Cloud-Native Security

Cloudsmith Updates Container Registry to Streamline DevSecOps Workflows
Cloudsmith at the Kubecon + CloudNativeCon Europe 2025 conference today added real-time vulnerability scanning along with an ability to automate the signing for container images, as they are cached using the open-source ...

Remote Code Execution Vulnerabilities Surface in Ingress Nginx
Tel-Aviv’s Wiz Research team says it has identified a series of unauthenticated Remote Code Execution (RCE) vulnerabilities in the Ingress Nginx Controller for Kubernetes. ...

Chainguard Guards Weakest Links In Virtual Machines
Chainguard loves to talk about reducing “developer toil”, the company is clearly keen to present itself as a turnkey solution for reducing threat surface areas and patching burdens on engineering tea ...

Aviatrix Adds Kubernetes Firewall to Secure Cloud-Native Platforms
Aviatrix has launched a Kubernetes firewall designed to specifically address the unique requirements of cloud-native computing environments that typically consume ten times as many IP addresses than legacy platforms ...

Solving Container Security Challenges: Vulnerabilities, Shadow Deployments and Deployment Gaps
In containerized environments security risks can exist in three areas: Vulnerabilities in software, shadow containers and deployment problems ...

Wartime Footing, Horizon3.ai Lifts Dawn On NodeZero Kubernetes Pentesting
Horizon3.ai has announced the release of its NodeZero Kubernetes Pentesting product, available to all users of its NodeZero platform ...

The Key to Securing Hybrid Cloud Environments is Zero-Trust
Unlike traditional models that grant implicit trust based on network location, zero-trust assumes that no entity should be trusted by default ...

Edera’s Big Container Security Question: Am I Isolated?
Company releases ‘Am I Isolated’, an open source container security benchmark and Rust-based container runtime scanner ...

SigstoreCon Supply Chain Day 2024: Celebrating the Impact of Sigstore on Digital Signing and Supply Chain Security
As we approach SigstoreCon at KubeCon + CloudNativeCon, where experts will share their insights, let's reflect on Sigstore and its impact ...

Unlocking the Full Potential of Container Vulnerability Scans
Given the complex dependencies of container images, which can rely on other container images with potential vulnerabilities, it is crucial for developers to proactively identify and address container security vulnerabilities before deployment ...