Saturday, January 17, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

Cloud-Native Security

AI, legacy, applications, Uptycs containerization legacy Kubernetes Ermetic CNAPP antipatterns Mirantis Twistlock Provides Full Lifecycle

Uptycs Deepens CNAPP Support for Kubernetes

Uptycs' CNAPP now has the ability to detect and highlight Kubernetes security issues and misconfigurations using the Goat playground ...
Mike Vizard | November 7, 2023 | application protection, cloud native security, cloud-native application security, CNAPP, Uptycs
devsecops, supply chain, Kubernetes, practices, DevSecOps, JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

Cerbos Managed Authorization Service Leverages Wasm

Cerbos announced today that its Cerbos Hub managed service based on open source authorization software is now available in beta ...
Mike Vizard | November 6, 2023 | authorization, Cerbos, Cerbos Hub, KubeCon, Wasm, WebAssembly
CloudBees Appgate AWS Fargate

CloudBees Brings Modern DevSecOps Platform to Amazon EKS

CloudBees' recently unveiled DevSecOps platform is now generally available on the Amazon Elastic Kubernetes Service (Amazon EKS) ...
Mike Vizard | November 2, 2023 | Amazon EKS, cloudbees, DevSecOps, kubernetes, managed Kubernetes
Cloud-Native AI Workloads: Scalability, Sustainability and Security

Cloud-Native AI Workloads: Scalability, Sustainability and Security

Confidential computing, special instructions and hardware, in combination with projects such as KEDA and Kepler, can provide scalability, sustainability and security ...
Malini Bhandaru | November 2, 2023 | AI, cloud native, hardware, Intel, security, sustainability, workloads
Chkk Launches Platform to Maximize Kubernetes Availability

Chkk Launches Platform to Maximize Kubernetes Availability

Chkk emerged from stealth to launch a Kubernetes Availability Platform that identifies and prioritizes availability risks before incidents occur ...
Mike Vizard | October 27, 2023 | backup and recovery, Chkk, high availability, kubernetes
namespace stateful Kubernetes CNCF Helm

Kubernetes Data Protection In the Age of Namespace-as-a-Service

IT shops increasingly want to share their shiny new Kubernetes clusters among disparate groups of users using namespace-as-a-service (NaaS) ...
Bob Adair | October 25, 2023 | data protection, data security, kubernetes, namespace, namespace-as-a-service NaaS
Istio Tetrate Kubernetes edge

CNCF and Tetrate Branch Out to Offer Istio Certification

IT professionals now have the opportunity to become an Istio Certified Associate (ICA) with an industry-standard certification exam ...
Erik Frieberg | October 19, 2023 | certification, cncf, Istio, Istio Certified Professional, service mesh, Tetrate
zero-trust services cloud-native permissions CNCF SOA vs. Microservices Monitoring

How Cloud-Native Zero-Trust Could Up its Game With Permissions

The cloud-native world could learn a thing or two from the simplicity of mobile application permissions ...
Ori Shoshan | October 16, 2023 | cloud-native applications, mobile applications, permissions, security, zero-trust
SBOM Audit Docker Container Security

Sysdig Allies with Docker Inc. on Container Security

Sysdig and Docker announced the integration of Sysdig runtime insights into Docker Scout to help developers prioritize remediation efforts ...
Mike Vizard | October 4, 2023 | application development, containers, docker, dockercon, runtime security, Sysdig
AppViewX Unfurls Certificate Life Cycle Management Platform for Kubernetes

AppViewX Unfurls Certificate Life Cycle Management Platform for Kubernetes

AppViewX today launched an automated certificate life cycle management platform for Kubernetes environments ...
Mike Vizard | October 4, 2023 | application security, AppViewX, certificate management, cloud-native applications
  • ‹
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 63
  • ›
Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
4 February 2026
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
Your “Pager” Is Lying to You: Fixing On-Call, Alerts, and MTTR for Real
3 March 2026
A Follow-Up Session: The Five Most Dangerous New Attack Techniques…and What to Do for Each
28 February 2026
A Follow-Up Session: The Five Most Dangerous New Attack Techniques…and What to Do for Each
Agentic AI vs. Identity’s Last Mile Problem
28 February 2026
Agentic AI vs. Identity’s Last Mile Problem
From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer
19 February 2026
From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer
From SIEM to Lakehouse: A Practical Path to SOC Modernization with Databricks & Anvilogic
19 February 2026
From SIEM to Lakehouse: A Practical Path to SOC Modernization with Databricks & Anvilogic
Autonomous IT: Transforming Operations and Security in Real Time with AI
10 February 2026
Autonomous IT: Transforming Operations and Security in Real Time with AI

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

Best of 2025: How Anthropic Dogfoods On Claude Code 

January 2, 2026

Docker, Inc. Adds More Than a Thousand Free Hardened Container Images

December 17, 2025

Best of 2025: Hardening Kubernetes Security with DevSecOps Practices

December 31, 2025

Best of 2025: Why Kubernetes 1.33 Is a Turning Point for MLOps — and Platform Engineering

December 22, 2025

Best of 2025: Microsoft Simplifies Kubernetes Management with AI Integration

December 22, 2025

RECENT POSTS

IBM Adds Sovereign Core Platform Based on Red Hat OpenShift
Features Social - Facebook Social - LinkedIn Social - X 

IBM Adds Sovereign Core Platform Based on Red Hat OpenShift

January 15, 2026 Mike Vizard 0
How Do Cloud-Native Teams Balance Engineering Excellence With Strong Product Branding? 
Cloud-Native Development Contributed Content Social - Facebook Social - LinkedIn Social - X Topics 

How Do Cloud-Native Teams Balance Engineering Excellence With Strong Product Branding? 

January 13, 2026 Lucy Manole 0
Kubernetes v1.35 Arrived, Right On Workload-Aware Schedule
Cloud-Native Development Features Kubernetes Social - Facebook Social - LinkedIn Social - X 

Kubernetes v1.35 Arrived, Right On Workload-Aware Schedule

January 12, 2026 Adrian Bridgwater 0
Predict 2026: AI is Forcing Cloud Native to Grow Up
Features News Social - Facebook Social - LinkedIn Social - X 

Predict 2026: AI is Forcing Cloud Native to Grow Up

January 9, 2026 Alan Shimel 0
Autonomous Patching for Cloud-Native Workloads
Video Interviews 

Autonomous Patching for Cloud-Native Workloads

January 7, 2026 Alan Shimel 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×

Exploring Trends in Mainframe Application Modernization

Step 1 of 8

12%
What is your organization’s primary approach to modernizing mainframe applications?(Required)
Does your organization currently have an application modernization initiative in place?(Required)
What TWO factors MOST OFTEN drive your organization’s decisions to modernize specific mainframe modules? (Select up to 2 responses)(Required)
What strategies does your organization use for mainframe code transformation?(Required)
What is your organization's strategic direction for mainframe applications over the next 3-5 years?(Required)

What factors MOST influence your organization's platform decisions for mainframe applications? (Select up to 2 responses)(Required)
What are the TOP TWO benefits your organization expects from mainframe modernization? (Select up to 2 responses)(Required)
How effective have AI-powered tools for code conversion been in your modernization efforts?(Required)

×