833:</ref><ref>{{Cite web |last=Lyons |first=Jessica |date=4 February 2023 |title=HeadCrab bots pinch 1,000+ Redis servers to mine coins |url=https://www.theregister.com/2023/02/04/headcrab_botnet_aqua/ |access-date=2024-07-18 |website=]}}</ref><ref>{{Cite web |last= |first= |date=2021-07-31 |title=Aqua Security: 97% unaware of crucial cloud native security principles |url=https://venturebeat.com/security/aqua-security-97-percent-unaware-of-crucial-cloud-native-security-principles/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Spadafora |first=Anthony |date=2020-09-14 |title=Most cloud cyberattacks just want to mine cryptocurrency |url=https://www.techradar.com/news/most-cloud-cyberattacks-just-want-to-mine-cryptocurrency |access-date=2024-07-18 |website=] |language=en}}</ref><ref>{{Cite web |last=Vaughan-Nichols |first=Steven J. |date=2023-08-09 |title=Aqua Security Uncovers Major Kubernetes Attacks |url=https://thenewstack.io/aqua-security-uncovers-major-kubernetes-attacks/ |access-date=2024-07-18 |website=The New Stack |language=en-US}}</ref><ref>{{Cite web |last=Arghire |first=Ionut |date=June 27, 2024 |title='Phantom' Source Code Secrets Haunt Major Organizations |url=https://www.securityweek.com/phantom-source-code-secrets-haunt-major-organizations/ |access-date=2024-07-18 |website=SecurityWeek}}</ref><ref>{{Cite web |last=Bradley |first=Tony |title=Aqua Security Reveals Crucial Insights On Kinsing Malware |url=https://www.forbes.com/sites/tonybradley/2024/05/07/aqua-security-reveals-crucial-insights-on-kinsing-malware/ |access-date=2024-07-18 |website=Forbes |language=en}}</ref><ref>{{Cite web |date=2024-06-06 |title=Kinsing malware still on the rise |url=https://www.it-daily.net/en/it-security-en/cybercrime-en/kinsing-malware-continues-to-gain-ground |access-date=2024-07-18 |language=en-US}}</ref><ref>{{Cite web |title=Ubuntu 'command-not-found' tool can be abused to spread malware |url=https://www.bleepingcomputer.com/news/security/ubuntu-command-not-found-tool-can-be-abused-to-spread-malware/ |access-date=2024-07-18 |website=BleepingComputer |language=en-us}}</ref><ref>{{Cite web |title=Millions of GitHub repositories vulnerable to RepoJacking: Report |url=https://www.csoonline.com/article/643153/millions-of-github-repositories-vulnerable-to-repojacking-report.html |access-date=2024-07-18 |website=CSO Online |language=en}}</ref><ref>{{Cite web |date=2023-07-03 |title=Memory-based attacks increase as attackers dodge cloud defenses |url=https://betanews.com/2023/07/03/memory-based-attacks-increase-as-attackers-dodge-cloud-defenses/ |access-date=2024-07-18 |website=BetaNews |language=en}}</ref>
823:</ref><ref>{{Cite web |last=Lyons |first=Jessica |date=4 February 2023 |title=HeadCrab bots pinch 1,000+ Redis servers to mine coins |url=https://www.theregister.com/2023/02/04/headcrab_botnet_aqua/ |access-date=2024-07-18 |website=]}}</ref><ref>{{Cite web |last= |first= |date=2021-07-31 |title=Aqua Security: 97% unaware of crucial cloud native security principles |url=https://venturebeat.com/security/aqua-security-97-percent-unaware-of-crucial-cloud-native-security-principles/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Spadafora |first=Anthony |date=2020-09-14 |title=Most cloud cyberattacks just want to mine cryptocurrency |url=https://www.techradar.com/news/most-cloud-cyberattacks-just-want-to-mine-cryptocurrency |access-date=2024-07-18 |website=] |language=en}}</ref><ref>{{Cite web |last=Vaughan-Nichols |first=Steven J. |date=2023-08-09 |title=Aqua Security Uncovers Major Kubernetes Attacks |url=https://thenewstack.io/aqua-security-uncovers-major-kubernetes-attacks/ |access-date=2024-07-18 |website=The New Stack |language=en-US}}</ref><ref>{{Cite web |last=Arghire |first=Ionut |date=June 27, 2024 |title='Phantom' Source Code Secrets Haunt Major Organizations |url=https://www.securityweek.com/phantom-source-code-secrets-haunt-major-organizations/ |access-date=2024-07-18 |website=SecurityWeek}}</ref><ref>{{Cite web |last=Bradley |first=Tony |title=Aqua Security Reveals Crucial Insights On Kinsing Malware |url=https://www.forbes.com/sites/tonybradley/2024/05/07/aqua-security-reveals-crucial-insights-on-kinsing-malware/ |access-date=2024-07-18 |website=Forbes |language=en}}</ref><ref>{{Cite web |date=2024-06-06 |title=Kinsing malware still on the rise |url=https://www.it-daily.net/en/it-security-en/cybercrime-en/kinsing-malware-continues-to-gain-ground |access-date=2024-07-18 |language=en-US}}</ref><ref>{{Cite web |title=Ubuntu 'command-not-found' tool can be abused to spread malware |url=https://www.bleepingcomputer.com/news/security/ubuntu-command-not-found-tool-can-be-abused-to-spread-malware/ |access-date=2024-07-18 |website=BleepingComputer |language=en-us}}</ref><ref>{{Cite web |title=Millions of GitHub repositories vulnerable to RepoJacking: Report |url=https://www.csoonline.com/article/643153/millions-of-github-repositories-vulnerable-to-repojacking-report.html |access-date=2024-07-18 |website=CSO Online |language=en}}</ref><ref>{{Cite web |date=2023-07-03 |title=Memory-based attacks increase as attackers dodge cloud defenses |url=https://betanews.com/2023/07/03/memory-based-attacks-increase-as-attackers-dodge-cloud-defenses/ |access-date=2024-07-18 |website=BetaNews |language=en}}</ref>
1339:|url=https://www.darkreading.com/cloud-security/aqua-security-introduces-industry-first-kubernetes-vulnerability-scanning-with-trivy-kbom |access-date=2024-09-26 |website=www.darkreading.com |language=en}}</ref> It performs a proactive security assessment by scanning for common security issues and weaknesses, such as open ports, insecure configurations, and other potential risks.<ref>{{Cite web |last=Vaughan-Nichols |first=Steven J. |date=2023-08-09 |title=Aqua Security Uncovers Major Kubernetes Attacks |url=https://thenewstack.io/aqua-security-uncovers-major-kubernetes-attacks/ |access-date=2024-09-26 |website=The New Stack |language=en-US}}</ref> Kube-hunter is widely used by administrators and security teams to strengthen Kubernetes deployments, providing actionable insights to mitigate identified threats. Its ease of use and ability to simulate real-world attack scenarios make it a valuable tool for improving the security posture of Kubernetes environments.<ref>{{Cite book |last=Binnie |first=Chris |url=https://www.google.com.ua/books/edition/Cloud_Native_Security/iSw0EAAAQBAJ?hl=uk&gbpv=1&dq=Aqua+Security+hunter&pg=PT80&printsec=frontcover |title=Cloud Native Security |last2=McCune |first2=Rory |date=2021-06-18 |publisher=John Wiley & Sons |isbn=978-1-119-78224-7 |language=en}}</ref><ref>{{Cite book |last=Ortega |first=Candel Jose Manuel |url=https://www.google.com.ua/books/edition/DevOps_and_Containers_Security/D7tIEAAAQBAJ?hl=uk&gbpv=1&dq=Aqua+Security+hunter&pg=SA7-PA44&printsec=frontcover |title=DevOps and Containers Security |date=2020-03-23 |publisher=BPB Publications |isbn=978-93-89423-54-9 |language=en}}</ref><ref>{{Cite book |last=Huang |first=Kaizhe |url=https://www.google.com.ua/books/edition/Learn_Kubernetes_Security/fmDwDwAAQBAJ?hl=uk&gbpv=1&dq=Aqua+Security+hunter&pg=PA278&printsec=frontcover |title=Learn Kubernetes Security: Securely orchestrate, scale, and manage your microservices in Kubernetes deployments |last2=Jumde |first2=Pranjal |date=2020-07-09 |publisher=Packt Publishing Ltd |isbn=978-1-83921-218-5 |language=en}}</ref>
1100:
emerging cloud security trend offers 'good news' to businesses |url=https://venturebeat.com/security/why-an-emerging-cloud-security-trend-offers-good-news-to-businesses/ |access-date=2024-07-18 |website=VentureBeat |language=en-US}}</ref><ref>{{Cite web |title=Aqua
Security buys CloudSploit, expands into cloud security {{!}} TechTarget |url=https://www.techtarget.com/searchitoperations/news/252473866/Aqua-Security-buys-CloudSploit-expands-into-cloud-security |access-date=2024-07-18 |website=IT Operations |language=en}}</ref> The company acquired Argon, a startup with capabilities for securing the software supply chain in December 2021.<ref>{{Cite web |last=Alspach |first=Kyle |date=2021-12-01 |title=Aqua Security acquires Argon to protect the software supply chain |url=https://venturebeat.com/security/aqua-security-acquires-argon-to-protect-the-software-supply-chain/ |access-date=2024-07-18 |website=VentureBeat |language=en-US}}</ref> The same year, Aqua acquired tfsec, an ] security scanner for ] (IaC). The acquisition brought integration of tfsec into Aqua Trivy, adding IaC security scanning capabilities. Tfsec's co-founders also joined Aqua following the acquisition.<ref>{{Cite web |last=Vizard |first=Mike |date=2021-07-12 |title=Aqua Security Acquires tfsec to Advance DevSecOps |url=https://devops.com/aqua-security-acquires-tfsec-to-advance-devsecops/ |access-date=2024-07-18 |website=DevOps.com |language=en-US}}</ref><ref>{{Cite web |date=2021-07-12 |title=Aqua Security buys open-source 'infrastructure as code' scanning tool tfsec |url=https://siliconangle.com/2021/07/12/aqua-security-buys-open-source-infrastructure-code-scanning-tool-tfsec/ |access-date=2024-07-18 |website=SiliconANGLE |language=en-US}}</ref>
1108:
emerging cloud security trend offers 'good news' to businesses |url=https://venturebeat.com/security/why-an-emerging-cloud-security-trend-offers-good-news-to-businesses/ |access-date=2024-07-18 |website=VentureBeat |language=en-US}}</ref><ref>{{Cite web |title=Aqua
Security buys CloudSploit, expands into cloud security {{!}} TechTarget |url=https://www.techtarget.com/searchitoperations/news/252473866/Aqua-Security-buys-CloudSploit-expands-into-cloud-security |access-date=2024-07-18 |website=IT Operations |language=en}}</ref> The company acquired Argon, a startup with capabilities for securing the software supply chain in December 2021.<ref>{{Cite web |last=Alspach |first=Kyle |date=2021-12-01 |title=Aqua Security acquires Argon to protect the software supply chain |url=https://venturebeat.com/security/aqua-security-acquires-argon-to-protect-the-software-supply-chain/ |access-date=2024-07-18 |website=VentureBeat |language=en-US}}</ref> The same year, Aqua acquired tfsec, an ] security scanner for ] (IaC). The acquisition brought integration of tfsec into Aqua Trivy, adding IaC security scanning capabilities. Tfsec's co-founders also joined Aqua following the acquisition.<ref>{{Cite web |last=Vizard |first=Mike |date=2021-07-12 |title=Aqua Security Acquires tfsec to Advance DevSecOps |url=https://devops.com/aqua-security-acquires-tfsec-to-advance-devsecops/ |access-date=2024-07-18 |website=DevOps.com |language=en-US}}</ref><ref>{{Cite web |date=2021-07-12 |title=Aqua Security buys open-source 'infrastructure as code' scanning tool tfsec |url=https://siliconangle.com/2021/07/12/aqua-security-buys-open-source-infrastructure-code-scanning-tool-tfsec/ |access-date=2024-07-18 |website=SiliconANGLE |language=en-US
1307:|url=https://www.google.com.ua/books/edition/Proceedings_of_the_Sixth_International_S/RNOYEAAAQBAJ?hl=uk&gbpv=1&dq=Aqua+Security+Tracee&pg=PA116&printsec=frontcover |title=Proceedings of the Sixth International Scientific Conference โIntelligent Information Technologies for Industryโ (IITIโ22) |last2=Sukhanov |first2=Andrey |last3=Akperov |first3=Imran |last4=Ozdemir |first4=Sebnem |date=2022-10-30 |publisher=Springer Nature |isbn=978-3-031-19620-1 |language=en}}</ref> Tracee provides deep visibility into the behavior of running processes, allowing users to identify anomalies, detect security threats, and conduct forensic investigations.<ref>{{Cite web |date=2024-08-08 |title=Aqua Security unveils Traceeshark at Black Hat Conference 2024 |url=https://www.securityinfowatch.com/cybersecurity/press-release/55131739/aqua-security-aqua-security-unveils-traceeshark-at-black-hat-conference-2024 |access-date=2024-09-26 |website=Security Info Watch |language=en}}</ref> It is particularly useful for monitoring containerized applications and uncovering potential vulnerabilities or exploits in real-time. With its focus on runtime security, Tracee is widely adopted in the DevOps and cloud-native communities to enhance system monitoring and threat detection.<ref>{{Cite book |last=Rice |first=Liz |url=https://www.google.com.ua/books/edition/Learning_eBPF/OqCyEAAAQBAJ?hl=uk&gbpv=1&dq=Aqua+Security+Tracee&pg=PT194&printsec=frontcover |title=Learning eBPF: Programming the Linux Kernel for Enhanced Observability, Networking, and Security |date=2023-03-07 |publisher="O'Reilly Media, Inc." |isbn=978-1-0981-3508-9 |language=en}}</ref>
