Monday, January 5, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

Cloud-Native Security

Docker, secrets, gitguardian Thycotic Kubernetes secrets

Flare Finds 10,000 Docker Hub Images Exposing Secrets

Researchers found thousands of Docker images exposing API keys and tokens, revealing how secrets sprawl, shadow IT, and poor hygiene fuel modern breaches ...
Jeff Burt | December 16, 2025 | API, CI/CD security, cloud computing, container images, credentials, developers and containers, docker hub, exposed secrets, Flare Systems, passwords, shadow IT
5 Reasons Cloud-Native Companies Should Start Adopting Quantum-Safe Security Today

5 Reasons Cloud-Native Companies Should Start Adopting Quantum-Safe Security Today

Quantum computing threatens today’s encryption. Learn why cloud-native organizations must adopt quantum-safe security to stay compliant and resilient ...
Carl Torrence | October 24, 2025 | API security, cloud encryption, cloud native security, cloud-native DevOps, container security, cybersecurity compliance, data protection, DevSecOps, future-proof encryption, microservices security, multi-cloud security, NIST PQC standards, post-quantum cryptography, PQC, quantum computing risks, quantum resilience, quantum risk mitigation, quantum-safe encryption, quantum-safe security, regulatory compliance
TLS, certificates, Docker, vulnerabilities, supply chain, KubeCon, SigStore, Kubernetes TrapX container security

How Distroless Containers Defend Against npm Malware Attacks 

The npm breach shows why distroless containers matter. Learn how minimal, continuously rebuilt images strengthen cloud-native supply-chain security ...
Dhanush V M | October 22, 2025 | CleanStart, cloud native security, container hardening, container security, DevSecOps, distroless best practices, distroless containers, KubeCon 2025, Kubernetes security, malware prevention, minimal container images, npm attack, open source security, phishing attack, SBOM, secure build pipelines, secure software delivery, SLSA compliance, software supply chain security, vulnerability remediation
runtime, visibility, Chainguard, threat, cloud-native security, Venafi, security, sigstore, KubeCon, cloud-native, security, secure, Rubrik, Kubernetes, Cloud-Native Security Best Practices

Runtime Visibility & AI-powered Security in Cloud-Native Environments

Kubernetes and cloud-native platforms have transformed software delivery — but also redefined the attack surface. As threats shift to runtime, visibility and real-time response have become the new security frontline. AI-driven anomaly ...
Alan Shimel | October 6, 2025 | AI copilot, AI governance, AI in cybersecurity, anomaly detection, automated response, CI/CD security, cloud native security, cloud security, cloud-native defense, container security, DevSecOps, explainable AI, kubernetes, LLMs in security, observability, platform engineering, runtime protection, runtime security, runtime visibility, security automation, security telemetry, service mesh, threat detection, zero-trust
The Corrupt Algorithm: Securing the AI Supply Chain with Containers

The Corrupt Algorithm: Securing the AI Supply Chain with Containers

The pipelines are green. The dashboards are clear. Commits are flowing without a hitch. For most DevOps teams, that’s the definition of success: smooth builds, tested deployments, automation firing on all cylinders ...
Jaymes Davis | September 22, 2025 | AI, containers, security, supply chain
devsecops, supply chain, Kubernetes, practices, DevSecOps, JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

AI Security in the Cloud-Native DevSecOps Pipeline

As AI reshapes DevSecOps, speed and efficiency collide with new, often hidden, security risks. From machine-generated code flaws to model supply chain threats, the future of cloud-native security depends on blending AI’s ...
Saqib Jan | August 13, 2025 | AI DevSecOps, AI security, cloud native security
kubernetes, network, logistics, security, Traefik Tigera container security Calico Red Hat Dynatrace

Securing The Digital Supply Chain: Network Security Best Practices for Cloud-Native Logistics

As the logistics industry evolves toward fully digitized, cloud-native infrastructures, security has become an urgent and complex priority ...
Mike Marut | May 28, 2025 | Cloud-native logistics security, Digital supply chain protection, Zero trust architecture in logistics
Security in Kubernetes: Your Stack is Lying to You 

Security in Kubernetes: Your Stack is Lying to You 

The organizations that succeed will not be the ones with the most tools. They will be the ones that treat security as code, embed it into every commit and align their practices ...
Andrew Korolov | May 23, 2025 | cloud native security, kubernetes, security, tools
state, stateless, kubernetes, scanning, cloudsmith, stateless ephemeral stateful security Kubernetes unikernel Sumo Logic

