Not rendering correctly? View this email as a web page here.
Serverless and containerizations trends, post-Kubernetes open-source computing, Container Sandboxing, Datadog and Container Security, Tech comparisons resources and more.

2018 is behind us, and what a year it was for cloud native... it seems that every major organization is now either deploying Kubernetes, or planning to. As we gear up to 2019, we're excited with the prospects of what it might bring. We started the year with some interesting webinars with Datadog and about container sandboxing, and there's plenty more to come - watch this space!
News You Can Use

Kubernetes Security Mitigating the Security Risks of Cloud-Native Applications Enterprises are implementing multiple technologies like Kubernetes for orchestration and serverless functions, then deploying them "continuously" into production. The window for the security team to properly review the application and its infrastructure has become much shorter, if it still exists at all... Read on DarkReading ›
AWS Container Security Finding equilibrium in post-Kubernetes open-source computing As Kubernetes is leveraged as the foundation for an increasing number of critical enterprise technologies and enables the new industry standard of hybrid cloud, open-source participants are reckoning with both the challenge and opportunity of working within a new collaborative digital economy... Read on Silicon Angle ›
Serverless Security 6 Serverless and Containerization Trends CISOs Should Track With such rapid adoption and fast-changing technology, CISOs will need to stay on top of these trends to effectively manage the new risks they'll increasingly bring in the coming year... Read on Dark reading ›
Container Security Exploring new technologies? Check out these comparison resources on the container wiki; Linkerd vs IstioRed Hat's OpenShift vs. Pivotal Cloud Foundry, resources comparing different managed Kubernetes solutions, perspectives on serverless vs. containers and resources about Container isolation technologies
Kubernetes Security Kubernetes security: 4 areas to focus on Security experts widely agree on a prediction for Kubernetes in 2019 and beyond: As adoption increases, so will the risks – as has been the case for many enterprise technologies, such as mobile. Read The Enterprise Project ›
Cloud native security Training and certification for a cloud native world  As more and more companies are focusing on digital transformation, cloud native skill sets are growing in demand. It's still early days, but it's important for many IT professionals - and companies - to begin looking into training so as not to get left behind. Read on IDGConnect ›
container security Aqua Security Partners with Datadog to Advance Container Security ...as cybersecurity becomes more distributed across the enterprise, the way cybersecurity metrics are consumed also will need to evolve. With that goal in mind, Aqua Security has partnered with Datadog, a provider of IT monitoring services, to make it easier to consume security metrics alongside IT operational data.  Read on Container Journal ›
Kubernetes Master Class:
Getting Your Hands "Dirty" in a Container Sandbox

Getting_Your_Hands_Dirty_webinar_640x360
A session about "sandboxing" techniques to isolate containers and improve their security posture. We'll cover the background on the rise of "sandboxing" technology, drill down into different container "sandboxing" technologies and projects, examine and compare the different sandboxing initiatives, hardware based initiative (containers "enclaves") as opposed to legacy Linux isolation tools applied for Containers (SELinux and Seccomp), and demonstrate the attack types sandboxing/isolation technologies can or cannot mitigate. Register Here ›
Aqua News

AWS Firecracker Amazon Firecracker: Isolating Serverless Containers and Functions From a security standpoint, Firecracker and all isolation technologies focus on one aspect of security – they aim to restrict the blast-radius of an attack emanating from a container or function. They won’t prevent or mitigate a direct attack on application running inside containers or functions, and should not be regarded as obviating other critical aspects and layers of security Read on Aqua Blog ›
Datadog_webinar_image_360x165 Best of Both Worlds: Keep your Apps Performant & Secure using Datadog and Aqua If your infrastructure is running a high load, how can you know whether that's a normal operation or a hacker who's just using your servers to mine bitcoins? In this webinar, we'll show you a better approach to securing containers and how the right combination of monitoring and security tools keeps your systems performant, reliable and secure. Watch Webinar ›
Computer_Weekly_180 How To Save IT From Drowning In Its Own Self-Containerised World (and other stories) enterprises are deploying containers and other tools to help build and ship applications faster – solutions designed to be easy-to-use and to improve developer agility – not with production deployments and associated security requirements in mind. Aqua’s view is right there with my own – a solution is not to slow deployments down, it’s to automate the operations and security processes around these tools so everyone wins Read on ComputerWeekly ›
Azure Containers The Azure Podcast Partner Spotlight - Aqua Security Liz Rice, Technical Evangelist at Aqua Security and master of all things Security in Kubernetes, talks to us about her philosophy on security and gives us some great tips-n-tricks on how to secure your container workloads in Azure, on-prem or any cloud. Listen on The Azure Podcast ›
Oracle Containers Extending Aqua Security to Oracle Container Engine for Kubernetes (OKE) On OKE, Aqua leverages native Kubernetes security controls to prevent untrusted images from running on a cluster, and preventing the exploitation of vulnerable container code. It provides real time visualization and actionable insights into the security posture of an OKE cluster. Read on Oracle Cloud Native ›
Security Considerations for Cloud Foundry Container Runtime vs. Cloud Foundry Application Runtime

SECURI~3-1
This webinar describes how to approach the divergent needs of Cloud Foundry Container Runtime vs. Cloud Foundry Application Runtime, and the methods and tools that can be used to mitigate risk without slowing down development. Watch Webinar
 
 
 
 
Ready to Secure your Cloud Native Apps?
Aqua provides a container security platform that enables enterprises to secure their cloud-native, container-based and serverless applications from development to production.
Schedule a demo