Amir Jerbi

Opinions expressed by ICN authors are their own.

Amir Jerbi is CTO co-founder of Aqua Security. He brings 17 years of security software experience in technical leadership positions to Aqua. Amir co-founded Aqua with the vision of creating a security solution that will be simpler and lighter than traditional security products.

Prior to Aqua, he was a Chief Architect at CA Technologies, in charge of the host based security product line, building enterprise grade security products for Global 1000 companies.

Amir has 14 cloud and virtual security patents under his belt. In his free time, Amir enjoys backpacking in exotic places and blogging; prior to his AppSec 2.0 column, he was blogging about DevSecOps for InfoWorld.

The opinions expressed in this blog are those of Amir Jerbi and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

3 predictions for devsecops in 2018

KPIs for managing and optimizing devsecops success

KPIs for managing and optimizing devsecops success

CISOs need to make devsecops a priority. These KPIs can help align both security and nonsecurity stakeholders as to where, why, and how security fits into the process

How to keep container secrets secret

How to keep container secrets secret

Keeping secrets secret in container-based applications is complex and challenging, but far from hopeless

How to get started with containerization

How to get started with containerization

Given how truly disruptive containers are, it's easy to get excited and want to go all in. But there's much to be gained by getting a lay of the land before you jump

DevSecOps: Paradigm shifts are messy, but someone's got to take the lead

DevSecOps: Paradigm shifts are messy, but someone's got to take the lead

Companies that lead with application security have security practitioners willing and able to lead

Securing containerized applications: automate, automate, automate

Securing containerized applications: automate, automate, automate

How vulnerability management and threat prevention can move at the speed of continuous delivery

8 Docker security rules to live by

8 Docker security rules to live by

Container-based applications introduce unique security challenges; here’s how to address them

10 key security terms devops ninjas need to know

10 key security terms devops ninjas need to know

If devops teams are going to move fast without breaking security, they’ll need to learn key IT security concepts

5 keys to conquering container security

5 keys to conquering container security

Containers present a golden opportunity to bake security into development and operations processes; let’s seize it

Load More