Features

CNCF and Docker: The Next Phase of Cloud Native Supply Chain Evolution
The CNCF–Docker partnership strengthens cloud native supply chain security with verified namespaces, SBOMs, and signed images. Trust becomes the new baseline ...

The Cloud-Native Frontier is at the Edge
The future of cloud-native is hybrid and edge. Learn how WebAssembly (WASM) complements containers to power next-gen workloads with speed, security and agility ...

WebAssembly 3.0 Delivers Major Performance and Language Support Upgrades
WebAssembly 3.0: Garbage collection, 64-bit memory, multiple memories and tail calls to make high-level language compilation easier ...

Tigera Extends Project Calico Reach to Secure AI Workloads
Tigera this week added an instance of its integrated container networking and security platform for Kubernetes environments that is specifically designed for artificial intelligence (AI) workloads. Based on open source Project Calico ...

OpenTofu and the New Era of Infrastructure as Code
Terraform’s license shift sparked OpenTofu’s rise. Alan explores how IaC now thrives with both HashiCorp’s Terraform and CNCF’s OpenTofu shaping the future ...
Alan Shimel | | Business Source License BUSL, cloud infrastructure automation, cloud-native infrastructure, CNCF OpenTofu, HashiCorp license change, IaC, IaC ecosystem, IaC governance, IaC innovation, IaC strategy for enterprises, infrastructure as code, Linux Foundation, MPL to BUSL, open source IaC, OpenTofu, OpenTofu roadmap, Terraform, Terraform providers, Terraform vs OpenTofu, vendor lock-in

Supply Chain Security: Cloud Native’s Weakest Link?
For years, the conversation in security revolved around networks, firewalls, and endpoints. The perimeter was king. But in the cloud-native era, the old perimeter has dissolved into microservices, APIs, and pipelines. What’s ...

Runtime Visibility: The Missing Layer in Cloud-Native Security
Cloud-native security can’t rely on old perimeter defenses. With workloads spinning up in seconds, runtime visibility is now the missing layer leaders must prioritize. Learn why observability is security, how tools like ...

Security Tool Sprawl: The New Breach Vector for Cloud Native
“More is better” has always been a dangerous assumption in tech. In security, it’s downright reckless. Across the cloud-native ecosystem, organizations are drowning in their own defenses: dozens of overlapping tools, agents, ...

eBPF: The Silent Power Behind Cloud Native’s Next Phase
eBPF is quietly reshaping cloud native computing, powering service meshes, observability, networking, and security directly in the Linux kernel. By reducing sidecar overhead, enabling zero-instrumentation telemetry, and enhancing runtime protection, eBPF is ...
Alan Shimel | | Cilium eBPF, cloud native 2.0, eBPF, eBPF in DevOps, eBPF networking, eBPF performance monitoring, eBPF security, extended Berkeley Packet Filter, Falco eBPF, Istio Ambient Mesh eBPF, kernel-level programmability, Kubernetes eBPF, Linux kernel observability, Pixie observability, service mesh without sidecars, Tetragon runtime security, zero-instrumentation observability

vCluster Embraces Karpenter for Dynamic Scaling of Virtual Kubernetes Nodes
vCluster Labs today added an ability to automatically scale nodes running on a virtual Kubernetes cluster. Company CEO Lukas Gentele said the Auto Nodes capability added to the vCluster platform are enabled ...