cloud native security
Survey Surfaces Raft of Container Security Challenges
A BellSoft survey reveals gaps in container security practices, showing that human error, limited vulnerability scanning, and infrequent patching continue to expose cloud-native environments to risk ...
Autonomous Patching for Cloud-Native Workloads
The cloud-native stack didn’t make security go away—it just spread it across more layers, more repos, more images, and more “who owns this?” moments. Eilon Elhadad, co-founder and CTO of Echo, talks ...
Docker, Inc. Adds More Than a Thousand Free Hardened Container Images
Docker is releasing more than 1,000 hardened container images under an open source license, aiming to cut vulnerabilities and strengthen software supply chains ...
Solo Gets Stickier on Gloo Mesh for Amazon ECS
Solo.io, Gloo Mesh, Gloo Gateway, Amazon ECS, ECS service mesh, Istio Ambient Mode, sidecar-less service mesh, API management, microservices networking, cloud-native security, cloud observability, zero-trust policies, traffic management, App Mesh deprecation, ECS ...
Amazon EKS Capabilities Drive ‘Opinionated’ Workload Orchestration and Resource Management
This is an “extensible set” of Kubernetes-native solutions that streamline workload orchestration, cloud resource management and orchestration ...
BellSoft’s 3-in-1 Strategy for Container Security
BellSoft debuts Hardened Images for Kubernetes, reducing vulnerabilities with locked, lightweight containers built on Alpaquita Linux and Liberica JDK for secure performance ...
Jeff Burt | | 3-in-1 approach, AI threats, Chainguard, cloud native security, cloud security, container hardening, container incidents, container security, container vulnerabilities, containerized applications, CVE remediation, distroless containers, hardened containers, Hardened Images, Java runtime optimization, kubernetes, lightweight Linux, regulatory compliance, runtime security, secure container images, secure DevOps, software supply chain, Vulnerability Management
5 Reasons Cloud-Native Companies Should Start Adopting Quantum-Safe Security Today
Quantum computing threatens today’s encryption. Learn why cloud-native organizations must adopt quantum-safe security to stay compliant and resilient ...
Carl Torrence | | API security, cloud encryption, cloud native security, cloud-native DevOps, container security, cybersecurity compliance, data protection, DevSecOps, future-proof encryption, microservices security, multi-cloud security, NIST PQC standards, post-quantum cryptography, PQC, quantum computing risks, quantum resilience, quantum risk mitigation, quantum-safe encryption, quantum-safe security, regulatory compliance
Securing AI Agents With Docker MCP and cagent: Building Trust in Cloud-Native Workflows
Learn how Docker’s Model Context Protocol (MCP) and cagent enable secure, isolated, and auditable AI agent workflows in cloud-native environments ...
Pragya Keshap | | agent-based automation, AgentOps, AI agent security, AI guardrails, AI in DevOps, AI infrastructure security, AI model governance, AI model isolation, AI risk mitigation, AI sandboxing, AI workflow auditing, AI workflow governance, cagent, cloud native security, container security, containerized AI agents, DevSecOps automation, Docker AI tools, Docker containers, Docker MCP, Kubernetes security, least privilege AI, Model Context Protocol, open-source AI security, secure AI pipelines, secure AI workflows, secure containerization, trusted AI agents
The Evolution of Container Security: From Reactive Fixes to Proactive Defense
Container adoption has reached a tipping point. Kubernetes now runs in 96% of enterprises, yet security remains a critical concern affecting both bottom lines and careers. The numbers tell a sobering story: ...
How Distroless Containers Defend Against npm Malware Attacks
The npm breach shows why distroless containers matter. Learn how minimal, continuously rebuilt images strengthen cloud-native supply-chain security ...
Dhanush V M | | CleanStart, cloud native security, container hardening, container security, DevSecOps, distroless best practices, distroless containers, KubeCon 2025, Kubernetes security, malware prevention, minimal container images, npm attack, open source security, phishing attack, SBOM, secure build pipelines, secure software delivery, SLSA compliance, software supply chain security, vulnerability remediation