884:.<ref name=":3">{{Cite web |last=Alspach |first=Kyle |date=2022-01-21 |title='Mass demand' is building for cloud-native security, Aqua CEO says |url=https://venturebeat.com/security/mass-demand-is-building-for-cloud-native-security-aqua-ceo-says/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Wiggers |first=Kyle |date=2021-03-10 |title=Aqua Security protects containerized apps and infrastructure, raises $ 135M |url=https://venturebeat.com/business/aqua-security-protects-containerized-apps-and-infrastructure-raises-135m/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Janofsky |first=Adam |date=May 6, 2019 |title=Container Technology Brings Security Surprises |url=https://www.wsj.com/articles/container-technology-brings-security-surprises-11557160749 |access-date=July 17, 2024 |website=]}}</ref> The company initially focused on ] workload protection and added serverless and VMs in 2017 to achieve comprehensive ] (CWPP) capabilities.<ref>{{Cite web |last=Alspach |first=Kyle |date=2021-11-23 |title=Why an emerging cloud security trend offers 'good news' to businesses |url=https://venturebeat.com/security/why-an-emerging-cloud-security-trend-offers-good-news-to-businesses/ |access-date=2024-07-18 |website=] |language=en-US}}</ref>
873:|url=https://venturebeat.com/security/mass-demand-is-building-for-cloud-native-security-aqua-ceo-says/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Wiggers |first=Kyle |date=2021-03-10 |title=Aqua Security protects containerized apps and infrastructure, raises $ 135M |url=https://venturebeat.com/business/aqua-security-protects-containerized-apps-and-infrastructure-raises-135m/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Janofsky |first=Adam |date=May 6, 2019 |title=Container Technology Brings Security Surprises |url=https://www.wsj.com/articles/container-technology-brings-security-surprises-11557160749 |access-date=July 17, 2024 |website=]}}</ref> The company initially focused on ] workload protection and added serverless and VMs in 2017 to achieve comprehensive ] (CWPP) capabilities.<ref>{{Cite web |last=Alspach |first=Kyle |date=2021-11-23 |title=Why an emerging cloud security trend offers 'good news' to businesses |url=https://venturebeat.com/security/why-an-emerging-cloud-security-trend-offers-good-news-to-businesses/ |access-date=2024-07-18 |website=] |language=en-US}}</ref>
914:
Security Raises $ 9 Million |url=https://www.wsj.com/articles/aqua-security-raises-9-million-1474975806 |access-date=July 17, 2024 |website=]}}</ref> It was followed by a $ 25 million series B funding in 2017.<ref name=":2">{{Cite web |last=Wiggers |first=Kyle |date=2019-04-03 |title=Aqua
Security raises $ 62 million for containerized computing tools |url=https://venturebeat.com/business/aqua-security-raises-62-million-for-containerized-computing-tools/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite news |date=2017-07-18 |title=The Latest App Coding Trend Is a Hacker's Dream |url=https://www.bloomberg.com/news/articles/2017-07-18/the-latest-app-coding-trend-is-a-hacker-s-dream |access-date=2024-07-18 |work=Bloomberg.com |language=en}}</ref> In the spring of 2017 the company opened its ] office.<ref>{{Cite web |date=2024-01-04 |title=Israeli tech unicorn Aqua Security raises $ 60M for its cloud-based cybersecurity approach โ TFN |url=https://techfundingnews.com/israeli-tech-unicorn-aqua-security-raises-60m-for-its-cloud-based-cybersecurity-approach/ |access-date=2024-07-18 |website=Tech Funding News |language=en}}</ref>
906:
Security Raises $ 9 Million |url=https://www.wsj.com/articles/aqua-security-raises-9-million-1474975806 |access-date=July 17, 2024 |website=]}}</ref> It was followed by a $ 25 million series B funding in 2017.<ref name=":2">{{Cite web |last=Wiggers |first=Kyle |date=2019-04-03 |title=Aqua
Security raises $ 62 million for containerized computing tools |url=https://venturebeat.com/business/aqua-security-raises-62-million-for-containerized-computing-tools/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite news |date=2017-07-18 |title=The Latest App Coding Trend Is a Hacker's Dream |url=https://www.bloomberg.com/news/articles/2017-07-18/the-latest-app-coding-trend-is-a-hacker-s-dream |access-date=2024-07-18 |work=Bloomberg.com |language=en}}</ref> In the spring of 2017 the company opened its ] office.<ref>{{Cite web |date=2024-01-04 |title=Israeli tech unicorn Aqua Security raises $ 60M for its cloud-based cybersecurity approach โ TFN |url=https://techfundingnews.com/israeli-tech-unicorn-aqua-security-raises-60m-for-its-cloud-based-cybersecurity-approach/ |access-date=2024-07-18 |website=Tech Funding News |language=en}}</ref>
1275:|first=Luigi |url=https://www.google.com.ua/books/edition/Security_for_Containers_and_Kubernetes/uwHCEAAAQBAJ?hl=uk&gbpv=1&dq=Aqua+Security+Trivy&pg=PA391&printsec=frontcover |title=Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments (English Edition) |date=2023-05-31 |publisher=BPB Publications |isbn=978-93-5551-843-9 |language=en}}</ref> Trivy scans a variety of popular container base images, such as Alpine, CentOS, and Ubuntu, and its integration with major CI/CD platforms like Jenkins and GitLab.<ref>{{Citation |title=aquasecurity/trivy-plugin-aqua |date=2024-09-24 |url=https://github.com/aquasecurity/trivy-plugin-aqua |access-date=2024-09-26 |publisher=Aqua Security}}</ref> Trivy's ability to provide real-time vulnerability detection makes it an essential component of DevOps security.<ref>{{Cite web |last=Giannakopoulosj |date=2023-06-23 |title=SAST โ Security Scan with AquaSec Trivy |url=https://medium.com/@giannakopoulosj/security-scan-with-trivy-f9f87881493b |access-date=2024-09-26 |website=Medium |language=en}}</ref>
806:">{{Cite web |last=Lardinois |first=Frederic |date=2021-03-10 |title=Aqua Security raises $ 135M at a $ 1B valuation for its cloud native security platform |url=https://techcrunch.com/2021/03/10/aqua-security-raises-135m-at-a-1b-valuation-for-its-cloud-native-security-service/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Alspach |first=Kyle |date=2022-03-17 |title=Cybersecurity has 53 unicorns. Here are 10 to watch |url=https://venturebeat.com/security/cybersecurity-has-53-unicorns-here-are-10-to-watch/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last1=Joyner |first1=April |last2=Bort |first2=Julie |title=Over 340 US startups became unicorns in a record-breaking 2021. Here's the full list and their investors. |url=https://www.businessinsider.com/us-unicorn-list-startups-venture-capital-investors-2021-12 |access-date=2024-07-18 |website=] |language=en-US}}</ref>
527:">{{Cite web |last=Lardinois |first=Frederic |date=2021-03-10 |title=Aqua Security raises $ 135M at a $ 1B valuation for its cloud native security platform |url=https://techcrunch.com/2021/03/10/aqua-security-raises-135m-at-a-1b-valuation-for-its-cloud-native-security-service/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last=Alspach |first=Kyle |date=2022-03-17 |title=Cybersecurity has 53 unicorns. Here are 10 to watch |url=https://venturebeat.com/security/cybersecurity-has-53-unicorns-here-are-10-to-watch/ |access-date=2024-07-18 |website=] |language=en-US}}</ref><ref>{{Cite web |last1=Joyner |first1=April |last2=Bort |first2=Julie |title=Over 340 US startups became unicorns in a record-breaking 2021. Here's the full list and their investors. |url=https://www.businessinsider.com/us-unicorn-list-startups-venture-capital-investors-2021-12 |access-date=2024-07-18 |website=] |language=en-US}}</ref>
1179:|title=Aqua Security Tracee |date=2024-07-18 |url=https://github.com/aquasecurity/tracee |access-date=2024-07-18 |publisher=]}}</ref> Trivy Vulnerability Scanner was acquired by Aqua open source team in 2019. Teppei Fukuda, the developer behind Trivy, joined the Aqua Security team after the acquisition. Other tools include Kube-bench, Kube-hunter, and chain-bench.<ref>{{Cite web |last=Zorz |first=Mirko |date=2023-11-08 |title=Aqua Trivy open-source security scanner now finds Kubernetes security risks |url=https://www.helpnetsecurity.com/2023/11/08/aqua-trivy-open-source-security-scanner/ |access-date=2024-07-18 |website=Help Net Security |language=en-US}}</ref><ref>{{Cite web |title=8 vulnerability management tools to consider in 2023 {{!}} TechTarget |url=https://www.techtarget.com/searchsecurity/tip/Vulnerability-management-tools-to-consider |access-date=2024-07-18 |website=Security |language=en}}</ref>
1171:|title=Aqua Security Tracee |date=2024-07-18 |url=https://github.com/aquasecurity/tracee |access-date=2024-07-18 |publisher=]}}</ref> Trivy Vulnerability Scanner was acquired by Aqua open source team in 2019. Teppei Fukuda, the developer behind Trivy, joined the Aqua Security team after the acquisition. Other tools include Kube-bench, Kube-hunter, and chain-bench.<ref>{{Cite web |last=Zorz |first=Mirko |date=2023-11-08 |title=Aqua Trivy open-source security scanner now finds Kubernetes security risks |url=https://www.helpnetsecurity.com/2023/11/08/aqua-trivy-open-source-security-scanner/ |access-date=2024-07-18 |website=Help Net Security |language=en-US}}</ref><ref>{{Cite web |title=8 vulnerability management tools to consider in 2023 {{!}} TechTarget |url=https://www.techtarget.com/searchsecurity/tip/Vulnerability-management-tools-to-consider |access-date=2024-07-18 |website=Security |language=en}}</ref>
1211:
popular open-source tools like Trivy for vulnerability scanning, Kube-hunter for
Kubernetes security testing, and Tracee for runtime security. These features make it a widely used option for businesses looking to secure their cloud environments.<ref>{{Cite web |last=Alspach |first=Kyle |date=2021-11-23 |title=Why an emerging cloud security trend offers โgood newsโ to businesses |url=https://venturebeat.com/security/why-an-emerging-cloud-security-trend-offers-good-news-to-businesses/ |access-date=2024-09-25 |website=VentureBeat |language=en-US}}</ref><ref>{{Cite book |last=Bhuyan |first=Aditya Pratap |url=https://books.google.com/books/about/Mastering_Cloud_Native.html?id=v1oWEQAAQBAJ&redir_esc=y |title=Mastering Cloud Native: A Comprehensive Guide to Containers, DevOps, CI/CD, and Microservices |date=2024-07-26 |publisher=Aditya Pratap Bhuyan |language=en}}</ref>
1152:
enforcement. Aquaโs image scanning tool checks container images for vulnerabilities and malware, ensuring only trusted images are deployed in production. Its runtime protection monitors container behavior in real time, detecting and mitigating threats, while the platform enforces compliance with industry standards by integrating with CI/CD pipelines and container orchestration tools like
Kubernetes.<ref>{{Cite book |last=Bhuyan |first=Aditya Pratap |url=https://www.google.de/books/edition/Mastering_Cloud_Native/v1oWEQAAQBAJ?hl=en&gbpv=1&dq=%22aqua+security%22&pg=PA149&printsec=frontcover |title=Mastering Cloud Native: A Comprehensive Guide to Containers, DevOps, CI/CD, and Microservices |date=2024-07-26 |publisher=Aditya Pratap Bhuyan |language=en}}</ref>
1243:
risk |url=https://www.techradar.com/news/misconfigured-registries-are-putting-hundreds-of-top-businesses-at-risk |access-date=2024-09-26 |website=TechRadar |language=en}}</ref><ref>{{Cite web |last=Stadler |first=Tobias |date=7 February 2023 |title=Antivirenprogramme chancenlos: Sicherheitsexperten warnen vor neuer
Malware |url=https://www.chip.de/news/Sicherheitsexperten-warnen-vor-neuer-Malware-Antivirenprogramme-haben-keine-Chance_184642479.html |website=Chip Magazine}}</ref>
