 757: 753: 749: 745: 741: 737: 733: 729: 725: 722: 719: 716: 713: 710: 707: 704: 700: 696: 692: 688: 684: 680: 676: 672: 668: 664: 660: 656: 652: 648: 644: 640: 636: 632: 629: 626: 623: 620: 617: 614: 611: 607: 604: 601: 598: 595: 591: 588: 584: 580: 576: 572: 568: 564: 561: 558: 554: 550: 548: 546: 544: 538: 535: 532: 528: 524: 520: 516: 513: 509: 506: 502: 498: 494: 490: 486: 482: 478: 474: 470: 466: 462: 458: 454: 450: 446: 443: 440: 437: 434: 431: 428: 425: 421: 417: 413: 409: 405: 401: 397: 393: 389: 385: 381: 377: 373: 369: 365: 361: 357: 353: 350: 347: 344: 341: 338: 335: 332: 328: 325: 322: 319: 316: 312: 309: 305: 301: 297: 293: 289: 285: 281: 278: 275: 272: 268: 265: 263: 261: 258: 257: 254: 252: 249: 246: 245: 242: 240: 238: 235: 233: 230: 229: 226: 222: 221: 190: 185: 184: 169: 148: 122: 117: 116: 101: 70: 64: 62: 44: 36: 27: 23: 22: 14: 9: 6: 4: 3: 2: 3633: 3622: 3619: 3617: 3614: 3612: 3609: 3607: 3604: 3602: 3599: 3598: 3596: 3587: 3583: 3580: 3578: 3574: 3571: 3569: 3566: 3564: 3561: 3559: 3556: 3555: 3543: 3537: 3533: 3532: 3524: 3516: 3510: 3506: 3505: 3497: 3489: 3483: 3479: 3478: 3470: 3456: 3455:The New Stack 3452: 3445: 3431: 3427: 3421: 3413: 3407: 3403: 3402: 3394: 3379: 3375: 3369: 3361: 3355: 3351: 3350: 3342: 3328: 3324: 3317: 3303: 3302: 3295: 3287: 3281: 3277: 3276: 3268: 3260: 3259:Chip Magazine 3256: 3249: 3235: 3231: 3224: 3216: 3215: 3207: 3193: 3189: 3182: 3168: 3164: 3158: 3144: 3140: 3133: 3119: 3115: 3114: 3107: 3093: 3089: 3088: 3081: 3073: 3072: 3064: 3050: 3046: 3040: 3025: 3021: 3015: 3001: 2997: 2990: 2976: 2972: 2965: 2951: 2950:IT Operations 2947: 2941: 2927: 2923: 2916: 2902: 2898: 2894: 2890: 2884: 2870: 2869:Bloomberg.com 2866: 2860: 2846: 2842: 2835: 2821: 2817: 2810: 2796: 2792: 2785: 2771: 2770: 2765: 2758: 2744: 2743: 2738: 2731: 2717: 2716: 2711: 2704: 2689: 2685: 2679: 2664: 2663:Bloomberg.com 2660: 2654: 2640: 2639: 2634: 2627: 2625: 2609: 2608: 2603: 2596: 2582: 2581: 2576: 2569: 2554: 2553: 2548: 2541: 2527: 2526: 2521: 2514: 2499: 2495: 2489: 2475: 2471: 2465: 2451: 2447: 2441: 2426: 2420: 2406: 2402: 2395: 2381: 2377: 2370: 2356: 2355:The New Stack 2352: 2345: 2331: 2330: 2325: 2318: 2303: 2302: 2297: 2291: 2277: 2276: 2271: 2264: 2250: 2249: 2244: 2237: 2223: 2222: 2217: 2210: 2196: 2195: 2190: 2183: 2169: 2168: 2163: 2156: 2148: 2147: 2142: 2135: 2120: 2116: 2110: 2102: 2101: 2096: 2089: 2075: 2074:Bloomberg.com 2071: 2065: 2051: 2050:Bloomberg.com 2047: 2041: 2027: 2026: 2021: 2014: 2012: 2007: 1998: 1997: 1996:9789355518439 1993: 1987: 