Monday, February 9, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security
metrics, agents, ai, cloud-native, cloud native, project, istio, ambient, architecture, modules, cloud native, CCoE Kubernetes Virtana CrowdStrike cloud native

Azure Flaw Highlights Need to Secure Kubernetes Cloud Clusters

A security flaw found by Mandiant in Microsoft's AKS service would have let attackers escalate privileges and steal data ...
Jeff Burt | August 22, 2024 | cybersecurity, Google Mandiant, kubernetes, Microsoft Azure Cloud
Kubernetes, serverless Kubernetes backup and recovery

Kubernetes Disaster Recovery: Best Practices and Methods

Kubernetes is the backbone of many contemporary infrastructure systems, and any compromise or failure can cause widespread issues ...
Raza Shaikh | July 4, 2024 | disaster recovery, downtime, kubernetes, outages, ransomware
news

Tetrate Enlists USAF to Streamline Authentication in Kubernetes Environments Using Istio

Tetrate, today in collaboration with the United States Air Force (USAF) Platform One team, has launched AuthService, an open-source project that replaces the existing authorization service for the Istio service mesh with ...
Mike Vizard | April 17, 2024 | AuthService, kubernetes, Tetrate, USAF
Closing the Gap With ITDR for Cloud-Native Security and Kubernetes RBAC

Closing the Gap With ITDR for Cloud-Native Security and Kubernetes RBAC

Here's what is required to apply identity threat detection and response (ITDR) to cloud-native security with Kubernetes RBAC ...
Jimmy Mesta | March 21, 2024 | cloud native security, identity, ITDR, kubernetes, RBAC, role-based access control
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

Kubernetes Phishing: Preventing Social Engineering in Your K8s Environment

As Kubernetes becomes a mainstream platform for operating mission-critical applications, it is increasingly targeted by cybercriminals ...
Gilad David Mayaan | March 1, 2024 | cloud native, credentials, identity, kubernetes, phishing, security
Seccomp downtime Kubernetes

Enhancing Kubernetes Security With Seccomp Profiles

In Kubernetes, seccomp plays a vital role in protecting nodes against malicious code execution. Here's how ...
Ben Hirschberg | February 21, 2024 | kubernetes, linux, open source, Seccomp, secure computing
LOKI CRD vulnerability

Unleashing the Power of LOKI: Linux, OpenStack and Kubernetes Infrastructure

In the dynamic landscape of cloud infrastructure, the convergence of Linux, OpenStack and Kubernetes is shaping a formidable infrastructure stack known as LOKI ...
Kendall Nelson | January 12, 2024 | cloud-native applications, infrastructure, kubernetes, linux, LOKI, openstack
tools, open source, Red Hat, tools, SUSE, tools, tool portfolio, tools Kubernetes

The Best Kubernetes Tools for 2024

To aid developers, these Kubernetes tools are specifically designed to enhance productivity and streamline development workflows ...
Elvis David | January 9, 2024 | container orchestration, containers, kubernetes, open source, tools
Best of 2023: Deploying Node.js Apps to a Kubernetes Cluster

Best of 2023: Deploying Node.js Apps to a Kubernetes Cluster

As we close out 2023, we at Cloud Native Now wanted to highlight the most popular articles of the year. Following is the latest in our series of the Best of 2023 ...
Gilad David Mayaan | January 3, 2024 | application development, cloud-native applications, kubernetes, linux containers, Node.js
AI, legacy, applications, Uptycs containerization legacy Kubernetes Ermetic CNAPP antipatterns Mirantis Twistlock Provides Full Lifecycle

Uptycs Deepens CNAPP Support for Kubernetes

Uptycs' CNAPP now has the ability to detect and highlight Kubernetes security issues and misconfigurations using the Goat playground ...
Mike Vizard | November 7, 2023 | application protection, cloud native security, cloud-native application security, CNAPP, Uptycs
  • ‹
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 19
  • ›
Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
Closing the Cloud Security Gap With Runtime Protection
25 March 2026
Why Argo CD Breaks at Scale (and How to Avoid It)
18 March 2026
Why Argo CD Breaks at Scale (and How to Avoid It)
Why Argo CD Breaks at Scale (and How to Avoid It)
18 March 2026
Why Argo CD Breaks at Scale (and How to Avoid It)
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
17 March 2026
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
The Future of Agentic Software Delivery Across Source & Binaries
11 March 2026
The Future of Agentic Software Delivery Across Source & Binaries
Closing the Cloud Security Gap With Runtime Protection
25 March 2026
Closing the Cloud Security Gap With Runtime Protection
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
17 March 2026
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
Securing the Future of AI-Native Development: Trusting the Code You Didn’t Write
12 March 2026
Securing the Future of AI-Native Development: Trusting the Code You Didn’t Write

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

Search Cloud Native Now

MOST READ

Predict 2026: AI is Forcing Cloud Native to Grow Up

January 9, 2026

IBM Adds Sovereign Core Platform Based on Red Hat OpenShift

January 15, 2026

Kubernetes v1.35 Arrived, Right On Workload-Aware Schedule

January 12, 2026

CNCF Survey Surfaces Widespread Adoption of Kubernetes Clusters

January 26, 2026

Edera Advisory Highlights Remote Code Execution Flaw in Kubernetes

January 29, 2026

RECENT POSTS

Kubernetes in Docker (KinD): Setting Up a k8s Cluster in Under a Minute
Contributed Content Docker Kubernetes Social - Facebook Social - LinkedIn Social - X Topics 

Kubernetes in Docker (KinD): Setting Up a k8s Cluster in Under a Minute

February 9, 2026 Ajinkya Kadam 0
Kubernetes Could Use a Different Linux Scheduler
Cloud-Native Development Features Kubernetes Social - Facebook Social - LinkedIn Social - X 

Kubernetes Could Use a Different Linux Scheduler

February 6, 2026 Joab Jackson 0
Cluster API Update Makes Managing Kubernetes Environments Simpler
Features Kubernetes Social - Facebook Social - LinkedIn Social - X 

Cluster API Update Makes Managing Kubernetes Environments Simpler

February 4, 2026 Mike Vizard 0
Kubernetes and IPv6: Together at Last?
Cloud-Native Networking Cloud-Native Platforms Container Networking Features Kubernetes Latest News Social - Facebook Social - LinkedIn Social - X 

Kubernetes and IPv6: Together at Last?

February 4, 2026 Joab Jackson 0
Noma Security Identifies Security Flaw in Docker AI Assistant
Cloud-Native Security Docker Features Social - Facebook Social - LinkedIn Social - X 

Noma Security Identifies Security Flaw in Docker AI Assistant

February 3, 2026 Mike Vizard 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×

Exploring Trends in Mainframe Application Modernization

Step 1 of 8

12%
What is your organization’s primary approach to modernizing mainframe applications?(Required)
Does your organization currently have an application modernization initiative in place?(Required)
What TWO factors MOST OFTEN drive your organization’s decisions to modernize specific mainframe modules? (Select up to 2 responses)(Required)
What strategies does your organization use for mainframe code transformation?(Required)
What is your organization's strategic direction for mainframe applications over the next 3-5 years?(Required)

What factors MOST influence your organization's platform decisions for mainframe applications? (Select up to 2 responses)(Required)
What are the TOP TWO benefits your organization expects from mainframe modernization? (Select up to 2 responses)(Required)
How effective have AI-powered tools for code conversion been in your modernization efforts?(Required)

×