1110:}}</ref> Aqua Security's cloud-native application protection platform (CNAPP) was highlighted by Gartner Inc. as having a "high impact" in its 2022 top strategic technology trends, although the firm also projected that widespread adoption of CNAPP could take five to ten years.<ref>{{Cite web |title=Aqua Security makes its largest acquisition |url=https://www.bizjournals.com/boston/news/2021/12/01/aqua-security-acquires-argon.html |access-date=2024-09-25 |website=www.bizjournals.com
1956:(eBPF) technology. Tracee provides deep visibility into the behavior of running processes, allowing users to identify anomalies, detect security threats, and conduct forensic investigations. It is particularly useful for monitoring containerized applications and uncovering potential vulnerabilities or exploits in real-time. With its focus on runtime security, Tracee is widely adopted in the DevOps and cloud-native communities to enhance system monitoring and threat detection.
1698:
1902:(IaC). The acquisition brought integration of tfsec into Aqua Trivy, adding IaC security scanning capabilities. Tfsec's co-founders also joined Aqua following the acquisition. Aqua Security's cloud-native application protection platform (CNAPP) was highlighted by Gartner Inc. as having a "high impact" in its 2022 top strategic technology trends, although the firm also projected that widespread adoption of CNAPP could take five to ten years.
1480:
1439:
992:><ref>{{Cite web |last=Holmes |first=Aaron |title=Investors sunk billions into these 14 cybersecurity startups as the pandemic and massive hacks like SolarWinds made the industry more vital than ever |url=https://www.businessinsider.com/cybersecurity-startups-unicorns-billion-dollar-valuation-snyk-sentinelone-netskope-cato-2021-4 |access-date=2024-07-18 |website=Business Insider |language=en-US}}</ref>
71:
1911:
enforcement. Aquaโs image scanning tool checks container images for vulnerabilities and malware, ensuring only trusted images are deployed in production. Its runtime protection monitors container behavior in real time, detecting and mitigating threats, while the platform enforces compliance with industry standards by integrating with CI/CD pipelines and container orchestration tools like
Kubernetes.
1546:
1965:
configurations, and other potential risks. Kube-hunter is widely used by administrators and security teams to strengthen
Kubernetes deployments, providing actionable insights to mitigate identified threats. Its ease of use and ability to simulate real-world attack scenarios make it a valuable tool for improving the security posture of Kubernetes environments.
962:
billions into these 14 cybersecurity startups as the pandemic and massive hacks like SolarWinds made the industry more vital than ever |url=https://www.businessinsider.com/cybersecurity-startups-unicorns-billion-dollar-valuation-snyk-sentinelone-netskope-cato-2021-4 |access-date=2024-07-18 |website=Business
Insider |language=en-US}}</ref>
1942:
Aqua Security's Trivy is a comprehensive, open-source vulnerability scanner used to detect security flaws in container images. Featured in the book Kubernetes in Production Best Practices, Trivy is highlighted as a critical tool for securing CI/CD pipelines. Trivy scans a variety of popular container
1242:
Aqua Nautilus is the dedicated research team within Aqua Security, focused on identifying and analyzing security threats in cloud-native environments.<ref>{{Cite web |last=published |first=Sead Fadilpaลกiฤ |date=2023-04-24 |title=Misconfigured registries are putting hundreds of top businesses at
1178:
Aqua Security has an open-source development team responsible for several open-source tools, including Trivy<ref>{{Citation |title=Aqua Security Trivy |date=2024-07-18 |url=https://github.com/aquasecurity/trivy |access-date=2024-07-18 |publisher=]}}</ref> and Tracee.<ref>{{Citation
1170:
Aqua Security has an open-source development team responsible for several open-source tools, including Trivy<ref>{{Citation |title=Aqua Security Trivy |date=2024-07-18 |url=https://github.com/aquasecurity/trivy |access-date=2024-07-18 |publisher=]}}</ref> and Tracee.<ref>{{Citation
1923:
The Aqua Platform is a cloud-native security solution that helps protect applications, workloads, and infrastructure across multiple cloud environments. It includes tools for vulnerability scanning, runtime protection, and compliance management throughout the development process. Aqua also provides
1210:
The Aqua Platform is a cloud-native security solution that helps protect applications, workloads, and infrastructure across multiple cloud environments. It includes tools for vulnerability scanning, runtime protection, and compliance management throughout the development process. Aqua also provides
961:
Aqua raised $ 30 million in a series D round closed in May 2020.<ref name=":0" /> In March 2021 Aqua raised $ 135 million in series E funding, led by ION Crossover Partners at a $ 1 billion valuation.<ref name=":1" /><ref>{{Cite web |last=Holmes |first=Aaron |title=Investors sunk
1914:
Aqua Security has an open-source development team responsible for several open-source tools, including Trivy and Tracee. Trivy Vulnerability Scanner was acquired by Aqua open source team in 2019. Teppei Fukuda, the developer behind Trivy, joined the Aqua Security team after the acquisition. Other
1794:
is a cloud-native application protection platform and an eponymous company that develops security solutions for applications and infrastructure. Founded in Israel in 2015, the company reached a $ 1 billion valuation in 2021. Aqua Security is known for its key open-source tools, including Trivy, a
1021:
In June 2022 Aqua Security and the ] (CIS) released the first formal guidelines for ] security. CIS Software Supply Chain Security Guide provides enterprises with foundational recommendations for securing the software supply chain against threat actors.<ref>{{Cite web |last=Keary |first=Tim
1013:
In June 2022 Aqua Security and the ] (CIS) released the first formal guidelines for ] security. CIS Software Supply Chain Security Guide provides enterprises with foundational recommendations for securing the software supply chain against threat actors.<ref>{{Cite web |last=Keary |first=Tim
913:
In September 2016, the company raised $ 9 million in Series A funding led by ]. Previous investors TLV Partners and ] also participated in the round, bringing Aqua's total investment to date to $ 13.5 million.<ref>{{Cite web |last=Zakrzewski |first=Cat |date=September 27, 2016 |title=Aqua
905:
In September 2016, the company raised $ 9 million in Series A funding led by ]. Previous investors TLV Partners and ] also participated in the round, bringing Aqua's total investment to date to $ 13.5 million.<ref>{{Cite web |last=Zakrzewski |first=Cat |date=September 27, 2016 |title=Aqua
1964:
Kube-hunter is an open-source Kubernetes security tool developed by Aqua Security, designed to identify vulnerabilities and misconfigurations in Kubernetes clusters. It performs a proactive security assessment by scanning for common security issues and weaknesses, such as open ports, insecure
1274:
Aqua Security's Trivy is a comprehensive, open-source vulnerability scanner used to detect security flaws in container images. Featured in the book Kubernetes in Production Best Practices, Trivy is highlighted as a critical tool for securing CI/CD pipelines.<ref>{{Cite book |last=Aversa
1107:
In 2019 Aqua Security acquired CloudSploit, a cloud security posture management company, which tracks and enforces practices on the security of user and service accounts on public cloud platforms such as ], ] and ].<ref>{{Cite web |last=Alspach |first=Kyle |date=2021-11-23 |title=Why an
1099:
In 2019 Aqua Security acquired CloudSploit, a cloud security posture management company, which tracks and enforces practices on the security of user and service accounts on public cloud platforms such as ], ] and ].<ref>{{Cite web |last=Alspach |first=Kyle |date=2021-11-23 |title=Why an
1910:
Aqua Security offers a range of security features designed for containerized and cloud-native environments through its Aqua Platform. This platform provides protection for applications deployed in containers, focusing on key areas such as image scanning, runtime protection, and compliance
1151:
Aqua Security offers a range of security features designed for containerized and cloud-native environments through its Aqua Platform. This platform provides protection for applications deployed in containers, focusing on key areas such as image scanning, runtime protection, and compliance
1338:
Kube-hunter is an open-source Kubernetes security tool developed by Aqua Security, designed to identify vulnerabilities and misconfigurations in Kubernetes clusters.<ref>{{Cite web |title=Aqua Security Introduces Industry-First Kubernetes Vulnerability Scanning With Trivy KBOM
1306:
Tracee is an open-source runtime security and forensics tool developed by Aqua Security. It is designed to detect and analyze suspicious activity in cloud-native environments by leveraging Linux's extended ] (eBPF) technology.<ref>{{Cite book |last=Kovalev |first=Sergey
939:
Aqua Security raised $ 62 million in 2019 in funding led by ], with participation from ], M12 (]), TLV Partners, and Shlomo Kramer.<ref name=":2" /><ref>{{Cite web |last=Miller |first=Ron |date=2019-04-03 |title=Container security startup Aqua lands $ 62M Series C
931:
Aqua Security raised $ 62 million in 2019 in funding led by ], with participation from ], M12 (]), TLV Partners, and Shlomo Kramer.<ref name=":2" /><ref>{{Cite web |last=Miller |first=Ron |date=2019-04-03 |title=Container security startup Aqua lands $ 62M Series C
1811:, Israel in 2015 by Dror Davidoff, who serves as the CEO and Amir Jerbi, CTO. They both have experience in high-tech industries. Jerbi specializes in the technological side of operations, while Davidoff focuses on business and marketing. The company initially focused on
1053:
In January 2024, the company raised $ 60 million, extending its Series E round of funding to $ 195 million.<ref name=":4">{{Cite web |last=Sawers |first=Paul |date=2024-01-03 |title=Cloud-native cybersecurity startup Aqua Security raises $ 60M and remains a unicorn
1045:
In January 2024, the company raised $ 60 million, extending its Series E round of funding to $ 195 million.<ref name=":4">{{Cite web |last=Sawers |first=Paul |date=2024-01-03 |title=Cloud-native cybersecurity startup Aqua Security raises $ 60M and remains a unicorn
820:
research team, Aqua Nautilus, focused on ] research of the cloud native ecosystem.<ref>{{Cite web |last=Lyons |first=Jessica |date=16 August 2023 |title=PowerShell? More like PowerHell: Microsoft won't fix flaws in package gallery ripe for supply chain attacks
541:
research team, Aqua Nautilus, focused on ] research of the cloud native ecosystem.<ref>{{Cite web |last=Lyons |first=Jessica |date=16 August 2023 |title=PowerShell? More like PowerHell: Microsoft won't fix flaws in package gallery ripe for supply chain attacks
161:
1022:|date=2022-06-22 |title=Aqua Security and CIS release first formal guidelines for software supply chain security |url=https://venturebeat.com/security/software-supply-chain-security/ |access-date=2024-07-18 |website=VentureBeat |language=en-US}}</ref>
1014:|date=2022-06-22 |title=Aqua Security and CIS release first formal guidelines for software supply chain security |url=https://venturebeat.com/security/software-supply-chain-security/ |access-date=2024-07-18 |website=VentureBeat |language=en-US}}</ref>
872:
Aqua Security was founded in ], Israel in 2015 by Dror Davidoff, who serves as the CEO and Amir Jerbi, CTO.<ref name=":3">{{Cite web |last=Alspach |first=Kyle |date=2022-01-21 |title='Mass demand' is building for cloud-native security, Aqua CEO says
63:
1924:
popular open-source tools like Trivy for vulnerability scanning, Kube-hunter for Kubernetes security testing, and Tracee for runtime security. These features make it a widely used option for businesses looking to secure their cloud environments.
