Tuesday, October 14, 2025
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

cloud native security

runtime, visibility, Chainguard, threat, cloud-native security, Venafi, security, sigstore, KubeCon, cloud-native, security, secure, Rubrik, Kubernetes, Cloud-Native Security Best Practices

Runtime Visibility & AI-powered Security in Cloud-Native Environments

Kubernetes and cloud-native platforms have transformed software delivery — but also redefined the attack surface. As threats shift to runtime, visibility and real-time response have become the new security frontline. AI-driven anomaly ...
Alan Shimel | October 6, 2025 | AI copilot, AI governance, AI in cybersecurity, anomaly detection, automated response, CI/CD security, cloud native security, cloud security, cloud-native defense, container security, DevSecOps, explainable AI, kubernetes, LLMs in security, observability, platform engineering, runtime protection, runtime security, runtime visibility, security automation, security telemetry, service mesh, threat detection, zero-trust
security, ai, tools, security, kubernetes, PKI, security, networking, AI, Kubernetes, AppViewX Securing containers

LLMs & Kubernetes Configuration: Automating Hardening, Drift Detection and Policy Enforcement

Kubernetes misconfigurations remain the top security risk. AI copilots promise automated hardening, drift detection, and policy enforcement to make clusters safer ...
Alan Shimel | October 2, 2025 | admission controllers, AI copilots, AI in Kubernetes, cloud native security, cncf, drift detection, GitOps, KubeGuard, kubernetes, Kubernetes governance, kubernetes hardening, Kubernetes misconfiguration, Kubernetes security, Kyverno, large language models, LLMs, OPA, OpenTelemetry, platform engineering, RBAC, YAML Jenga
service mesh, Buoyant, Istio Solo.io Buoyant Linkerd service mesh

Service Mesh Evolution: Ambient Mode, Gateways & The Return of Simpler Architectures

Service mesh is evolving beyond sidecars. Ambient mode and Gateway APIs deliver security, observability, and traffic control with less overhead. Teams benefit from leaner, more flexible architectures ...
Alan Shimel | October 1, 2025 | Alan, ambient mode, cloud native security, container networking, devops, gateway API, Istio, Kubernetes networking, microservices, observability, OpenShift Service Mesh, platform engineering, service mesh, sidecar alternatives, SRE, traffic management, waypoints, ztunnel
Kubernetes, observability, tracing, kubernetes observability, Grafana labs, kubernetes, observe, tool, Datadog, data, observability, kubernetes Docker Granulate observability

Bridging Observability & Security in Kubernetes: Beyond Just Metrics

Kubernetes has expanded agility but also the attack surface. Alan argues that observability and security can no longer live in silos — metrics, logs, and traces already hold critical security signals, while ...
Alan Shimel | September 29, 2025 | anomaly detection, C2 traffic, cloud native security, convergence, cross-training, crypto-mining, devops, kubernetes, lateral movement, logs, metrics, observability, observability-driven security, OpenTelemetry, organizational silos, platform engineering, runtime security, security, SRE, tool sprawl, traces
runtime, visibility, Chainguard, threat, cloud-native security, Venafi, security, sigstore, KubeCon, cloud-native, security, secure, Rubrik, Kubernetes, Cloud-Native Security Best Practices

CNCF, Docker Partnership Streamlines Container Security, Operations 

CNCF and Docker partner to boost open source projects with security, scalability and trusted container delivery through Docker’s DSOS program ...
Nathan Eddy | September 25, 2025 | cloud native security, CNCF Docker partnership, CNCF projects Kubernetes Prometheus Envoy OpenTelemetry, container image provenance, container registry scalability, container security, DevSecOps open source, Docker Hub trusted images, Docker Hub usage insights, Docker Scout vulnerability scanning, Docker Sponsored Open Source, DSOS program, open source maintainers, open source software supply chain security
CNCF, Kubernetes, SUSECON, SUSE, cloud-native, stack, CNCF, cert manager, guidance, patent, cloud native, CNCF Advances Linkerd Service Mesh cloud-native

CNCF and Docker: The Next Phase of Cloud Native Supply Chain Evolution

The CNCF–Docker partnership strengthens cloud native supply chain security with verified namespaces, SBOMs, and signed images. Trust becomes the new baseline ...
Alan Shimel | September 24, 2025 | cloud native security, CNCF Docker partnership, container image provenance, Docker Hub namespaces, Kubernetes trust, OSS Sponsored Program, platform engineering security, SBOM generation, signed container images, software supply chain
WASM, edge, frontier, cloud native, cloud native, KubeCon, CloudNativeNow2025