1985: 1981: 1977: 1973: 1972: 1966: 1957: 1955: 1944: 1938: 1933: 1928:Aqua Nautilus 1925: 1919:Aqua Platform 1916: 1912: 1903: 1901: 1897: 1893: 1889: 1885: 1874: 1872: 1867: 1864: 1862: 1858: 1853: 1850: 1848: 1844: 1840: 1835: 1833: 1829: 1828:Shlomo Kramer 1825: 1820: 1818: 1814: 1810: 1800: 1798: 1797:cybersecurity 1793: 1792:Aqua Security 1785: 1782: 1778: 1771: 1768: 1767: 1765: 1759: 1755: 1749: 1746: 1742: 1739: 1735: 1731: 1727: 1723: 1719: 1716:Cybersecurity 1715: 1711: 1707: 1703: 1699: 1694: 1691:Aqua Security 1671: 1668: 1664: 1661: 1657: 1654: 1650: 1647: 1643: 1640: โ€“  1639: 1635: 1634:Find sources: 1628: 1622: 1618: 1617: 1611: 1607: 1605: 1604: 1595: 1592: 1577: 1568: 1564: 1560: 1556: 1553:This article 1551: 1547: 1542: 1541: 1532: 1529: 1521: 1511: 1507: 1503: 1499: 1493: 1492: 1487:This article 1485: 1476: 1475: 1470: 1468: 1461: 1460: 1455: 1454: 1449: 1444: 1435: 1434: 1428: 1420: 1418: 1413: 1411: 1410: 1404: 1402: 1397: 1395: 1394: 1386: 1383: 1379: 1377: 1374: 1372: 1371: 1365: 1363: 1358: 1356: 1355: 1351: 1349: 1346: 1344: 1343: 1336: 1331: 1325: 1320: 1316: 1311: 1304: 1299: 1293: 1288: 1284: 1279: 1272: 1267: 1261: 1256: 1252: 1247: 1240: 1235: 1229: 1224: 1220: 1215: 1208: 1203: 1197: 1192: 1188: 1183: 1176: 1174: 1168: 1166: 1165: 1161: 1156: 1149: 1144: 1138: 1136: 1131: 1129: 1128: 1124: 1122: 1119: 1117: 1116: 1105: 1097: 1094: 1088: 1086: 1081: 1079: 1078: 1074: 1072: 1069: 1067: 1066: 1058: 1051: 1049: 1043: 1041: 1040: 1036: 1034: 1031: 1029: 1028: 1019: 1011: 1008: 1004: 1002: 999: 997: 996: 967: 959: 956: 952: 950: 947: 945: 944: 937: 935: 929: 927: 926: 918: 911: 909: 903: 901: 900: 896: 894: 891: 889: 888: 878: 870: 867: 863:== History == 861: 859: 856:== History == 854: 852: 851: 847: 845: 842: 840: 839: 831: 828: 808:Aqua Security 728:|url=https:// 547: 449:|url=https:// 382:cybersecurity 262: 259: 255: 253: 250: 248: 247: 241: 239: 234: 232: 231: 223: 219: 212: 207: 188: 181: 177: 172: 163: 158: 154: 146: 139: 135: 120: 113: 109: 104: 95: 91: 73: 58: 51: 41:Content added 33: 30: 20: 3530: 3523: 3503: 3496: 3476: 3469: 3458:. Retrieved 3454: 3444: 3433:. Retrieved 3429: 3420: 3400: 3393: 3382:. Retrieved 3380:. 2024-08-08 3377: 3368: 3348: 3341: 3330:. Retrieved 3326: 3316: 3306:, retrieved 3300: 3294: 3274: 3267: 3258: 3248: 3237:. Retrieved 3233: 3223: 3213: 3206: 3195:. Retrieved 3191: 3181: 3170:. Retrieved 3166: 3157: 3146:. Retrieved 3142: 3132: 3122:, retrieved 3120:, 2024-07-18 3112: 3106: 3096:, retrieved 3094:, 2024-07-18 3086: 3080: 3070: 3063: 3052:. Retrieved 3048: 3039: 3028:. Retrieved 3026:. 