1943:
base images, such as Alpine, CentOS, and Ubuntu, and its integration with major CI/CD platforms like Jenkins and GitLab. Trivy's ability to provide real-time vulnerability detection makes it an essential component of DevOps security.
2888:
3347:
974:
web |last1=Elder |first1=Jeff |last2=Vedantam |first2=Keerthi |title=Developer security is booming as hack-prevention starts earlier than ever: Here are the 25 startups you need to know in this red-hot space
3273:
1951:
Tracee is an open-source runtime security and forensics tool developed by Aqua Security. It is designed to detect and analyze suspicious activity in cloud-native environments by leveraging Linux's extended
1881:
In 2019 Aqua Security acquired CloudSploit, a cloud security posture management company, which tracks and enforces practices on the security of user and service accounts on public cloud platforms such as
3502:
1830:
also participated in the round, bringing Aqua's total investment to date to $ 13.5 million. It was followed by a $ 25 million series B funding in 2017. In the spring of 2017 the company opened its
3529:
1054:|url=https://techcrunch.com/2024/01/03/cloud-native-cybersecurity-startup-aqua-security-raises-60m-and-remains-a-unicorn/ |access-date=2024-07-18 |website=TechCrunch |language=en-US}}</ref>
1046:|url=https://techcrunch.com/2024/01/03/cloud-native-cybersecurity-startup-aqua-security-raises-60m-and-remains-a-unicorn/ |access-date=2024-07-18 |website=TechCrunch |language=en-US}}</ref>
15:
3475:
3069:
1852:
Aqua raised $ 30 million in a series D round closed in May 2020. In March 2021 Aqua raised $ 135 million in series E funding, led by ION Crossover Partners at a $ 1 billion valuation.
3399:
3373:
818:
its key open-source tools, including Trivy, a vulnerability scanner, Kube-hunter, a Kubernetes security testing tool, and Tracee, a runtime security and forensic tool. Also, it has a
1795:
vulnerability scanner, Kube-hunter, a Kubernetes security testing tool, and Tracee, a runtime security and forensic tool. Also, it has a research team, Aqua Nautilus, focused on
979:/www.businessinsider.com/startups-devsecopps-developer-security-operations-cybersecurity-snyk-contrast-auth0-2020-11 |access-date=2024-07-18 |website=] |language=en-US}}</ref
990:/techcrunch.com/2021/03/10/aqua-security-raises-135m-at-a-1b-valuation-for-its-cloud-native-security-service/ |access-date=2024-07-18 |website=] |language=en-US}}</ref
1863:
security. CIS Software Supply Chain Security Guide provides enterprises with foundational recommendations for securing the software supply chain against threat actors.
3425:
1490:
2790:
882:. They both have experience in high-tech industries. Jerbi specializes in the technological side of operations, while Davidoff focuses on business and marketing
179:
2736:
986:
web |last=Lardinois |first=Frederic |date=2021-03-10 |title=Aqua Security raises $ 135M at a $ 1B valuation for its cloud native security platform |url=https:
3254:
940:|url=https://techcrunch.com/2019/04/03/container-security-startup-aqua-lands-62m-series-c/ |access-date=2024-07-18 |website=] |language=en-US}}</ref>
932:|url=https://techcrunch.com/2019/04/03/container-security-startup-aqua-lands-62m-series-c/ |access-date=2024-07-18 |website=] |language=en-US}}</ref>
2945:
1894:. The company acquired Argon, a startup with capabilities for securing the software supply chain in December 2021. The same year, Aqua acquired tfsec, an
217:
144:
168:
2683:
1932:
Aqua Nautilus is the dedicated research team within Aqua Security, focused on identifying and analyzing security threats in cloud-native environments.
2840:
2791:"Investors sunk billions into these 14 cybersecurity startups as the pandemic and massive hacks like SolarWinds made the industry more vital than ever"
2763:
2161:
3620:
2469:
2400:
2295:
2445:
3610:
3019:
2519:
1615:
981:> In March 2021 Aqua raised $ 135 million in series E funding, led by ION Crossover Partners at a $ 1 billion valuation.<ref name=":1"
2737:"Developer security is booming as hack-prevention starts earlier than ever: Here are the 25 startups you need to know in this red-hot space"
2094:
3229:
1505:
3187:
2921:
2574:
1869:
The company's global headquarters is located in Ramat Gan, Israel, with US headquarters in Boston, Massachusetts, and R&D Center in
1388:* Liz Rice, ''Container Security: Fundamental Technology Concepts that Protect Containerized Applications'', 2020 {{ISBN|9781492056706}}
175:
3275:
Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments (English Edition)
2970:
2632:
2658:
72:
2424:
2019:
3212:
2493:
2140:
156:
93:
31:
28:
1625:
Feel free to improve the article, but do not remove this notice before the discussion is closed. For more information, see the
3615:
3605:
3539:
3512:
3485:
3409:
3357:
3283:
2215:
1669:
3600:
3162:
186:
3349:
Proceedings of the Sixth International Scientific Conference โIntelligent Information Technologies for Industryโ (IITIโ22)
2546:
2323:
1641:
2709:
1558:
3044:
2188:
1983:
1816:
111:
3138:
2375:
677:
02 |title=ืืงืืื ืกืงืืืจืืื ืจืืืฉืช ืืืจื ืืฉืจืืืืช ืฉืชืื ืขื ืืคืชืื ืชืืื ื |url=https://www.ice.co.il/finance/news/article/836868
1995:
1648:
1590:
1527:
1466:
821:|url=https://www.theregister.com/2023/08/16/microsoft_powershell_gallery_flaws/ |access-date=2024-07-18 |website=]}}
542:|url=https://www.theregister.com/2023/08/16/microsoft_powershell_gallery_flaws/ |access-date=2024-07-18 |website=]}}
152:
89:
1566:
1509:
100:
3531:
Learn Kubernetes Security: Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
1655:
1562:
1452:
2243:"PowerShell? More like PowerHell: Microsoft won't fix flaws in package gallery ripe for supply chain attacks"
2242:
132:
Altered title. Add: authors 1-1. Removed parameters. Some additions/deletions were parameter name changes. |
3322:
1866:
In January 2024, the company raised $ 60 million, extending its Series E round of funding to $ 195 million.
1856:
1812:
880:
Aqua Security was founded in ], Israel in 2015 by Dror Davidoff, who serves as the CEO and Amir Jerbi, CTO
3450:
2350:
2216:"Over 340 US startups became unicorns in a record-breaking 2021. Here's the full list and their investors"
1637:
2601:
1842:
1626:
2995:
2889:"Aqua Security announces $ 135 million series E funding, to double Hyderabad R&D centre headcount"
1620:
2815:
2684:"Israeli tech unicorn Aqua Security raises $ 60M for its cloud-based cybersecurity approach โ TFN"
3401:
Learning eBPF: Programming the Linux Kernel for Enhanced Observability, Networking, and Security
2269:
1953:
1899:
210:
107:
3214:
Mastering Cloud Native: A Comprehensive Guide to Containers, DevOps, CI/CD, and Microservices
3071:
Mastering Cloud Native: A Comprehensive Guide to Containers, DevOps, CI/CD, and Microservices
1860:
1823:
66:
3426:"Aqua Security Introduces Industry-First Kubernetes Vulnerability Scanning With Trivy KBOM"
1662:
2816:"Aqua Security and CIS release first formal guidelines for software supply chain security"
8:
1887:
2864:
2764:"Aqua Security raises $ 135M at a $ 1B valuation for its cloud native security platform"
2162:"Aqua Security raises $ 135M at a $ 1B valuation for its cloud native security platform"
1497:
1458:
1406:* Chris Binnie and Rory McCune, ''Cloud Native Security,'' 2021 {{ISBN|978-1119782230}}
1399:* Chris Binnie and Rory McCune, ''Cloud Native Security,'' 2021 {{ISBN|978-1119782230}}
3535:
3508:
3481:
3405:
3353:
3279:
2896:
2841:"Cloud-native cybersecurity startup Aqua Security raises $ 60M and remains a unicorn"
1991:
1979:
1796:
3299:
2114:
2069:
2045:
2741:
2220:
1838:
16:
1815:
workload protection and added serverless and VMs in 2017 to achieve comprehensive
3346:
Kovalev, Sergey; Sukhanov, Andrey; Akperov, Imran; Ozdemir, Sebnem (2022-10-30).
