Cloud-Native Security

Runtime Visibility & AI-powered Security in Cloud-Native Environments
Kubernetes and cloud-native platforms have transformed software delivery — but also redefined the attack surface. As threats shift to runtime, visibility and real-time response have become the new security frontline. AI-driven anomaly ...
Alan Shimel | | AI copilot, AI governance, AI in cybersecurity, anomaly detection, automated response, CI/CD security, cloud native security, cloud security, cloud-native defense, container security, DevSecOps, explainable AI, kubernetes, LLMs in security, observability, platform engineering, runtime protection, runtime security, runtime visibility, security automation, security telemetry, service mesh, threat detection, zero-trust

The Corrupt Algorithm: Securing the AI Supply Chain with Containers
The pipelines are green. The dashboards are clear. Commits are flowing without a hitch. For most DevOps teams, that’s the definition of success: smooth builds, tested deployments, automation firing on all cylinders ...

AI Security in the Cloud-Native DevSecOps Pipeline
As AI reshapes DevSecOps, speed and efficiency collide with new, often hidden, security risks. From machine-generated code flaws to model supply chain threats, the future of cloud-native security depends on blending AI’s ...

Securing The Digital Supply Chain: Network Security Best Practices for Cloud-Native Logistics
As the logistics industry evolves toward fully digitized, cloud-native infrastructures, security has become an urgent and complex priority ...

Security in Kubernetes: Your Stack is Lying to You
The organizations that succeed will not be the ones with the most tools. They will be the ones that treat security as code, embed it into every commit and align their practices ...

Cloudsmith Updates Container Registry to Streamline DevSecOps Workflows
Cloudsmith at the Kubecon + CloudNativeCon Europe 2025 conference today added real-time vulnerability scanning along with an ability to automate the signing for container images, as they are cached using the open-source ...

Remote Code Execution Vulnerabilities Surface in Ingress Nginx
Tel-Aviv’s Wiz Research team says it has identified a series of unauthenticated Remote Code Execution (RCE) vulnerabilities in the Ingress Nginx Controller for Kubernetes. ...

Chainguard Guards Weakest Links In Virtual Machines
Chainguard loves to talk about reducing “developer toil”, the company is clearly keen to present itself as a turnkey solution for reducing threat surface areas and patching burdens on engineering tea ...

Aviatrix Adds Kubernetes Firewall to Secure Cloud-Native Platforms
Aviatrix has launched a Kubernetes firewall designed to specifically address the unique requirements of cloud-native computing environments that typically consume ten times as many IP addresses than legacy platforms ...

Solving Container Security Challenges: Vulnerabilities, Shadow Deployments and Deployment Gaps
In containerized environments security risks can exist in three areas: Vulnerabilities in software, shadow containers and deployment problems ...