2021-07-12 3024:SiliconANGLE 3023: 3014: 3003:. Retrieved 2999: 2989: 2978:. Retrieved 2974: 2964: 2953:. Retrieved 2949: 2940: 2929:. Retrieved 2925: 2915: 2904:. Retrieved 2892: 2883: 2872:. Retrieved 2868: 2859: 2848:. Retrieved 2844: 2834: 2823:. Retrieved 2819: 2809: 2798:. Retrieved 2794: 2784: 2773:. Retrieved 2767: 2757: 2746:. Retrieved 2740: 2730: 2719:. Retrieved 2713: 2703: 2692:. Retrieved 2690:. 2024-01-04 2687: 2678: 2667:. Retrieved 2665:. 2017-07-18 2662: 2653: 2642:. Retrieved 2636: 2611:. Retrieved 2605: 2595: 2584:. Retrieved 2578: 2568: 2556:. Retrieved 2550: 2540: 2529:. Retrieved 2523: 2513: 2502:. Retrieved 2500:. 2023-07-03 2497: 2488: 2477:. Retrieved 2473: 2464: 2453:. Retrieved 2449: 2440: 2429:. Retrieved 2427:. 2024-06-06 2419: 2408:. Retrieved 2404: 2394: 2383:. Retrieved 2380:SecurityWeek 2379: 2369: 2358:. Retrieved 2354: 2344: 2333:. Retrieved 2327: 2317: 2306:. Retrieved 2304:. 2021-07-31 2299: 2290: 2279:. Retrieved 2275:The Register 2273: 2263: 2252:. Retrieved 2248:The Register 2246: 2236: 2225:. Retrieved 2219: 2209: 2198:. Retrieved 2192: 2182: 2171:. Retrieved 2165: 2155: 2144: 2134: 2123:. Retrieved 2118: 2109: 2098: 2088: 2077:. Retrieved 2073: 2064: 2053:. Retrieved 2049: 2040: 2029:. Retrieved 2023: 1989: 1975: 1963: 1950: 1941: 1936: 1931: 1922: 1913: 1909: 1880: 1877:Acquisitions 1868: 1865: 1854: 1851: 1836: 1821: 1806: 1791: 1790: 1737:Headquarters 1705:Company type 1666: 1659: 1652: 1645: 1633: 1614: 1609: 1587: 1571: 1559:terms of use 1554: 1524: 1515: 1500:by removing 1496:Please help 1488: 1464: 1457: 1451: 1450:Please help 1447: 794:reached a $ 774:cfad31640000 703:2024 |title= 519:reached a $ 503:|language=en 134:Use this bot 102:Citation bot 3192:VentureBeat 2975:VentureBeat 2926:VentureBeat 2820:VentureBeat 2638:VentureBeat 2580:VentureBeat 2525:VentureBeat 2301:VentureBeat 2194:VentureBeat 2025:VentureBeat 1960:Kube-hunter 1896:open-source 1784:aquasec.com 1752:Area served 975:|url=https: 218:Next edit โ†’ 211:Visual edit 138:Report bugs 32:Next edit โ†’ 3595:Categories 3568:Aqua Trivy 3460:2024-09-26 3435:2024-09-26 3384:2024-09-26 3332:2024-09-26 3308:2024-09-26 3239:2024-09-26 3197:2024-09-25 3172:2024-07-18 3148:2024-07-18 3124:2024-07-18 3098:2024-07-18 3054:2024-09-25 3030:2024-07-18 3005:2024-07-18 3000:DevOps.com 2980:2024-07-18 2955:2024-07-18 2931:2024-07-18 2906:2024-07-18 2874:2024-07-18 2850:2024-07-18 2845:TechCrunch 2825:2024-07-18 2800:2024-07-18 2775:2024-07-18 