1891:
1422:* Luigi Aversa, ''Security for Containers and Kubernetes {{ISBN|9789355518439}}''
1415:* Luigi Aversa, ''Security for Containers and Kubernetes {{ISBN|9789355518439}}''
969:
Aqua raised $ 30 million in a series D round closed in May 2020.<ref name=":0"
1501:
137:
118:
3594:
3255:"Antivirenprogramme chancenlos: Sicherheitsexperten warnen vor neuer Malware"
3139:"Aqua Trivy open-source security scanner now finds Kubernetes security risks"
3020:"Aqua Security buys open-source 'infrastructure as code' scanning tool tfsec"
2900:
2520:"Aqua Security protects containerized apps and infrastructure, raises $ 135M"
1827:
1822:
In September 2016, the company raised $ 9 million in Series A funding led by
133:
47:
2274:
2247:
205:
2946:"Aqua Security buys CloudSploit, expands into cloud security | TechTarget"
2095:"ืืงืืื ืกืงืืืจืืื ืืืคืืช ืืื ืงืจื: "ืืฉ 'ืืืืค' ืืขื ืฃ, ืืื ืื ื ืืฉ ืืืฆืืขืื ืืืงืื""
3581:
3230:"Misconfigured registries are putting hundreds of top businesses at risk"
3111:
2637:
2579:
2524:
2300:
2193:
2024:
1895:
3572:
3085:
2296:"Aqua Security: 97% unaware of crucial cloud native security principles"
3188:"Why an emerging cloud security trend offers 'good news' to businesses"
2922:"Why an emerging cloud security trend offers 'good news' to businesses"
2768:
2714:
2575:"Why an emerging cloud security trend offers 'good news' to businesses"
2166:
1697:
2633:"Aqua Security raises $ 62 million for containerized computing tools"
2328:
2145:
2099:
1870:
1846:
1808:
1740:
669:
fdfbb0b00000 |website=]}}</ref><ref>{{Cite web |date=2021
3562:
2020:"'Mass demand' is building for cloud-native security, Aqua CEO says"
3163:"8 vulnerability management tools to consider in 2023 | TechTarget"
2971:"Aqua Security acquires Argon to protect the software supply chain"
2470:"Millions of GitHub repositories vulnerable to RepoJacking: Report"
2070:"Dror Davidoff, Aqua Security Software Ltd: Profile and Biography"
1555:
may have been created or edited in return for undisclosed payments
2494:"Memory-based attacks increase as attackers dodge cloud defenses"
2446:"Ubuntu 'command-not-found' tool can be abused to spread malware"
3374:"Aqua Security unveils Traceeshark at Black Hat Conference 2024"
3585:
3576:
3117:
3091:
2046:"Amir Jerbi, Aqua Security Software Ltd: Profile and Biography"
1883:
1831:
1744:
3345:
2141:"ืืงืืื ืกืงืืืจืืื ืืืืกื 60 ืืืืืื ืืืืจ ืืฉืืื ืฉื ืืคื ื ืฉืืืฉ ืฉื ืื"
1675:%5B%5BWikipedia%3AArticles+for+deletion%2FAqua+Security%5D%5D
1837:
Aqua Security raised $ 62 million in 2019 in funding led by
1545:
3557:
2401:"Aqua Security Reveals Crucial Insights On Kinsing Malware"
2324:"Most cloud cyberattacks just want to mine cryptocurrency"
2606:
2551:
2376:"'Phantom' Source Code Secrets Haunt Major Organizations"
2270:"HeadCrab bots pinch 1,000+ Redis servers to mine coins"
1915:
tools include Kube-bench, Kube-hunter, and chain-bench.
2865:"Aqua Security Software Ltd - Company Profile and News"
2115:"ืืงืืื ืกืงืืืจืืื ืจืืืฉืช ืืืจื ืืฉืจืืืืช ืฉืชืื ืขื ืืคืชืื ืชืืื ื"
200:
added multiple reliable sources, github, added software
2710:"Container security startup Aqua lands $ 62M Series C"
1783:
565:
security solutions for applications and infrastructure
54:
3567:
2189:"Cybersecurity has 53 unicorns. Here are 10 to watch"
1561:. It may require cleanup to comply with Knowledge's
1508:, and by adding encyclopedic content written from a
2996:"Aqua Security Acquires tfsec to Advance DevSecOps"
1687:
Israeli cloud-native application protection company
1610:An editor has nominated this article for deletion.
3451:"Aqua Security Uncovers Major Kubernetes Attacks"
2659:"The Latest App Coding Trend Is a Hacker's Dream"
2351:"Aqua Security Uncovers Major Kubernetes Attacks"
3592:
2547:"Container Technology Brings Security Surprises"
3448:
3320:
2348:
1859:(CIS) released the first formal guidelines for
140:. | Suggested by Eastmain | #UCB_webform 41/339
3045:"Aqua Security makes its largest acquisition"
3528:Huang, Kaizhe; Jumde, Pranjal (2020-07-09).
3473:
1467:Learn how and when to remove these messages
329:as hack-prevention starts earlier than ever
3527:
3474:Binnie, Chris; McCune, Rory (2021-06-18).
2599:
1696:
3501:Ortega, Candel Jose Manuel (2020-03-23).
3449:Vaughan-Nichols, Steven J. (2023-08-09).
3323:"SAST โ Security Scan with AquaSec Trivy"
3228:published, Sead Fadilpaลกiฤ (2023-04-24).
3227:
2761:
2734:
2349:Vaughan-Nichols, Steven J. (2023-08-09).
2321:
2159:
1591:Learn how and when to remove this message
1528:Learn how and when to remove this message
3621:Technology companies established in 2015
2544:
1799:research of the cloud native ecosystem.
3252:
3185:
2968:
2919:
2630:
2572:
2517:
2373:
2186:
2017:
1990:Security for Containers and Kubernetes
1905:
1429:Revision as of 11:27, 26 September 2024
153:Revision as of 11:27, 26 September 2024
90:Revision as of 01:31, 16 September 2024
3593:
3500:
3271:
3210:
3067:
2993:
2838:
2707:
2600:Zakrzewski, Cat (September 27, 2016).
2213:
1826:. Previous investors TLV Partners and
1489:contains content that is written like
3611:Israeli companies established in 2015
2813:
2626:
2624:
2267:
2240:
1677:
3397:
3211:Bhuyan, Aditya Pratap (2024-07-26).
3136:
3068:Bhuyan, Aditya Pratap (2024-07-26).
2092:
2013:
2011:
1849:), TLV Partners, and Shlomo Kramer.
1602:
1539:
1473:
1432:
80:
46:
3253:Stadler, Tobias (7 February 2023).
2425:"Kinsing malware still on the rise"
2398:
2138:
1855:In June 2022 Aqua Security and the
553:cloud-native application protection
216:
203:
198:
167:
150:
143:
130:
99:
87:
13:
2832:
2788:
2762:Lardinois, Frederic (2021-03-10).
2755:
2728:
2621:
2602:"Aqua Security Raises $ 9 Million"
2268:Lyons, Jessica (4 February 2023).
2160:Lardinois, Frederic (2021-03-10).
2153:
1817:Cloud Workload Protection Platform
1674:
1613:You are welcome to participate in
1431:
35:
3632:
3551:
2322:Spadafora, Anthony (2020-09-14).
2241:Lyons, Jessica (16 August 2023).
2093:ืขืืจื, ืืจืืืืืฅ' (March 10, 2021).
2008:
1448:This article has multiple issues.
2735:Elder, Jeff; Vedantam, Keerthi.
2374:Arghire, Ionut (June 27, 2024).
1927:
1918:
1544:
1478:
1437:
695:}}</ref><ref>{{Cite
416:}}</ref><ref>{{Cite
3521:
3494:
3467:
3442:
3418:
3391:
3366:
3339:
3314:
3292:
3265:
3246:
3221:
3204:
3179:
3155:
3130:
3104:
3078:
3061:
3037:
3012:
2987:
2962:
2938:
2913:
2881:
2857:
2807:
2782:
2701:
2676:
2651:
2593:
2566:
2538:
2511:
2486:
2462:
2438:
2417:
2392:
2367:
2342:
2315:
2288:
2261:
2234:
1876:
1456:or discuss these issues on the
3504:DevOps and Containers Security
3321:Giannakopoulosj (2023-06-23).
3301:aquasecurity/trivy-plugin-aqua
2545:Janofsky, Adam (May 6, 2019).
2207:
2180:
2132:
2107:
2086:
2062:
2038:
1974:Chris Binnie and Rory McCune,
1959:
271:application protection company
1:
2139:ืืืจ, ืืืคืืจ (3 January 2024).
2002:
1968:
1807:Aqua Security was founded in
1557:, a violation of Knowledge's
1427:
1384:
1334:
1323:
1314:
1302:
1291:
1282:
1270:
1259:
1250:
1238:
1227:
1218:
1206:
1195:
1186:
1159:
1147:
1103:
1095:
1017:
1009:
965:
957:
876:
868:
829:
545:
354:to know in this red-hot space
260:
3616:Companies based in Ramat Gan
3606:Software companies of Israel
3272:Aversa, Luigi (2023-05-31).
3186:Alspach, Kyle (2021-11-23).
2969:Alspach, Kyle (2021-12-01).
2920:Alspach, Kyle (2021-11-23).
2631:Wiggers, Kyle (2019-04-03).
2573:Alspach, Kyle (2021-11-23).
2518:Wiggers, Kyle (2021-03-10).
2214:Joyner, April; Bort, Julie.
2187:Alspach, Kyle (2022-03-17).
2018:Alspach, Kyle (2022-01-21).
1857:Center for Internet Security
499:access-date=2024-07-18 |work
18:Browse history interactively
7:
3601:Computer security companies
3563:Aqua Research Team Nautilus
3304:, Aqua Security, 2024-09-24
2994:Vizard, Mike (2021-07-12).
2839:Sawers, Paul (2024-01-03).
1843:Lightspeed Venture Partners
1621:whether or not to retain it
10:
3637:
3404:. "O'Reilly Media, Inc.".
3137:Zorz, Mirko (2023-11-08).
2708:Miller, Ron (2019-04-03).
1841:, with participation from
1802:
1140:== Open source products ==
1133:== Open source products ==
697:web |last=ืืืจ |first=ืืืคืืจ
3480:. John Wiley & Sons.
2814:Keary, Tim (2022-06-22).
1946:
1779:
1760:
1750:
1736:
1732:Dror Davidoff, Amir Jerbi
1728:
1720:
1712:
1704:
1695:
1391:
1332:
1321:
1312:
1300:
1289:
1280:
1268:
1257:
1248:
1236:
1225:
1216:
1204:
1193:
1184:
1157:
1145:
1062:
1059:
922:
919:
836:
653:article/.premium/0000017f
555:platform and an eponymous
523:valuation.<ref name=":
227:
224:
149:
86:
3534:. Packt Publishing Ltd.
3398:Rice, Liz (2023-03-07).