Cloudsmith Updates Container Registry to Streamline DevSecOps Workflows

Cloudsmith at the Kubecon + CloudNativeCon Europe 2025 conference today added real-time vulnerability scanning along with an ability to automate the signing for container images, as they are cached using the open-source ...
Mike Vizard | April 1, 2025 | container security, containers, DevSecOps
Remote Code Execution Vulnerabilities Surface in Ingress Nginx

Remote Code Execution Vulnerabilities Surface in Ingress Nginx

Tel-Aviv’s Wiz Research team says it has identified a series of unauthenticated Remote Code Execution (RCE) vulnerabilities in the Ingress Nginx Controller for Kubernetes.  ...
Adrian Bridgwater | March 27, 2025 | kubernetes, vulnerabilities
  • 1
  • 2
  • 3
  • …
  • 63
  • ›
Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
4 February 2026
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
State of Cloud Security: The Speed of AI, The Consolidation of Defense, and The Future of the SOC
13 January 2026
State of Cloud Security: The Speed of AI, The Consolidation of Defense, and The Future of the SOC
Building a Platform for Velocity: Accelerating Adoption with Internal Developer Portals
17 February 2026
Building a Platform for Velocity: Accelerating Adoption with Internal Developer Portals
Making Software Delivery Resilient with Autonomous Recovery
5 February 2026
Making Software Delivery Resilient with Autonomous Recovery
The Compliance Paradox: Why More Rules Mean Faster Releases
3 February 2026
The Compliance Paradox: Why More Rules Mean Faster Releases
The Compliance Paradox: Why More Rules Mean Faster Releases
3 February 2026
The Compliance Paradox: Why More Rules Mean Faster Releases
The Brass Ring of AppSec: Is AI Finally Making DAST to SAST Correlation Possible?
3 February 2026
The Brass Ring of AppSec: Is AI Finally Making DAST to SAST Correlation Possible?
State of Cloud Security: The Speed of AI, The Consolidation of Defense, and The Future of the SOC
13 January 2026
State of Cloud Security: The Speed of AI, The Consolidation of Defense, and The Future of the SOC

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

SUSE Allies with evroc for European Cloud Service Based on Kubernetes

December 10, 2025

Flare Finds 10,000 Docker Hub Images Exposing Secrets

December 16, 2025

You Can Stop Saying “Cloud,” But You Can’t Take the Cloud Out

December 8, 2025

Docker, Inc. Adds More Than a Thousand Free Hardened Container Images

December 17, 2025

AWS Lambda Managed Instances Offer Specialized Compute Configurations 

December 10, 2025

RECENT POSTS

Best of 2025: How Anthropic Dogfoods On Claude Code 
Best of 2025 Editorial Calendar Features Social - Facebook Social - LinkedIn Social - X 

Best of 2025: How Anthropic Dogfoods On Claude Code 

January 2, 2026 Adrian Bridgwater 0
Best of 2025: CAST AI Report Surfaces Massive Kubernetes Cloud Infrastructure Waste
Best of 2025 Editorial Calendar Features Social - Facebook Social - LinkedIn Social - X 

Best of 2025: CAST AI Report Surfaces Massive Kubernetes Cloud Infrastructure Waste

January 2, 2026 Mike Vizard 0
Best of 2025: Google Adds Multi-Cluster Orchestration Service for Kubernetes
Best of 2025 Editorial Calendar Features Social - Facebook Social - LinkedIn Social - X 

Best of 2025: Google Adds Multi-Cluster Orchestration Service for Kubernetes

January 1, 2026 Mike Vizard 0
Best of 2025: Akamai Allies with Fermyon to Advance Wasm Adoption
Best of 2025 Editorial Calendar Features Social - Facebook Social - LinkedIn Social - X 

Best of 2025: Akamai Allies with Fermyon to Advance Wasm Adoption

January 1, 2026 Mike Vizard 0
Best of 2025: The Observability Evolution: How AI and Open Source are Taming Kubernetes Complexity
Best of 2025 Editorial Calendar Features Social - Facebook Social - LinkedIn Social - X 

Best of 2025: The Observability Evolution: How AI and Open Source are Taming Kubernetes Complexity

December 31, 2025 Tom Smith 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×