The Cloud-Native Frontier is at the Edge

The future of cloud-native is hybrid and edge. Learn how WebAssembly (WASM) complements containers to power next-gen workloads with speed, security and agility ...
Alan Shimel | September 23, 2025 | cloud native, cloud native security, CNCF WASM, distributed workloads, edge computing, hybrid cloud, hybrid cloud strategy, Kubernetes at the edge, WASM vs containers, WebAssembly WASM
visibility, runtime, eBPF Packet-Level Visibility to Workloads

Runtime Visibility: The Missing Layer in Cloud-Native Security

Cloud-native security can’t rely on old perimeter defenses. With workloads spinning up in seconds, runtime visibility is now the missing layer leaders must prioritize. Learn why observability is security, how tools like ...
Alan Shimel | September 16, 2025 | cloud native security, cloud workload protection, CNAPP, container runtime monitoring, DevSecOps, eBPF observability, Kubernetes security, real-time anomaly detection, runtime visibility, security observability
devsecops, supply chain, Kubernetes, practices, DevSecOps, JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

AI Security in the Cloud-Native DevSecOps Pipeline

As AI reshapes DevSecOps, speed and efficiency collide with new, often hidden, security risks. From machine-generated code flaws to model supply chain threats, the future of cloud-native security depends on blending AI’s ...
Saqib Jan | August 13, 2025 | AI DevSecOps, AI security, cloud native security
microsoft, azure,

Curved Kubernetes: Microsoft Workload Orchestration in Azure Arc

Microsoft has confirmed the release and general availability of “workload orchestration” as a new service in Azure Arc, the company’s extension mechanism that enables Azure cloud management capabilities to work outside Azure ...
Adrian Bridgwater | July 9, 2025 | CI/CD, cloud native security, cloud-native applications, kubernetes, microservices, Microsoft Arc
  • 1
  • 2
  • 3
  • …
  • 9
  • ›
Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • Error
  • SecurityBoulevard.com
Big Risks, Engineering Bottlenecks, and AI
23 October 2025
Big Risks, Engineering Bottlenecks, and AI

RSS Error: A feed could not be found at `https://devops.com/webinars/feed/`; the status code is `403` and content-type is `text/html; charset=UTF-8`

Double Your Ransoms, Not Your Costs: Scaling Your Gang with AI
18 November 2025
Double Your Ransoms, Not Your Costs: Scaling Your Gang with AI
Prioritizing Digital Executive Protection to Manage Corporate Risk
13 November 2025
Prioritizing Digital Executive Protection to Manage Corporate Risk
Designing and Defending AI Agents: A Practical Guide
29 October 2025
Designing and Defending AI Agents: A Practical Guide

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

Tigera Extends Project Calico Reach to Secure AI Workloads

September 19, 2025

OpenTofu and the New Era of Infrastructure as Code

September 19, 2025

WebAssembly 3.0 Delivers Major Performance and Language Support Upgrades

September 22, 2025

Supply Chain Security: Cloud Native’s Weakest Link?

September 17, 2025

Runtime Visibility: The Missing Layer in Cloud-Native Security

September 16, 2025

RECENT POSTS

Building Cloud-Native Agentic Systems With Dapr Agents
Cloud-Native Architecture Contributed Content Social - Facebook Social - LinkedIn Social - X Topics 

Building Cloud-Native Agentic Systems With Dapr Agents

October 13, 2025 Siri Varma Vegiraju 0
Building FinOps With k0rdent Open Source
Contributed Content Kubernetes Social - Facebook Social - LinkedIn Social - X Topics 

Building FinOps With k0rdent Open Source

October 9, 2025 Satyam Bhardwaj 0
Enabling Efficient AI Workloads in Cloud-Native Development using Docker Offload
Contributed Content Docker Social - Facebook Social - LinkedIn Social - X Topics 

Enabling Efficient AI Workloads in Cloud-Native Development using Docker Offload

October 8, 2025 Naga Santhosh Reddy Vootukuri 0
How AI and Python Can Transform Docker Security and Vulnerability Management
Contributed Content Docker Social - Facebook Social - LinkedIn Social - X Topics 

How AI and Python Can Transform Docker Security and Vulnerability Management

October 7, 2025 Advait Patel 0
Runtime Visibility & AI-powered Security in Cloud-Native Environments
Cloud-Native Security Features Social - Facebook Social - LinkedIn Social - X Topics 

Runtime Visibility & AI-powered Security in Cloud-Native Environments

October 6, 2025 Alan Shimel 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2025 Techstrong Group, Inc. All rights reserved.
×