1935:
1847:Microsoft's venture fund
567:.<ref>{{Cite web |
187:Extended confirmed users
3217:. Aditya Pratap Bhuyan.
3074:. Aditya Pratap Bhuyan.
2121:(in Hebrew). 2021-12-02
1616:the deletion discussion
549:'''Aqua Security''' is
264:'''Aqua Security''' is
85:
1976:Cloud Native Security,
1954:Berkeley Packet Filter
1900:Infrastructure as Code
3558:Aqua Security website
3477:Cloud Native Security
1898:security scanner for
1861:software supply chain
1819:(CWPP) capabilities.
1567:neutral point of view
1510:neutral point of view
1231:=== Aqua Nautilus ===
1199:=== Aqua Platform ===
3507:. BPB Publications.
3278:. BPB Publications.
3113:Aqua Security Tracee
1906:Open source products
1619:, which will decide
3430:www.darkreading.com
3378:Security Info Watch
3352:. Springer Nature.
3087:Aqua Security Trivy
3049:www.bizjournals.com
1769:Dror Davidoff (CEO)
1692:
1502:promotional content
1327:=== Kube-hunter ===
1263:=== '''Trivy''' ===
2893:The Times of India
1824:Microsoft Ventures
1690:
1504:and inappropriate
1090:== Acquisitions ==
1083:== Acquisitions ==
679:|access-date=2024-
400:|access-date=2024-
165:
97:
3541:978-1-83921-218-5
3514:978-93-89423-54-9
3487:978-1-119-78224-7
3411:978-1-0981-3508-9
3359:978-3-031-19620-1
3285:978-93-5551-843-9
3143:Help Net Security
2688:Tech Funding News
1789:
1788:
1685:
1684:
1673:
1627:guide to deletion
1601:
1600:
1593:
1583:
1582:
1538:
1537:
1530:
1471:
1426:
785:in Israel in 2015
780:=]}}</ref>
726:ืฉื ืืคื ื ืฉืืืฉ ืฉื ืื
635:|url=https://www.
491:over-1b-valuation
356:|url=https://www.
151:
88:
68:
3628:
3546:
3545:
3525:
3519:
3518:
3498:
3492:
3491:
3471:
3465:
3464:
3462:
3461:
3446:
3440:
3439:
3437:
3436:
3422:
3416:
3415:
3395:
3389:
3388:
3386:
3385:
3370:
3364:
3363:
3343:
3337:
3336:
3334:
3333:
3318:
3312:
3311:
3310:
3309:
3296:
3290:
3289:
3269:
3263:
3262:
3250:
3244:
3243:
3241:
3240:
3225:
3219:
3218:
3208:
3202:
3201:
3199:
3198:
3183:
3177:
3176:
3174:
3173:
3159:
3153:
3152:
3150:
3149:
3134:
3128:
3127:
3126:
3125:
3108:
3102:
3101:
3100:
3099:
3082:
3076:
3075:
3065:
3059:
3058:
3056:
3055:
3041:
3035:
3034:
3032:
3031:
3016:
3010:
3009:
3007:
3006:
2991:
2985:
2984:
2982:
2981:
2966:
2960:
2959:
2957:
2956:
2942:
2936:
2935:
2933:
2932:
2917:
2911:
2910:
2908:
2907:
2885:
2879:
2878:
2876:
2875:
2861:
2855:
2854:
2852:
2851:
2836:
2830:
2829:
2827:
2826:
2811:
2805:
2804:
2802:
2801:
2795:Business Insider
2786:
2780:
2779:
2777:
2776:
2759:
2753:
2752:
2750:
2749:
2742:Business Insider
2732:
2726:
2725:
2723:
2722:
2705:
2699:
2698:
2696:
2695:
2680:
2674:
2673:
2671:
2670:
2655:
2649:
2648:
2646:
2645:
2628:
2619:
2618:
2616:
2614:
2597:
2591:
2590:
2588:
2587:
2570:
2564:
2563:
2561:
2559:
2542:
2536:
2535:
2533:
2532:
2515:
2509:
2508:
2506:
2505:
2490:
2484:
2483:
2481:
2480:
2466:
2460:
2459:
2457:
2456:
2450:BleepingComputer
2442:
2436:
2435:
2433:
2432:
2421:
2415:
2414:
2412:
2411:
2396:
2390:
2389:
2387:
2386:
2371:
2365:
2364:
2362:
2361:
2346:
2340:
2339:
2337:
2336:
2319:
2313:
2312:
2310:
2309:
2292:
2286:
2285:
2283:
2282:
2265:
2259:
2258:
2256:
2255:
2238:
2232:
2231:
2229:
2228:
2221:Business Insider
2211:
2205:
2204:
2202:
2201:
2184:
2178:
2177:
2175:
2174:
2157:
2151:
2150:
2136:
2130:
2129:
2127:
2126:
2111:
2105:
2104:
2090:
2084:
2083:
2081:
2080:
2066:
2060:
2059:
2057:
2056:
2042:
2036:
2035:
2033:
2032:
2015:
1839:Insight Partners
1772:Amir Jerbi (CTO)
1700:
1693:
1689:
1679:
1676:
1672:
1631:
1603:
1596:
1589:
1578:
1575:
1563:content policies
1548:
1540:
1533:
1526:
1522:
1519:
1513:
1491:an advertisement
1482:
1481:
1474:
1463:
1441:
1440:
1433:
1367:== Literature ==
1360:== Literature ==
802:.<ref name=":
758:article/0000018c
288:>{{Cite web |
214:
213:
201:
193:
183:
164:
159:
141:
125:
115:
96:
69:
60:
59:
57:
52:
50:
42:
39:
21:
19:
3636:
3635:
3631:
3630:
3629:
3627:
3626:
3625:
3591:
3590:
3554:
3549:
3542:
3526:
3522:
3515:
3499:
3495:
3488:
3472:
3468:
3459:
3457:
3447:
3443:
3434:
3432:
3424:
3423:
3419:
3412:
3396:
3392:
3383:
3381:
3372:
3371:
3367:
3360:
3344:
3340:
3331:
3329:
3319:
3315:
3307:
3305:
3298:
3297:
3293:
3286:
3270:
3266:
3251:
3247:
3238:
3236:
3226:
3222:
3209:
3205:
3196:
3194:
3184:
3180:
3171:
3169:
3161:
3160:
3156:
3147:
3145:
3135:
3131:
3123:
3121:
3110:
3109:
3105:
3097:
3095:
3084:
3083:
3079:
3066:
3062:
3053:
3051:
3043:
3042:
3038:
3029:
3027:
3018:
3017:
3013:
3004:
3002:
2992:
2988:
2979:
2977:
2967:
2963:
2954:
2952:
2944:
2943:
2939:
2930:
2928:
2918:
2914:
2905:
2903:
2887:
2886:
2882:
2873:
2871:
2863:
2862:
2858:
2849:
2847:
2837:
2833:
2824:
2822:
2812:
2808:
2799:
2797:
2789:Holmes, Aaron.
2787:
2783:
2774:
2772:
2760:
2756:
2747:
2745:
2733:
2729:
2720:
2718:
2706:
2702:
2693:
2691:
2682:
2681:
2677:
2668:
2666:
2657:
2656:
2652:
2643:
2641:
2629:
2622:
2612:
2610:
2598:
2594:
2585:
2583:
2571:
2567:
2557:
2555:
2543:
2539:
2530:
2528:
2516:
2512:
2503:
2501:
2492:
2491:
2487:
2478:
2476:
2468:
2467:
2463:
2454:
2452:
2444:
2443:
2439:
2430:
2428:
2423:
2422:
2418:
2409:
2407:
2399:Bradley, Tony.
2397:
2393:
2384:
2382:
2372:
2368:
2359:
2357:
2347:
2343:
2334:
2332:
2320:
2316:
2307:
2305:
2294:
2293:
2289:
2280:
2278:
2266:
2262:
2253:
2251:
2239:
2235:
2226:
2224:
2212:
2208:
2199:
2197:
2185:
2181:
2172:
2170:
2158:
2154:
2137:
2133:
2124:
2122:
2113:
2112:
2108:
2091:
2087:
2078:
2076:
2068:
2067:
2063:
2054:
2052:
2044:
2043:
2039:
2030:
2028:
2016:
2009:
2005:
1971:
1962:
1949:
1940:
1930:
1921:
1908:
1892:Microsoft Azure
1879:
1805:
1775:
1763:
1753:
1688:
1681:
1680:
1638:"Aqua Security"
1632:
1630:
1612:
1597:
1586:
1585:
1584:
1579:
1573:
1570:
1565:, particularly
1549:
1534:
1523:
1517:
1514:
1495:
1483:
1479:
1442:
1438:
1423:
1416:
1407:
1400:
1389:
1380:
1375:
1368:
1361:
1352:
1347:
1340:
1328:
1317:
1308:
1296:
1285:
1276:
1264:
1253:
1244:
1232:
1221:
1212:
1200:
1189:
1180:
1172:
1162:
1153:
1141:
1134:
1125:
1120:
1113:
1111:
1101:
1091:
1084:
1075:
1070:
1055:
1047:
1037:
1032:
1025:
1024:
1015:
1005:
1000:
993:
991:
987:
984:
980:
976:
972:
963:
953:
948:
941:
933:
915:
907:
897:
892:
885:
883:
874:
864:
857:
848:
843:
834:
825:
824:
819:
816:
813:
809:
805:
801:
797:
793:
790:
786:
783:
779:
775:
771:
767:
763:
759:
755:
751:
747:
743:
739:
735:
731:
727:
724:
721:
718:
715:
712:
709:
706:
702:
698:
694:
690:
686:
682:
678:
674:
670:
666:
662:
658:
654:
650:
646:
642:
641:technation/2021
638:
634:
631:
628:
625:
622:
619:
616:
613:
609:
606:
603:
600:
597:
593:
590:
586:
582:
578:
574:
570:
566:
563:
560:
556:
552:
543:
540:
537:
534:
530:
526:
522:
518:
515:
511:
508:
505:}}</ref>
504:
500:
496:
492:
488:
484:
480:
476:
472:
468:
464:
460:
456:
452:
448:
445:
442:
439:
436:
433:
430:
427:
423:
419:
415:
411:
407:
403:
399:
395:
391:
387:
383:
379:
375:
371:
367:
363:
359:
358:businessinsider
355:
352:
349:
346:
343:
340:
337:
334:
330:
327:
324:
321:
318:
314:
313:|first2=Keerthi
311:
307:
303:
299:
295:
291:
287:
283:
280:
277:
274:
270:
267:
256:
251:
244:
237:
220:
215:
209:
204:
202:
199:
197:
196:
195:
191:
189:
173:
171:
166:
160:
155:
147:
145:โ Previous edit
142:
131:
129:
128:
127:
123:
121:
105:
103:
98:
92:
84:
83:
82:
81:
79:
78:
77:
76:
75:
74:
65:
61:
55:
53:
48:
45:
43:
40:
38:Content deleted
37:
34:
29:โ Previous edit
26:
25:
24:
17:
12:
11:
5:
3634:
3624:
3623:
3618:
3613:
3608:
3603:
3589:
3588:
3579:
3570:
3565:
3560:
3553:
3552:External links
3550:
3548:
3547:
3540:
3520:
3513:
3493:
3486:
3466:
3441:
3417:
3410:
3390:
3365:
3358:
3338:
3313:
3291:
3284:
3264:
3245:
3220:
3203:
3178:
3154:
3129:
3103:
3077:
3060:
3036:
3011:
2986:
2961:
2937:
2912:
2895:. 2021-03-11.
