Cloud-Native Security

Securing The Digital Supply Chain: Network Security Best Practices for Cloud-Native Logistics
As the logistics industry evolves toward fully digitized, cloud-native infrastructures, security has become an urgent and complex priority ...

Security in Kubernetes: Your Stack is Lying to You
The organizations that succeed will not be the ones with the most tools. They will be the ones that treat security as code, embed it into every commit and align their practices ...

Cloudsmith Updates Container Registry to Streamline DevSecOps Workflows
Cloudsmith at the Kubecon + CloudNativeCon Europe 2025 conference today added real-time vulnerability scanning along with an ability to automate the signing for container images, as they are cached using the open-source ...

Remote Code Execution Vulnerabilities Surface in Ingress Nginx
Tel-Aviv’s Wiz Research team says it has identified a series of unauthenticated Remote Code Execution (RCE) vulnerabilities in the Ingress Nginx Controller for Kubernetes. ...

Chainguard Guards Weakest Links In Virtual Machines
Chainguard loves to talk about reducing “developer toil”, the company is clearly keen to present itself as a turnkey solution for reducing threat surface areas and patching burdens on engineering tea ...

Aviatrix Adds Kubernetes Firewall to Secure Cloud-Native Platforms
Aviatrix has launched a Kubernetes firewall designed to specifically address the unique requirements of cloud-native computing environments that typically consume ten times as many IP addresses than legacy platforms ...

Solving Container Security Challenges: Vulnerabilities, Shadow Deployments and Deployment Gaps
In containerized environments security risks can exist in three areas: Vulnerabilities in software, shadow containers and deployment problems ...

Wartime Footing, Horizon3.ai Lifts Dawn On NodeZero Kubernetes Pentesting
Horizon3.ai has announced the release of its NodeZero Kubernetes Pentesting product, available to all users of its NodeZero platform ...

The Key to Securing Hybrid Cloud Environments is Zero-Trust
Unlike traditional models that grant implicit trust based on network location, zero-trust assumes that no entity should be trusted by default ...

Edera’s Big Container Security Question: Am I Isolated?
Company releases ‘Am I Isolated’, an open source container security benchmark and Rust-based container runtime scanner ...