2769:TechCrunch 2748:2024-07-18 2721:2024-07-18 2715:TechCrunch 2694:2024-07-18 2669:2024-07-18 2644:2024-07-18 2586:2024-07-18 2531:2024-07-18 2504:2024-07-18 2479:2024-07-18 2474:CSO Online 2455:2024-07-18 2431:2024-07-18 2410:2024-07-18 2385:2024-07-18 2360:2024-07-18 2335:2024-07-18 2308:2024-07-18 2281:2024-07-18 2254:2024-07-18 2227:2024-07-18 2200:2024-07-18 2173:2024-07-18 2167:TechCrunch 2125:2024-09-26 2079:2024-07-18 2055:2024-07-18 2031:2024-07-18 2003:References 1969:Literature 1762:Key people 1649:newspapers 1498:improve it 1453:improve it 983:>{{Cite 971:>{{Cite 742:technation 701:3 January 691:|language= 495:1001466852 420:|date=2024 412:|language= 378:operations 366:devsecopps 3234:TechRadar 2901:0971-8257 2329:TechRadar 2146:TheMarker 2100:TheMarker 1873:, India. 1871:Hyderabad 1813:container 1809:Ramat Gan 1756:Worldwide 1741:Ramat Gan 1459:talk page 798:valuation 796:1 billion 734:themarker 687:|website= 637:themarker 447:valuation 408:|website= 370:developer 317:Developer 286:name=":0" 269:Israeli ] 170:ื’'ื™ืžื™ื”ื—ื™ื” 124:5,211,852 3167:Security 2613:July 17, 2558:July 17, 2498:BetaNews 1834:office. 1729:Founders 1713:Industry 1063:Line 40: 1060:Line 41: 923:Line 31: 920:Line 32: 708:ืกืงื™ื•ืจื™ื˜ื™ 599:ืกืงื™ื•ืจื™ื˜ื™ 592:10, 2021 581:ื–ืจื—ื•ื‘ื™ืฅ' 562:develops 557:company 517:Security 475:security 429:Security 390:contrast 374:security 362:startups 345:startups 320:security 310:Vedantam 284:.<ref 228:Line 22: 225:Line 22: 180:contribs 112:contribs 56:Wikitext 1845:, M12 ( 1803:History 1780:Website 1721:Founded 1708:Private 1663:scholar 800:in 2021 792:company 782:Founded 778:website 630:ื‘ื™ืฆื•ืขื™ื 594:|title= 467:article 424:|title= 398:2020-11 326:booming 315:|title= 276:founded 3586:GitHub 3582:Tracee 3577:GitHub 3538:  3511:  3484:  3408:  3356:  3327:Medium 3282:  3118:GitHub 3092:GitHub 2899:  2405:Forbes 1994:  1982:  1947:Tracee 1884:GitHub 1832:Boston 1745:Israel 1665:  1658:  1651:  1644:  1636:  717:ืžื™ืœื™ื•ืŸ 699:|date= 633:ื—ื–ืงื™ื" 615:'ื”ื™ื™ืค' 479:raises 455:globes 432:raises 422:-03-01 298:first1 67:Inline 49:Visual 3573:Trivy 1978:2021 1937:Trivy 1670:JSTOR 1656:books 812:known 754:03/ty 723:ื‘ืฉื•ื•ื™ 711:ื’ื™ื™ืกื” 705:ืืงื•ื•ื” 649:10/ty 639:.com/ 618:ื‘ืขื ืฃ, 602:ื”ื•ืคื›ืช 596:ืืงื•ื•ื” 589:March 577:first 459:co.il 435:$ 60m 414:en-US 394:auth0 360:.com/ 306:last2 294:Elder 290:last1 194:edits 126:edits 3536:ISBN 3509:ISBN 3482:ISBN 3406:ISBN 3354:ISBN 3280:ISBN 2897:ISSN 2615:2024 2560:2024 1992:ISBN 1980:ISBN 1890:and 1724:2015 1642:news 770:abad 766:ddba 762:cf8d 746:2024 720:ื“ื•ืœืจ 665:a1ff 661:d62c 657:e5eb 585:date 573:ืขืžืจื™ 569:last 559:that 533:home 514:Aqua 510:2021 471:aqua 444:$ 1b 441:over 426:Aqua 418:news 386:snyk 351:need 333:Here 302:Jeff 282:2015 176:talk 162:undo 157:edit 119:Bots 108:talk 94:edit 3584:on 3575:on 2607:WSJ 2552:WSJ 2119:Ice 1888:AWS 1678:AFD 1569:. 