2880:
2856:
2831:
2806:
2781:
2754:
2727:
2700:
2675:
2650:
2620:
2592:
2565:
2537:
2510:
2485:
2461:
2437:
2416:
2391:
2366:
2341:
2314:
2287:
2260:
2233:
2206:
2179:
2152:
2131:
2106:
2085:
2061:
2037:
2006:
2004:
2001:
2000:
1999:
1988:Luigi Aversa,
1986:
1984:978-1119782230
1970:
1967:
1961:
1958:
1948:
1945:
1939:
1934:
1929:
1926:
1920:
1917:
1907:
1904:
1878:
1875:
1804:
1801:
1787:
1786:
1781:
1777:
1776:
1774:
1773:
1770:
1766:
1764:
1761:
1758:
1757:
1754:
1751:
1748:
1747:
1738:
1734:
1733:
1730:
1726:
1725:
1722:
1718:
1717:
1714:
1710:
1709:
1706:
1702:
1701:
1686:
1683:
1682:
1624:
1608:
1606:
1599:
1598:
1581:
1580:
1574:September 2024
1552:
1550:
1543:
1536:
1535:
1518:September 2024
1506:external links
1486:
1484:
1477:
1472:
1446:
1445:
1443:
1436:
1430:
1425:
1424:
1421:
1419:
1417:
1414:
1412:
1409:
1408:
1405:
1403:
1401:
1398:
1396:
1393:
1392:
1390:
1387:
1385:
1382:
1381:
1378:
1376:
1373:
1370:
1369:
1366:
1364:
1362:
1359:
1357:
1354:
1353:
1350:
1348:
1345:
1342:
1341:
1337:
1335:
1333:
1330:
1329:
1326:
1324:
1322:
1319:
1318:
1315:
1313:
1310:
1309:
1305:
1303:
1301:
1298:
1297:
1295:=== Tracee ===
1294:
1292:
1290:
1287:
1286:
1283:
1281:
1278:
1277:
1273:
1271:
1269:
1266:
1265:
1262:
1260:
1258:
1255:
1254:
1251:
1249:
1246:
1245:
1241:
1239:
1237:
1234:
1233:
1230:
1228:
1226:
1223:
1222:
1219:
1217:
1214:
1213:
1209:
1207:
1205:
1202:
1201:
1198:
1196:
1194:
1191:
1190:
1187:
1185:
1182:
1181:
1177:
1175:
1173:
1169:
1167:
1164:
1163:
1160:
1158:
1155:
1154:
1150:
1148:
1146:
1143:
1142:
1139:
1137:
1135:
1132:
1130:
1127:
1126:
1123:
1121:
1118:
1115:
1114:
1112:}}</ref>
1109:
1106:
1104:
1102:
1098:
1096:
1093:
1092:
1089:
1087:
1085:
1082:
1080:
1077:
1076:
1073:
1071:
1068:
1065:
1064:
1061:
1057:
1056:
1052:
1050:
1048:
1044:
1042:
1039:
1038:
1035:
1033:
1030:
1027:
1026:
1023:
1020:
1018:
1016:
1012:
1010:
1007:
1006:
1003:
1001:
998:
995:
994:
989:
985:
982:
978:
973:
970:
968:
966:
964:
960:
958:
955:
954:
951:
949:
946:
943:
942:
938:
936:
934:
930:
928:
925:
924:
921:
917:
916:
912:
910:
908:
904:
902:
899:
898:
895:
893:
890:
887:
886:
881:
879:
877:
875:
871:
869:
866:
865:
862:
860:
858:
855:
853:
850:
849:
846:
844:
841:
838:
837:
835:
832:
830:
827:
826:
822:
817:
814:
811:
807:
803:
799:
795:
791:
788:
784:
781:
777:
773:
769:
765:
761:
757:
753:
749:
745:
741:
737:
733:
729:
725:
722:
719:
716:
713:
710:
707:
704:
700:
696:
692:
688:
684:
680:
676:
672:
668:
664:
660:
656:
652:
648:
644:
640:
636:
632:
629:
626:
623:
620:
617:
614:
611:
607:
604:
601:
598:
595:
591:
588:
584:
580:
576:
572:
568:
564:
561:
558:
554:
550:
548:
546:
544:
538:
535:
532:
528:
524:
520:
516:
513:
509:
506:
502:
498:
494:
490:
486:
482:
478:
474:
470:
466:
462:
458:
454:
450:
446:
443:
440:
437:
434:
431:
428:
425:
421:
417:
413:
409:
405:
401:
397:
393:
389:
385:
381:
377:
373:
369:
365:
361:
357:
353:
350:
347:
344:
341:
338:
335:
332:
328:
325:
322:
319:
316:
312:
309:
305:
301:
297:
293:
289:
285:
281:
278:
275:
272:
268:
265:
263:
261:
258:
257:
254:
252:
249:
246:
245:
242:
240:
238:
235:
233:
230:
229:
226:
222:
221:
190:
185:
184:
169:
148:
122:
117:
116:
101:
70:
64:
62:
44:
36:
27:
23:
22:
14:
9:
6:
4:
3:
2:
3633:
3622:
3619:
3617:
3614:
3612:
3609:
3607:
3604:
3602:
3599:
3598:
3596:
3587:
3583:
3580:
3578:
3574:
3571:
3569:
3566:
3564:
3561:
3559:
3556:
3555:
3543:
3537:
3533:
3532:
3524:
3516:
3510:
3506:
3505:
3497:
3489:
3483:
3479:
3478:
3470:
3456:
3455:The New Stack
3452:
3445:
3431:
3427:
3421:
3413:
3407:
3403:
3402:
3394:
3379:
3375:
3369:
3361:
3355:
3351:
3350:
3342:
3328:
3324:
3317:
3303:
3302:
3295:
3287:
3281:
3277:
3276:
3268:
3260:
3259:Chip Magazine
3256:
3249:
3235:
3231:
3224:
3216:
3215:
3207:
3193:
3189:
3182:
3168:
3164:
3158:
3144:
3140:
3133:
3119:
3115:
3114:
3107:
3093:
3089:
3088:
3081:
3073:
3072:
3064:
3050:
3046:
3040:
3025:
3021:
3015:
3001:
2997:
2990:
2976:
2972:
2965:
2951:
2950:IT Operations
2947:
2941:
2927:
2923:
2916:
2902:
2898:
2894:
2890:
2884:
2870:
2869:Bloomberg.com
2866:
2860:
2846:
2842:
2835:
2821:
2817:
2810:
2796:
2792:
2785:
2771:
2770:
2765:
2758:
2744:
2743:
2738:
2731:
2717:
2716:
2711:
2704:
2689:
2685:
2679:
2664:
2663:Bloomberg.com
2660:
2654:
2640:
2639:
2634:
2627:
2625:
2609:
2608:
2603:
2596:
2582:
2581:
2576:
2569:
2554:
2553:
2548:
2541:
2527:
2526:
2521:
2514:
2499:
2495:
2489:
2475:
2471:
2465:
2451:
2447:
2441:
2426:
2420:
2406:
2402:
2395:
2381:
2377:
2370:
2356:
2355:The New Stack
2352:
2345:
2331:
2330:
2325:
2318:
2303:
2302:
2297:
2291:
2277:
2276:
2271:
2264:
2250:
2249:
2244:
2237:
2223:
2222:
2217:
2210:
2196:
2195:
2190:
2183:
2169:
2168:
2163:
2156:
2148:
2147:
2142:
2135:
2120:
2116:
2110:
2102:
2101:
2096:
2089:
2075:
2074:Bloomberg.com
2071:
2065:
2051:
2050:Bloomberg.com
2047:
2041:
2027:
2026:
2021:
2014:
2012:
2007:
1998:
1997:
1996:9789355518439
1993:
1987:
1985:
1981:
1977:
1973:
1972:
1966:
1957:
1955:
1944:
1938:
1933:
1928:Aqua Nautilus
1925:
1919:Aqua Platform
1916:
1912:
1903:
1901:
1897:
1893:
1889:
1885:
1874:
1872:
1867:
1864:
1862:
1858:
1853:
1850:
1848:
1844:
1840:
1835:
1833:
1829:
1828:Shlomo Kramer
1825:
1820:
1818:
1814:
1810:
1800:
1798:
1797:cybersecurity
1793:
1792:Aqua Security
1785:
1782:
1778:
1771:
1768:
1767:
1765:
1759:
1755:
1749:
1746:
1742:
1739:
1735:
1731:
1727:
1723:
1719:
1716:Cybersecurity
1715:
1711:
1707:
1703:
1699:
1694:
1691:Aqua Security
1671:
1668:
1664:
1661:
1657:
1654:
1650:
1647:
1643:
1640: โ
1639:
1635:
1634:Find sources:
1628:
1622:
1618:
1617:
1611:
1607:
1605:
1604:
1595:
1592:
1577:
1568:
1564:
1560:
1556:
1553:This article
1551:
1547:
1542:
1541:
1532:
1529:
1521:
1511:
1507:
1503:
1499:
1493:
1492:
1487:This article
1485:
1476:
1475:
1470:
1468:
1461:
1460:
1455:
1454:
1449:
1444:
1435:
1434:
1428:
1420:
1418:
1413:
1411:
1410:
1404:
1402:
1397:
1395:
1394:
1386:
1383:
1379:
1377:
1374:
1372:
1371:
1365:
1363:
1358:
1356:
1355:
1351:
1349:
1346:
1344:
1343:
1336:
1331:
1325:
1320:
1316:
1311:
1304:
1299:
1293:
1288:
1284:
1279:
1272:
1267:
1261:
1256:
1252:
1247:
1240:
1235:
1229:
1224:
1220:
1215:
1208:
1203:
1197:
1192:
1188:
1183:
1176:
1174:
1168:
1166:
1165:
1161:
1156:
1149:
1144:
1138:
1136:
1131:
1129:
1128:
1124:
1122:
1119:
1117:
1116:
1105:
1097:
1094:
1088:
1086:
1081:
1079:
1078:
1074:
1072:
1069:
1067:
1066:
1058:
1051:
1049:
1043:
1041:
1040:
1036:
1034:
1031:
1029:
1028:
1019:
1011:
1008:
1004:
1002:
999:
997:
996:
967:
959:
956:
952:
950:
947:
945:
944:
937:
935:
929:
927:
926:
918:
911:
909:
903:
901:
900:
896:
894:
891:
889:
888:
878:
870:
867:
863:== History ==
861:
859:
856:== History ==
854:
852:
851:
847:
845:
842:
840:
839:
831:
828:
808:Aqua Security
728:|url=https://
547:
449:|url=https://
382:cybersecurity
262:
259:
255:
253:
250:
248:
247:
241:
239:
234:
232:
231:
223:
219:
212:
207:
188:
181:
177:
172:
163:
158:
154:
146:
139:
135:
120:
113:
109:
104:
95:
91:
73:
58:
51:
41:Content added
33:
30:
20:
3530:
3523:
3503:
3496:
3476:
3469:
3458:. Retrieved
3454:
3444:
3433:. Retrieved
3429:
3420:
3400:
3393:
3382:. Retrieved
3380:. 2024-08-08
3377:
3368:
3348:
3341:
3330:. Retrieved
3326:
3316:
3306:, retrieved
3300:
3294:
3274:
3267:
3258:
3248:
3237:. Retrieved
3233:
3223:
3213:
3206:
3195:. Retrieved
3191:
3181:
