Editorial Calendar
Web Bot Authentication: Securing AI Agents in Cloud-Native Environments
The rise of AI agents in cloud-native environments poses significant security challenges, creating difficulty in distinguishing legitimate automation from malicious bots. Web Bot Authentication (WBA) offers a cryptographic solution, using asymmetric cryptography ...
Harith Gaddamanugu | | AI agents, asymmetric cryptography, automated access, bot detection, cloud native security, content indexing, customer support automation, enterprise automation, IETF standards, legitimate automation, malicious bots, multitenant environments, partner integrations, security architecture., security challenges, tamper-proof verification, verification process, WBA, Web Bot Authentication, zero-trust principles
How AI, Innovation and Legacy Systems can Come Together for Modernization
The "AI and digital maturity paradox" challenges enterprises as they pursue digital transformation while managing legacy systems. This article discusses how CTOs can strategically integrate AI with existing infrastructures to enhance stability, ...
Kubernetes and IPv6: Together at Last?
As administrators migrate their clusters from Ingress NGINX, which is being retired from the Kubernetes line-up next month, they might want to consider adding another task to their job: migrating their network ...
Designing Reliable Data Pipelines in Cloud-Native Environments
Discover how to design reliable data pipelines in cloud-native environments, emphasizing disciplined design decisions, observability, and team ownership to ensure data integrity and system reliability amidst constant change ...
Kubernetes Begins Work on Pod Checkpoint/Restore
Kubernetes may be getting a feature that has long been enjoyed by supercomputer users: checkpoint/restore. Just as the name indicates, checkpoint/restore is the ability to bookmark a distributed workload such that if ...
Edera Advisory Highlights Remote Code Execution Flaw in Kubernetes
Edera, a provider of a platform for securing container runtime environments, this week published an advisory that notes there is a design flaw that could enable full remote code execution (RCE) in ...
Survey Surfaces Raft of Container Security Challenges
A BellSoft survey reveals gaps in container security practices, showing that human error, limited vulnerability scanning, and infrequent patching continue to expose cloud-native environments to risk ...
MetalBear Simplifies Testing of CI Pipelines on Kubernetes Staging Servers
MetalBear this week added an ability to mirror a continuous integration (CI) pipeline to its mirrord platform that gives application developers access to a staging server in a cloud computing environment that ...
Why Secure-by-Design CI/CD Matters in Cloud-Native Systems
CI/CD pipelines are a core part of modern cloud-native systems. They help teams build, test and deploy software quickly. In the past, CI/CD was mainly about automation and speed. Today, it is ...
Best of 2025: How Anthropic Dogfoods On Claude Code
Keen to eat its own dogfood (or drink its own champagne if you want to use the marketing-friendly platitude), artificial intelligence startup Anthropic is using its own Claude Code agentic coding tool ...