815:for 810:is 789:the 738:com 730:www 689:Ice 624:ืœื ื• 621:ืื‘ืœ 612:"ื™ืฉ 608:ืงืจืŸ 605:ืœื—ื“ 539:the 531:is 483:60m 348:you 339:the 336:are 206:Tag 192:633 3597:: 3453:. 3428:. 3376:. 3325:. 3257:. 3232:. 3190:. 3165:. 3141:. 3116:, 3090:, 3047:. 3022:. 2998:. 2973:. 2948:. 2924:. 2891:. 2867:. 2843:. 2818:. 2793:. 2766:. 2739:. 2712:. 2686:. 2661:. 2635:. 2623:^ 2604:. 2577:. 2549:. 2522:. 2496:. 2472:. 2448:. 2403:. 2378:. 2353:. 2326:. 2298:. 2272:. 2245:. 2218:. 2191:. 2164:. 2143:. 2117:. 2097:. 2072:. 2048:. 2022:. 2010:^ 1886:, 1743:, 1462:. 804:12 787:, 750:01 714:60 693:he 685:26 681:09 673:12 645:03 627:ื™ืฉ 610:: 536:to 529:It 521:1B 512:, 507:In 501:=] 487:at 463:en 451:en 438:at 406:18 402:07 342:25 331:: 323:is 279:in 266:an 243:}} 236:}} 208:: 178:| 136:. 110:| 3544:. 3517:. 3490:. 3463:. 3438:. 3414:. 3387:. 3362:. 3335:. 3288:. 3261:. 3242:. 3200:. 3175:. 3151:. 3057:. 3033:. 3008:. 2983:. 2958:. 2934:. 2909:. 2877:. 2853:. 2828:. 2803:. 2778:. 2751:. 2724:. 2697:. 2672:. 2647:. 2617:. 2589:. 2562:. 2534:. 2507:. 2482:. 2458:. 2434:. 2413:. 2388:. 2363:. 2338:. 2311:. 2284:. 2257:. 2230:. 2203:. 2176:. 2149:. 2128:. 2103:. 2082:. 2058:. 2034:. 1667:ยท 1660:ยท 1653:ยท 1646:ยท 1629:. 1623:. 1594:) 1588:( 1576:) 1572:( 1531:) 1525:( 1520:) 1516:( 1512:. 1494:. 1469:) 1465:( 988:/ 977:/ 776:| 772:- 768:- 764:- 760:- 756:- 752:- 748:- 744:/ 740:/ 736:. 732:. 683:- 675:- 671:- 667:- 663:- 659:- 655:- 651:- 647:- 643:- 587:= 583:| 579:= 575:| 571:= 551:a 525:1 497:| 493:- 489:- 485:- 481:- 477:- 473:- 469:- 465:/ 461:/ 457:. 453:. 410:] 404:- 396:- 392:- 388:- 384:- 380:- 376:- 372:- 368:- 364:- 308:= 304:| 300:= 296:| 292:= 273:, 182:) 174:( 114:) 106:(

Index

Browse history interactively
โ† Previous edit
Next edit โ†’
Visual
Wikitext

Revision as of 01:31, 16 September 2024
edit
Citation bot
talk
contribs
Bots
Use this bot
Report bugs
โ† Previous edit
Revision as of 11:27, 26 September 2024
edit
undo
ื’'ื™ืžื™ื”ื—ื™ื”
talk
contribs
Extended confirmed users
Tag
Visual edit
Next edit โ†’
improve it
talk page
Learn how and when to remove these messages
an advertisement
improve it

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

โ†‘