Amir Jerbi

Opinions expressed by ICN authors are their own.

Amir Jerbi is CTO co-founder of Aqua Security. He brings 17 years of security software experience in technical leadership positions to Aqua. Amir co-founded Aqua with the vision of creating a security solution that will be simpler and lighter than traditional security products.

Prior to Aqua, he was a Chief Architect at CA Technologies, in charge of the host based security product line, building enterprise grade security products for Global 1000 companies.

Amir has 14 cloud and virtual security patents under his belt. In his free time, Amir enjoys backpacking in exotic places.

The opinions expressed in this blog are those of Amir Jerbi and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

How to keep container secrets secret

How to get started with containerization

How to get started with containerization

Given how truly disruptive containers are, it's easy to get excited and want to go all in. But there's much to be gained by getting a lay of the land before you jump

DevSecOps: Paradigm shifts are messy, but someone's got to take the lead

DevSecOps: Paradigm shifts are messy, but someone's got to take the lead

Companies that lead with application security have security practitioners willing and able to lead

Securing containerized applications: automate, automate, automate

Securing containerized applications: automate, automate, automate

How vulnerability management and threat prevention can move at the speed of continuous delivery

8 Docker security rules to live by

8 Docker security rules to live by

Container-based applications introduce unique security challenges; here’s how to address them

10 key security terms devops ninjas need to know

10 key security terms devops ninjas need to know

If devops teams are going to move fast without breaking security, they’ll need to learn key IT security concepts

5 keys to conquering container security

5 keys to conquering container security

Containers present a golden opportunity to bake security into development and operations processes; let’s seize it

Load More