Monday, May 18, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security
Cloud-Native Security Containers DevSecOps Features News Social - Facebook Social - LinkedIn Social - X Virtualization 

Together, Edera and Minimus Claim They Can Protect Your Software From AI Hackers

May 18, 2026 Steven Vaughan-Nichols AI, containers, Edera, Minimus, security
by Steven Vaughan-Nichols

Hopefully, they can deliver because AI programs like Anthropic’s Mythos AI are cracking open programs faster than an otter can shuck oysters.

MINNEAPOLIS — At Open Source Summit North America, Edera, a leader in hardened runtime isolation for containers, GPUs, and AI agents, and Minimus, a top company in hardened container images and software supply chain security, announced they were teaming up to deliver what they claim is true end‑to‑end container security for critical infrastructure operators. The plan is that by combining hardened container images with a hypervisor‑backed runtime designed to stop attacks even when vulnerabilities slip through, they provide you with the software security you need in an ever more dangerous AI world. 

Techstrong Gang Youtube

How bad is it? In a statement, Ben Bernstein, CEO and co-founder, Minimus, said “AI-powered vulnerability discovery has changed the math on open source risk. The question isn’t whether adversaries will find exploitable flaws in widely deployed software – it’s how fast, and what happens next.” Their answer: “Minimus exists to eliminate and shrink the target as aggressively as possible. Edera exists to ensure that what can’t be shrunk away can’t be weaponized. This partnership puts both layers in front of the organizations that can least afford a breach to become an outage.”

Specifically, the partnership brings together Minimus’s minimal, continuously patched container images and Edera’s “hardened runtime,” which runs each workload inside its own micro‑VM. The latter eliminates the shared‑kernel model that has long worried security teams in regulated sectors. The pair believe financial services, federal agencies and operators of critical infrastructure that face strict compliance regimes and a rising tempo of AI‑assisted attacks will find their approach just what they need. 

Minimus, whose founders trace their roots to early container security efforts, focuses on shrinking the attack surface at build time. Its platform rebuilds images from upstream source, strips out non‑essential components and maintains what it describes as a near‑zero‑CVE posture through continuous patching and signed software bills of materials (SBOMs). The goal is to ensure that by the time a container is deployed, it carries as little inherited risk as possible.

Edera attacks the other side of the problem: runtime isolation. Rather than relying on namespaces and cgroups atop a shared Linux kernel, Edera interposes a thin hypervisor layer and runs each container or AI workload inside a dedicated micro‑VM. That approach, similar in spirit to lightweight virtual machines, is designed to prevent container escapes, kernel‑level privilege escalation and lateral movement between workloads sharing the same node.

By integrating the two stacks, the companies argue they can offer a more credible defense‑in‑depth story than traditional scanning‑centric pipelines. Minimus images aim to eliminate known vulnerabilities and reduce bloat before deployment; Edera then assumes something will eventually be exploited anyway and focuses on containing any compromise within a strictly bounded runtime environment. Together, the combination is being positioned as a way to reduce both the probability of compromise and the blast radius when it happens.

The partnership also leans into the boom in AI and GPU‑accelerated workloads. Edera has already been marketing its hardened runtime for GPU and agentic AI scenarios, where direct hardware access and complex dependency chains can amplify risk. Pairing that runtime with Minimus’s slimmed‑down, source‑rebuilt images is meant to appeal to organizations experimenting with AI in sensitive environments but wary of the security implications of rapidly assembled container stacks.

Both vendors are aligning their messaging with established guidance, such as NIST’s container security recommendations and federal cloud requirements, in hopes of tapping into modernization and zero‑trust budgets across government and critical infrastructure. 

While details on joint go‑to‑market motions and pricing were not disclosed, the move underscores a broader trend among buyers toward tightly integrated combinations that address the software supply chain and runtime behavior as a single solvable security problem. Will this pairing work? With the tempo of AI-based hacking attempts ever increasing, we’ll soon find out.

  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Reddit (Opens in new window) Reddit

Related

  • ← How to Implement Shift-Left Security in Cloud-Native Applications?

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
From Experimentation to Production: Why Inference Is the Defining Layer of AI
4 June 2026
From Experimentation to Production: Why Inference Is the Defining Layer of AI
Observability Comes of Age: Why 2026 Is the Turning Point
1 June 2026
Observability Comes of Age: Why 2026 Is the Turning Point
Disconnected tools create disconnected teams.
28 May 2026
Disconnected tools create disconnected teams.
From Weeks to Minutes: A Practical Blueprint for Simplified Data Integration and Access
28 May 2026
From Weeks to Minutes: A Practical Blueprint for Simplified Data Integration and Access
35 Million Lines, Zero Build-Breakers: How Adyen Scaled DevSecOps
23 June 2026
35 Million Lines, Zero Build-Breakers: How Adyen Scaled DevSecOps
How to Conduct AI-Native Bug Discovery & Triage
18 June 2026
How to Conduct AI-Native Bug Discovery & Triage
Toxic Flows: When Your Agent Skill Becomes a Supply Chain Attack
18 June 2026
Toxic Flows: When Your Agent Skill Becomes a Supply Chain Attack

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

Kubernetes v1.36 Promotes Stability, Compatibility & Reproducibility

April 22, 2026

Report: Utilization of Kubernetes Infrastructure Remains Abysmal

April 21, 2026

Solo.io Extends kagent Runtime to NemoClaw Governance Framework for AI Agents

May 8, 2026

AWS Drives Kubernetes Simplification With EKS Hybrid Nodes Gateway

May 4, 2026

Trilio Extends Disaster Recovery Reach to Red Hat OpenShift Virtualization

May 7, 2026

RECENT POSTS

Together, Edera and Minimus Claim They Can Protect Your Software From AI Hackers
Cloud-Native Security Containers DevSecOps Features News Social - Facebook Social - LinkedIn Social - X Virtualization 

Together, Edera and Minimus Claim They Can Protect Your Software From AI Hackers

May 18, 2026 Steven Vaughan-Nichols 0
How to Implement Shift-Left Security in Cloud-Native Applications?
Cloud-Native Security Contributed Content DevSecOps Social - Facebook Social - LinkedIn Social - X 

How to Implement Shift-Left Security in Cloud-Native Applications?

May 18, 2026 James Miller 0
Kubernetes Was the Easy Part
Cloud-Native Platforms Features Open Source Platform Engineering Social - Facebook Social - LinkedIn Social - X 

Kubernetes Was the Easy Part

May 18, 2026 Alan Shimel 0
Cloud Native Is Becoming AI Native
Cloud-Native Architecture Features Social - Facebook Social - LinkedIn Social - X 

Cloud Native Is Becoming AI Native

May 18, 2026 Alan Shimel 0
Beyond the Runbook: How to Scale SRE Operations for Cloud-Native Infrastructure
Cloud-Native Architecture Contributed Content Social - Facebook Social - LinkedIn Social - X Topics 

Beyond the Runbook: How to Scale SRE Operations for Cloud-Native Infrastructure

May 18, 2026 Asaf Savich 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×

Executive Security Survey

1
2
3
4
5
6
7
8

×