Vulnerability scanning is the process of checking software for vulnerabilities, meaning security flaws or weaknesses.| Aqua
A vulnerability scanner is a tool that continuously monitors computers, networks or applications to identify security vulnerabilities.| Aqua
SCA is a process for identifying software modules, libraries, packages, and other components within an application, as well as its dependencies.| Aqua
Aqua's open source Trivy vulnerability scanner is being added as an integrated option in the CNCF’s Harbor registry and Mirantis Docker Enterprise.| Aqua
Discover the key features of vulnerability management tools and meet five of the most popular and feature-rich open source solutions.| Aqua
Open source vulnerability scanning works: discover tools that can help you identify & remediate vulnerabilities in OSS components & containers| Aqua
Building multiplatform Docker images in GitHub Actions often requires custom Docker daemon configurations, but these can introduce unexpected issues. This article explores a common pitfall with Docker contexts when using the containerd image store feature, particularly when running security scans with tools like Trivy. Learn how to extract and pass the correct Docker socket to ensure seamless integration and accurate vulnerability scans.| Wild Wild Wolf