Friday, January 9, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

Advait Patel is a highly accomplished Senior Site Reliability Engineer with over 8 years of experience in cloud computing, site reliability engineering, and cloud security domains. Holding a Master’s degree in Computer Science with a specialization in Software Engineering and cloud computing from DePaul University, Advait has consistently demonstrated expertise in building scalable, secure, and cost-efficient systems on major cloud platforms such as AWS and Google Cloud Platform. Currently at Broadcom, Advait spearheads the development and maintenance of a globally distributed SaaS-based metrics monitoring and analytics platform. He leverages cutting-edge technologies such as Kubernetes, Terraform, Ansible, and Python. Advait has led initiatives to improve vulnerability management, compliance frameworks, and disaster recovery, significantly reducing security risks and operational costs. Beyond his professional role, Advait actively contributes to the tech community. He is a Conference Chair for the IEEE Chicago section. He serves as a technical reviewer for leading technical publications and academic conferences, such as IEEE Transactions on Cloud Computing, the ACM Symposium on Applied Computing, Manning, and Packt book publications. An advocate for knowledge sharing, he has authored thought-provoking articles on Cloud Computing, Cloud Security, and Containerization for platforms like HackerNoon, The New Stack, and Security Boulevard.

Docker, security, Cosmonic Cilium Wasm Docker, Inc. Extends Tigera Networking Alliance

Best of 2025: Docker Security in 2025: Best Practices to Protect Your Containers From Cyberthreats

Docker has established itself as an essential pillar of software development. In 2024, more than 15 billion container images were downloaded on Docker Hub, in addition to 13 million developers using Docker all ...
Advait Patel | December 26, 2025 | Container Security Risks, Docker Configuration Security, Docker Hardening Techniques, Docker Security Best Practices, Docker Security Tools, Docker Vulnerabilities 2024, Kubernetes and Docker Security, Secure Docker Containers, Securing Docker Images, Zero Trust in Docker Security
How AI and Python Can Transform Docker Security and Vulnerability Management

How AI and Python Can Transform Docker Security and Vulnerability Management

Automate Docker container security with Python. Use Trivy, Clair, and Dockle for CI/CD vulnerability scans and AI-based threat detection in DevSecOps ...
Advait Patel | October 7, 2025 | AI threat detection, AI-based anomaly detection, automated security scanning, CI/CD security, Clair, container security, containerized application security, DevSecOps automation, Docker image vulnerabilities, docker security, Docker threat detection, Dockle, machine learning in DevSecOps, Python Docker SDK, Python for cybersecurity, Python vulnerability scanner, real-time security monitoring, security in CI/CD pipelines, Trivy, Vulnerability Management
docksec, devsecops, NVIDIA NIM, developers, AI, GenAI, cloud native developers Torc Trend Micro Advances DevSecOps via Kubernetes

Why DockSec is the Security Layer Your Dockerfiles Were Missing

This article walks you through how DockSec works, what makes it different and why it matters for modern DevSecOps workflows.  ...
Advait Patel | July 1, 2025 | containers, DevSecOps, docker, docker security, Dockerfiles, security
edge, containers, containerization, containers, Edara, Buildpacks, container, dockerfiles, time, containers, security, and, Docker, DevOps, docker containers, python, add-ons, kubernetes, Chainguard Docker container Stormforge Azure containers Microsoft New Relic Java Kublr platform Containers on Azure

Smarter Containers: How to Optimize Your Dockerfiles for Speed, Size and Security

Properly designed Dockerfiles can save construction time, enable the creation of smaller images and facilitate deployment ...
Advait Patel | March 6, 2025 | best Dockerfile practices, Docker best practices, Docker build optimization, docker security, Dockerfile optimization, Dockerfile tutorial, improve Docker performance, optimize Docker images, reduce Docker image size, Secure Docker Containers
edge, containers, containerization, containers, Edara, Buildpacks, container, dockerfiles, time, containers, security, and, Docker, DevOps, docker containers, python, add-ons, kubernetes, Chainguard Docker container Stormforge Azure containers Microsoft New Relic Java Kublr platform Containers on Azure

Say Goodbye to Python Environment Hassles – Use Docker Instead!

