Cloud-Native Security
Docker Inc. Allies with NanoCo to Deploy General-Purpose AI Agent Safely
Docker Inc. has formed an alliance that makes it simpler to deploy a lightweight NanoClaw artificial intelligence (AI) agent from NanoCo in Docker Sandboxes that ensure any AI agent is only able ...
Zero Networks Tool Visually Maps Connections Within a Kubernetes Cluster
Zero Networks this week at the KubeCon + CloudNativeCon Europe conference revealed it can now provide a visual map of the services connected via a Kubernetes cluster that can be continuously updated ...
RapidFort Nutanix Collaboration Speeds Compliant Kubernetes for AI Workloads
RapidFort and Nutanix have partnered to integrate automated supply chain security into the Nutanix Kubernetes Platform (NKP). This collaboration enables enterprises to deploy hardened, near-zero CVE container images at scale, accelerating compliance ...
Adrian Bridgwater | | Automated Vulnerability Remediation, Cloud-Native Compliance, container hardening, Cryptographic Provenance, DevSecOps automation, Hybrid Multicloud Security, Infrastructure Ruggedization, KubeCon Amsterdam 2026, Kubernetes at Scale, Minimalist Container Templates, Near-Zero CVE Images, Secure-by-Design Posture, software supply chain security, Sovereign AI Security
The New Multi-Tenant Challenge: Securing AI Agents in Cloud-Native Infrastructure
AI agents run untrusted code. Here’s how to secure them using isolation, least privilege and proven cloud-native patterns ...
The Missing Control Plane in Cloud-Native Supply Chains
Explore how an artifact access plane can improve Kubernetes platform performance, scalability, and security by standardizing how artifacts are governed and delivered, aligning with CNCF ecosystem initiatives ...
Adrian Herrera | | artifact access plane, artifact decentralization, artifact firewall, artifact flow optimization, artifact governance, cloud infrastructure, cloud-native platforms, CNCF ecosystem, developer velocity, devops, GitOps, kubernetes, OCI artifacts, platform resilience., software supply chain, Virtual Registry
Chainguard Dashboard Provides Visibility into Pipeline for Creating Secure Container Images
Chainguard today added a dashboard that provides visibility into which software packages the provider of secure container images is currently prioritizing. Ed Sawma, vice president of product marketing for Chainguard, said the ...
Noma Security Identifies Security Flaw in Docker AI Assistant
Noma Security today revealed it has discovered a critical security flaw in the artificial intelligence (AI) assistant made available by Docker, Inc. Sasi Levi, security research lead for Noma Security, said the ...
Survey Surfaces Raft of Container Security Challenges
A BellSoft survey reveals gaps in container security practices, showing that human error, limited vulnerability scanning, and infrequent patching continue to expose cloud-native environments to risk ...
Why Secure-by-Design CI/CD Matters in Cloud-Native Systems
CI/CD pipelines are a core part of modern cloud-native systems. They help teams build, test and deploy software quickly. In the past, CI/CD was mainly about automation and speed. Today, it is ...
Flare Finds 10,000 Docker Hub Images Exposing Secrets
Researchers found thousands of Docker images exposing API keys and tokens, revealing how secrets sprawl, shadow IT, and poor hygiene fuel modern breaches ...