3170:. Retrieved
3166:
3157:
3146:. Retrieved
3142:
3132:
3122:, retrieved
3120:, 2024-07-18
3112:
3106:
3096:, retrieved
3094:, 2024-07-18
3086:
3080:
3070:
3063:
3052:. Retrieved
3048:
3039:
3028:. Retrieved
3026:. 2021-07-12
3024:SiliconANGLE
3023:
3014:
3003:. Retrieved
2999:
2989:
2978:. Retrieved
2974:
2964:
2953:. Retrieved
2949:
2940:
2929:. Retrieved
2925:
2915:
2904:. Retrieved
2892:
2883:
2872:. Retrieved
2868:
2859:
2848:. Retrieved
2844:
2834:
2823:. Retrieved
2819:
2809:
2798:. Retrieved
2794:
2784:
2773:. Retrieved
2767:
2757:
2746:. Retrieved
2740:
2730:
2719:. Retrieved
2713:
2703:
2692:. Retrieved
2690:. 2024-01-04
2687:
2678:
2667:. Retrieved
2665:. 2017-07-18
2662:
2653:
2642:. Retrieved
2636:
2611:. Retrieved
2605:
2595:
2584:. Retrieved
2578:
2568:
2556:. Retrieved
2550:
2540:
2529:. Retrieved
2523:
2513:
2502:. Retrieved
2500:. 2023-07-03
2497:
2488:
2477:. Retrieved
2473:
2464:
2453:. Retrieved
2449:
2440:
2429:. Retrieved
2427:. 2024-06-06
2419:
2408:. Retrieved
2404:
2394:
2383:. Retrieved
2380:SecurityWeek
2379:
2369:
2358:. Retrieved
2354:
2344:
2333:. Retrieved
2327:
2317:
2306:. Retrieved
2304:. 2021-07-31
2299:
2290:
2279:. Retrieved
2275:The Register
2273:
2263:
2252:. Retrieved
2248:The Register
2246:
2236:
2225:. Retrieved
2219:
2209:
2198:. Retrieved
2192:
2182:
2171:. Retrieved
2165:
2155:
2144:
2134:
2123:. Retrieved
2118:
2109:
2098:
2088:
2077:. Retrieved
2073:
2064:
2053:. Retrieved
2049:
2040:
2029:. Retrieved
2023:
1989:
1975:
1963:
1950:
1941:
1936:
1931:
1922:
1913:
1909:
1880:
1877:Acquisitions
1868:
1865:
1854:
1851:
1836:
1821:
1806:
1791:
1790:
1737:Headquarters
1705:Company type
1666:
1659:
1652:
1645:
1633:
1614:
1609:
1587:
1571:
1559:terms of use
1554:
1524:
1515:
1500:by removing
1496:Please help
1488:
1464:
1457:
1451:
1450:Please help
1447:
794:reached a $
774:cfad31640000
703:2024 |title=
519:reached a $
503:|language=en
134:Use this bot
102:Citation bot
3192:VentureBeat
2975:VentureBeat
2926:VentureBeat
2820:VentureBeat
2638:VentureBeat
2580:VentureBeat
2525:VentureBeat
2301:VentureBeat
2194:VentureBeat
2025:VentureBeat
1960:Kube-hunter
1896:open-source
1784:aquasec.com
1752:Area served
975:|url=https:
218:Next edit โ
211:Visual edit
138:Report bugs
32:Next edit โ
3595:Categories
3568:Aqua Trivy
3460:2024-09-26
3435:2024-09-26
3384:2024-09-26
3332:2024-09-26
3308:2024-09-26
3239:2024-09-26
3197:2024-09-25
3172:2024-07-18
3148:2024-07-18
3124:2024-07-18
3098:2024-07-18
3054:2024-09-25
3030:2024-07-18
3005:2024-07-18
3000:DevOps.com
2980:2024-07-18
2955:2024-07-18
2931:2024-07-18
2906:2024-07-18
2874:2024-07-18
2850:2024-07-18
2845:TechCrunch
2825:2024-07-18
2800:2024-07-18
2775:2024-07-18
2769:TechCrunch
2748:2024-07-18
2721:2024-07-18
2715:TechCrunch
2694:2024-07-18
2669:2024-07-18
2644:2024-07-18
2586:2024-07-18
2531:2024-07-18
2504:2024-07-18
2479:2024-07-18
2474:CSO Online
2455:2024-07-18
2431:2024-07-18
2410:2024-07-18
2385:2024-07-18
2360:2024-07-18
2335:2024-07-18
2308:2024-07-18
2281:2024-07-18
2254:2024-07-18
2227:2024-07-18
2200:2024-07-18
2173:2024-07-18
2167:TechCrunch
2125:2024-09-26
2079:2024-07-18
2055:2024-07-18
2031:2024-07-18
2003:References
1969:Literature
1762:Key people
1649:newspapers
1498:improve it
1453:improve it
983:>{{Cite
971:>{{Cite
742:technation
701:3 January
691:|language=
495:1001466852
420:|date=2024
412:|language=
378:operations
366:devsecopps
3234:TechRadar
2901:0971-8257
2329:TechRadar
2146:TheMarker
2100:TheMarker
1873:, India.
1871:Hyderabad
1813:container
1809:Ramat Gan
1756:Worldwide
1741:Ramat Gan
1459:talk page
798:valuation
796:1 billion
734:themarker
687:|website=
637:themarker
447:valuation
408:|website=
370:developer
317:Developer
286:name=":0"
269:Israeli ]
170:ื'ืืืืืืื
124:5,211,852
3167:Security
2613:July 17,
2558:July 17,
2498:BetaNews
1834:office.
1729:Founders
1713:Industry
1063:Line 40:
1060:Line 41:
923:Line 31:
920:Line 32:
708:ืกืงืืืจืืื
599:ืกืงืืืจืืื
592:10, 2021
581:ืืจืืืืืฅ'
562:develops
557:company
517:Security
475:security
429:Security
390:contrast
374:security
362:startups
345:startups
320:security
310:Vedantam
284:.<ref
228:Line 22:
225:Line 22:
180:contribs
112:contribs
56:Wikitext
1845:, M12 (
1803:History
1780:Website
1721:Founded
1708:Private
1663:scholar
800:in 2021
792:company
782:Founded
778:website
630:ืืืฆืืขืื
594:|title=
467:article
424:|title=
398:2020-11
326:booming
315:|title=
276:founded
3586:GitHub
3582:Tracee
3577:GitHub
3538:
3511:
3484:
3408:
3356:
3327:Medium
3282:
3118:GitHub
3092:GitHub
2899:
2405:Forbes
1994:
1982:
1947:Tracee
1884:GitHub
1832:Boston
1745:Israel
1665:
1658:
1651:
1644:
1636:
717:ืืืืืื
699:|date=
633:ืืืงืื"
615:'ืืืืค'
479:raises
455:globes
432:raises
422:-03-01
298:first1
67:Inline
49:Visual
3573:Trivy
1978:2021
1937:Trivy
1670:JSTOR
1656:books
812:known
754:03/ty
723:ืืฉืืื
711:ืืืืกื
705:ืืงืืื
649:10/ty
639:.com/
618:ืืขื ืฃ,
602:ืืืคืืช
596:ืืงืืื
589:March
577:first
459:co.il
435:$ 60m
414:en-US
394:auth0
360:.com/
306:last2
294:Elder
290:last1
194:edits
126:edits
3536:ISBN
3509:ISBN
3482:ISBN
3406:ISBN
3354:ISBN
3280:ISBN
2897:ISSN
2615:2024
2560:2024
1992:ISBN
1980:ISBN
1890:and
1724:2015
1642:news
770:abad
766:ddba
762:cf8d
746:2024
720:ืืืืจ
665:a1ff
661:d62c
657:e5eb
585:date
573:ืขืืจื
569:last
559:that
533:home
514:Aqua
510:2021
471:aqua
444:$ 1b
441:over
426:Aqua
418:news
386:snyk
351:need
333:Here
302:Jeff
282:2015
176:talk
162:undo
157:edit
119:Bots
108:talk
94:edit
3584:on
3575:on
2607:WSJ
2552:WSJ
2119:Ice
1888:AWS
1678:AFD
1569:.
815:for
810:is
789:the
738:com
730:www
689:Ice
624:ืื ื
621:ืืื
612:"ืืฉ
608:ืงืจื
605:ืืื
539:the
531:is
483:60m
348:you
339:the
336:are
206:Tag
192:633
3597::
3453:.
3428:.
3376:.
3325:.
3257:.
3232:.
3190:.
3165:.
3141:.
3116:,
3090:,
3047:.
3022:.
2998:.
2973:.
2948:.
2924:.
2891:.
2867:.
2843:.
2818:.
2793:.
2766:.
2739:.
2712:.
2686:.
2661:.
2635:.
2623:^
2604:.
2577:.
2549:.
2522:.
2496:.
2472:.
2448:.
2403:.
2378:.
2353:.
2326:.
2298:.
2272:.
2245:.
2218:.
2191:.
2164:.
2143:.
2117:.
2097:.
2072:.
2048:.
2022:.
2010:^
1886:,
1743:,
1462:.
804:12
787:,
750:01
714:60
693:he
685:26
681:09
673:12
645:03
627:ืืฉ
610::
536:to
529:It
521:1B
512:,
507:In
501:=]
487:at
463:en
451:en
438:at
406:18
402:07
342:25
331::
323:is
279:in
266:an
243:}}
236:}}
208::
178:|
136:.
110:|
3544:.
3517:.
3490:.
3463:.
3438:.
3414:.
3387:.
3362:.
3335:.
3288:.
3261:.
3242:.
3200:.
3175:.
3151:.
3057:.
3033:.
3008:.
2983:.
2958:.
2934:.
2909:.
2877:.
2853:.
2828:.
2803:.
2778:.
2751:.
2724:.
2697:.
2672:.
2647:.
2617:.
2589:.
2562:.
2534:.
2507:.
2482:.
2458:.
2434:.
2413:.
2388:.
2363:.
2338:.
2311:.
2284:.
2257:.
2230:.
2203:.
2176:.
2149:.
2128:.
2103:.
2082:.
2058:.
2034:.
1667:ยท
1660:ยท
1653:ยท
1646:ยท
1629:.
1623:.
1594:)
1588:(
1576:)
1572:(
1531:)
1525:(
1520:)
1516:(
1512:.
1494:.
1469:)
1465:(
988:/
977:/
776:|
772:-
768:-
764:-
760:-
756:-
752:-
748:-
744:/
740:/
736:.
732:.
683:-
675:-
671:-
667:-
663:-
659:-
655:-
651:-
647:-
643:-
587:=
583:|
579:=
575:|
571:=
551:a
525:1
497:|
493:-
489:-
485:-
481:-
477:-
473:-
469:-
465:/
461:/
457:.
453:.
410:]
404:-
396:-
392:-
388:-
384:-
380:-
376:-
372:-
368:-
364:-
308:=
304:|
300:=
296:|
292:=
273:,
182:)
174:(
114:)
106:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.