How Docker improves Python development, benefits Python developers and how to use Docker containers with Python projects.  ...
Advait Patel | February 24, 2025 | Docker containers, Docker Python, Python dependencies, Python environment management
Docker, security, Cosmonic Cilium Wasm Docker, Inc. Extends Tigera Networking Alliance

Docker Security in 2025: Best Practices to Protect Your Containers From Cyberthreats

With 13 million developers using Docker all over the globe, increased security concerns come with the higher use of Docker, such as flaws in base images, attacks during runtime and misconfigurations.  ...
Advait Patel | February 13, 2025 | Container Security Risks, Docker Configuration Security, Docker Hardening Techniques, Docker Security Best Practices, Docker Security Tools, Docker Vulnerabilities 2024, Kubernetes and Docker Security, Secure Docker Containers, Securing Docker Images, Zero Trust in Docker Security

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
4 February 2026
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
State of Cloud Security: The Speed of AI, The Consolidation of Defense, and The Future of the SOC
13 January 2026
State of Cloud Security: The Speed of AI, The Consolidation of Defense, and The Future of the SOC
Agentic AI vs. Identity’s Last Mile Problem
28 February 2026
Agentic AI vs. Identity’s Last Mile Problem
A Follow-Up Session: The Five Most Dangerous New Attack Techniques…and What to Do for Each
28 February 2026
A Follow-Up Session: The Five Most Dangerous New Attack Techniques…and What to Do for Each
Protect Your SDLC From Risky And Malicious third party (from packages to models and more)
26 February 2026
Protect Your SDLC From Risky And Malicious third party (from packages to models and more)
From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer
19 February 2026
From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer
The Compliance Paradox: Why More Rules Mean Faster Releases
3 February 2026
The Compliance Paradox: Why More Rules Mean Faster Releases
The Brass Ring of AppSec: Is AI Finally Making DAST to SAST Correlation Possible?
3 February 2026
The Brass Ring of AppSec: Is AI Finally Making DAST to SAST Correlation Possible?

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

SUSE Allies with evroc for European Cloud Service Based on Kubernetes

December 10, 2025

Flare Finds 10,000 Docker Hub Images Exposing Secrets

December 16, 2025

Best of 2025: How Anthropic Dogfoods On Claude Code 

January 2, 2026

Docker, Inc. Adds More Than a Thousand Free Hardened Container Images

December 17, 2025

AWS Lambda Managed Instances Offer Specialized Compute Configurations 

December 10, 2025

RECENT POSTS

Predict 2026: AI is Forcing Cloud Native to Grow Up
Features News Social - Facebook Social - LinkedIn Social - X 

Predict 2026: AI is Forcing Cloud Native to Grow Up

January 9, 2026 Alan Shimel 0
Autonomous Patching for Cloud-Native Workloads
Video Interviews 

Autonomous Patching for Cloud-Native Workloads

January 7, 2026 Alan Shimel 0
From Cloud First to Cloud Fit: Rethinking Where Workloads Belong
Video Interviews 

From Cloud First to Cloud Fit: Rethinking Where Workloads Belong

January 7, 2026 Alan Shimel 0
Running Kubernetes in Production: Practical Lessons From the Field
Contributed Content Kubernetes Social - Facebook Social - LinkedIn Social - X 

Running Kubernetes in Production: Practical Lessons From the Field

January 6, 2026 Sai Ram Nadipalli 0
Why Secure-by-Design CI/CD Matters in Cloud-Native Systems
Cloud-Native Security Cloud-Native Security Contributed Content Social - Facebook Social - LinkedIn Social - X 

Why Secure-by-Design CI/CD Matters in Cloud-Native Systems

January 6, 2026 Sai Sowjanya Koduri 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×