Securing Hybrid Cloud Workloads with Google Anthos and Aqua Security(18 Jun 2019)
Automation and code-driven infrastructure provides massive flexibility to development teams. On-demand deployment of kubernetes clusters can speed up test and development time, but can also be difficult to mange. Config Management, a part of Google Anthos, and Aqua Security can be combined to centrally control on-demand ephemeral infrastructure.
KubeSec Enterprise Summit Themes(12 Dec 2018)
The sheer growth of Kubernetes interest and volume of platforms deployed worldwide enforces the fact that Enterprises are adopting Kubernetes security is top of mind. The KubeSec Enterprise Summit provided a well balanced roundup of the core security concerns, solutions, and future directions.
Improve Your Container Security with the Aqua MicroScanner for Source-to-Image Builds(22 Oct 2018)
A demo of the Aqua Security Microscanner presented at Arctiq's Container Security Event.
Fireside Chat with Liz Rice - Aqua Security(09 Oct 2018)
On October 5th in Toronto @ "The Vault", Arctiq had the pleasure of hosting a fireside chat with Liz Rice from Aqua Security at our Building a Secure Container Strategy
Automated Jenkins Plugin Installation for OpenShift(06 Sep 2018)
Have you enjoyed much of the goodness that OpenShift brings to Jenkins, but wish there was an easy way to customize your deployment with your beloved plugins?! This blog quickly covers two approaches to extenting your OpenShift Jenkins deployments with all your helpful plugins!
Aqua on OpenShift - Level-Up Your Container Security Game - Part I(26 Apr 2018)
As container technology becomes prevalent in organizations, teams begin to move faster, applications are deployed quicker, and there is the inevitable question that arises around security posture of the container contents. Container technology has enabled developers and operations teams to gain rapid feedback and insight into application health, and security should not be excluded from this capability. This blog article covers the first of two methods to help include application security scanning in the development pipeline so that vulnerabilities don't make it into production.