Wednesday, May 28, 2025
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

Gilad David Maayan is a technology writer who has worked with over 150 technology companies including SAP, Samsung NEXT, NetApp and Imperva, producing technical and thought leadership content that elucidates technical solutions for developers and IT leadership.

Kubernetes, practices, DevSecOps, JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

DevSecOps for Kubernetes: 15 Best Practices for 2025

Some recommended best practices for securing applications in your Kubernetes environment, significantly enhancing their overall security.  ...
Gilad David Mayaan | May 20, 2025 | best practices, DevSecOps, kubernetes
Kubernetes security FusionAuth secure container images

Best of 2024: Kubernetes Security Best Practices for 2024

Here's what you should be focusing on in 2024 to keep your Kubernetes environments secure ...
Gilad David Mayaan | January 3, 2025 | cloud native, cloud native security, container security, containers, kubernetes, security
phishing OWASP Kubernetes security Veracode key management container security CNCF security secure Kubernetes

Kubernetes Phishing: Preventing Social Engineering in Your K8s Environment

As Kubernetes becomes a mainstream platform for operating mission-critical applications, it is increasingly targeted by cybercriminals ...
Gilad David Mayaan | March 1, 2024 | cloud native, credentials, identity, kubernetes, phishing, security
Kubernetes team KubeMaster cloud-native

Scaling Your Kubernetes Team: In-House Vs. Freelance

When you need to scale your infrastructure and your Kubernetes team, should you build an in-house team or hire freelance professionals? ...
Gilad David Mayaan | February 20, 2024 | careers, engineering, freelance, hiring, kubernetes, talent, team
Kubernetes security FusionAuth secure container images

Kubernetes Security Best Practices for 2024

Here's what you should be focusing on in 2024 to keep your Kubernetes environments secure ...
Gilad David Mayaan | February 1, 2024 | cloud native, cloud native security, container security, containers, kubernetes, security
Cilium containerized network Remote.It service mesh eBPF

Network Topology in Containerized Environments

Managing network topology in a containerized environment can be challenging, but with the right tools and practices, it's achievable ...
Gilad David Mayaan | January 31, 2024 | container networking, microservices, network topology, service mesh, topology
Amazon ECS cloud-native configuration eBPF

5 DevOps Use Cases for Amazon ECS

Amazon ECS is a scalable, secure container management service that makes it easy to manage Docker containers as a cluster ...
Gilad David Mayaan | January 26, 2024 | amazon, Amazon ECS, aws, docker, Elastic Container Service
Wasm, Red Hat, telcommunications, Dapr application security distributed cloud mobile apps

App Security Testing in Containerized Environments: Tips and Tricks

Development teams should prioritize application security testing, whether their applications are monoliths or containerized ...
Gilad David Mayaan | January 23, 2024 | application security, AppSec, cloud-native applications, DevSecOps, kubernetes, microservices
Docker, Trend Micro, SIEM attack Aqua Security CyberArk pen testing Accurics

SIEM for Containerized Environments

SIEM can help address some of the key security challenges of Docker, Kubernetes and related technologies ...
Gilad David Mayaan | January 16, 2024 | cloud native security, container security, containers, security, SIEM
data, Grafana, OpenTelemetry Argo NeuVector Extends Red Hat OpenShift Availability

OpenTelemetry for Containerized Environments

By providing a unified approach to telemetry data capture, OpenTelemetry aims to make observability more accessible to all developers ...
Gilad David Mayaan | January 11, 2024 | data, logs, metrics, monitoring, observability, OpenTelemetry, traces
  • 1
  • 2
  • 3
  • …
  • 6
  • ›
Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Security Field Day

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
The Multicloud Imperative: Oracle and Azure deliver a seamless experience
26 June 2025
The Multicloud Imperative: Oracle and Azure deliver a seamless experience
Ensuring Kubernetes Application Resiliency, Security, and Compliance with AWS and Across Your Landscape
17 June 2025
Ensuring Kubernetes Application Resiliency, Security, and Compliance with AWS and Across Your Landscape
Resilience through Chaos: Integrating IPM into your Observable SDLC (OSDLC)
24 June 2025
Resilience through Chaos: Integrating IPM into your Observable SDLC (OSDLC)
Resilience through Chaos: Integrating IPM into your Observable SDLC (OSDLC)
24 June 2025
Resilience through Chaos: Integrating IPM into your Observable SDLC (OSDLC)
Beating Bottlenecks – A Revolutionary Solution for Mainframe Delivery
18 June 2025
Beating Bottlenecks – A Revolutionary Solution for Mainframe Delivery
Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations
12 June 2025
Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

No Cracks In NATS, CNCF Connects For Cloud Comms 

May 7, 2025

The Observability Evolution: How AI and Open Source are Taming Kubernetes Complexity

April 29, 2025

Nutanix Previews Storage Platform Running Natively on Kubernetes Clusters

May 7, 2025

Docker, Inc. Adds Curated Hardened Container Images to Hub

May 19, 2025

Red Hat Extends Scope and Reach of OpenShift Platform

May 20, 2025

RECENT POSTS

Mirantis Extends Appeal of Control Plane to Traditional IT Administators
Features Kubernetes in the Enterprise Social - X 

Mirantis Extends Appeal of Control Plane to Traditional IT Administators

May 28, 2025 Mike Vizard 0
F5 Extends Ability to Scale and Secure Network Traffic Across Kubernetes Clusters
Features Kubernetes in the Enterprise Social - X 

F5 Extends Ability to Scale and Secure Network Traffic Across Kubernetes Clusters

May 28, 2025 Mike Vizard 0
Securing The Digital Supply Chain: Network Security Best Practices for Cloud-Native Logistics
Cloud-Native Security Contributed Content Social - Facebook Social - LinkedIn Social - X 

Securing The Digital Supply Chain: Network Security Best Practices for Cloud-Native Logistics

May 28, 2025 Mike Marut 0
Why Kubernetes 1.33 Is a Turning Point for MLOps — and Platform Engineering
Contributed Content Kubernetes Social - Facebook Social - LinkedIn Social - X 

Why Kubernetes 1.33 Is a Turning Point for MLOps — and Platform Engineering

May 27, 2025 Itiel Shwartz 0
Security in Kubernetes: Your Stack is Lying to You 
Cloud-Native Security Contributed Content Kubernetes Social - Facebook Social - LinkedIn Social - X Topics 

Security in Kubernetes: Your Stack is Lying to You 

May 23, 2025 Andrew Korolov 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2025 Techstrong Group, Inc. All rights reserved.
×