Author Page

The Cloud Native Experts

"The Cloud Native Experts" at Aqua Security specialize in cloud technology and cybersecurity. They focus on advancing cloud-native applications, offering insights into containers, Kubernetes, and cloud infrastructure. Their work revolves around enhancing security in cloud environments and developing solutions to new challenges.
Rani Osnat
Rani is the SVP of Strategy at Aqua. Rani has worked in enterprise software companies more than 25 years, spanning project management, product management and marketing, including a decade as VP of marketing for innovative startups in the cyber-security and cloud arenas. Previously Rani was also a management consultant in the London office of Booz & Co. He holds an MBA from INSEAD in Fontainebleau, France. Rani is an avid wine geek, and a slightly less avid painter and electronic music composer.
Amit Sheps
Amit is the Director of Technical Product Marketing at Aqua. With an illustrious career spanning renowned companies such as CyberX (acquired by Microsoft) and F5, he has played an instrumental role in fortifying manufacturing floors and telecom networks. Focused on product management and marketing, Amit's expertise lies in the art of transforming applications into cloud-native powerhouses. Amit is an avid runner who relishes the tranquility of early morning runs. You may very well spot him traversing the urban landscape, reveling in the quietude of the city streets before the world awakes.
Lena Fuks
Lena Fuks is a Product Marketing Manager at Aqua. With a background in public relations for technology companies, Lena now writes blogs, whitepapers, and articles to help people understand the value of Aqua. She is passionate about simplifying complex things and engaging with audiences through storytelling. In her free time, Lena enjoys working out and watching beautiful Mediterranean sunsets.
Erin Stephan
Erin Stephan is the Principal Product Marketer for Aqua's Cloud Security portfolio. Erin has more than 10 years of product marketing experience in data protection and cybersecurity. She enjoys connecting with people, helping to articulate their challenges, and bringing products and solutions to the market that help solve those challenges. In her free time, you can find her catching a flight to a new city, shopping for new home décor, or taking a spin class.
Articles by The Cloud Native Experts
What Is Risk-Based Vulnerability Management?
In a world where security researchers discover more than 2,000 new vulnerabilities every month, it’s easy to feel like you’re drowning in vulnerability alerts – and to struggle to address them quickly. In fact, according to a 2023 study, it takes organizations between 88 and 208 days, on average, to patch vulnerabilities after discovering them.
Vulnerability Exploitability eXchange (VEX) - Definition & Use Cases
Finding vulnerabilities using a vulnerability scanner is one thing. Determining whether a vulnerability you've discovered actually presents a risk for your specific application and environment is quite another. It often happens that a vulnerability is not exploitable under a particular configuration, which means the vulnerability doesn't pose a serious risk.
What Is a DevSecOps Pipeline, and How Can You Integrate It with a CI/CD Pipeline?
How can you put DevSecOps – a concept that emphasizes the integration of security into software development and IT operations – into practice? The answer, in many cases, boils down to creating a DevSecOps pipeline. By establishing the processes necessary for actually baking security into the various stages of the software delivery lifecycle, a DevSecOps pipeline helps organizations translate DevSecOps from theory into practice.
Digital Operational Resilience Act (DORA)
Financial institutions are a prime target for cyberattacks. According to the IBM X-Force Threat Intelligence Index, the finance industry has the second-highest frequency of cyber attacks (after manufacturing), with 18.5% of all cyber attacks targeted at financial and insurance organizations.