cloud native security
Autonomous Patching for Cloud-Native Workloads
The cloud-native stack didn’t make security go away—it just spread it across more layers, more repos, more images, and more “who owns this?” moments. Eilon Elhadad, co-founder and CTO of Echo, talks ...
Docker, Inc. Adds More Than a Thousand Free Hardened Container Images
Docker is releasing more than 1,000 hardened container images under an open source license, aiming to cut vulnerabilities and strengthen software supply chains ...
Solo Gets Stickier on Gloo Mesh for Amazon ECS
Solo.io, Gloo Mesh, Gloo Gateway, Amazon ECS, ECS service mesh, Istio Ambient Mode, sidecar-less service mesh, API management, microservices networking, cloud-native security, cloud observability, zero-trust policies, traffic management, App Mesh deprecation, ECS ...
Amazon EKS Capabilities Drive ‘Opinionated’ Workload Orchestration and Resource Management
This is an “extensible set” of Kubernetes-native solutions that streamline workload orchestration, cloud resource management and orchestration ...
BellSoft’s 3-in-1 Strategy for Container Security
BellSoft debuts Hardened Images for Kubernetes, reducing vulnerabilities with locked, lightweight containers built on Alpaquita Linux and Liberica JDK for secure performance ...
5 Reasons Cloud-Native Companies Should Start Adopting Quantum-Safe Security Today
Quantum computing threatens today’s encryption. Learn why cloud-native organizations must adopt quantum-safe security to stay compliant and resilient ...
Securing AI Agents With Docker MCP and cagent: Building Trust in Cloud-Native Workflows
Learn how Docker’s Model Context Protocol (MCP) and cagent enable secure, isolated, and auditable AI agent workflows in cloud-native environments ...
The Evolution of Container Security: From Reactive Fixes to Proactive Defense
Container adoption has reached a tipping point. Kubernetes now runs in 96% of enterprises, yet security remains a critical concern affecting both bottom lines and careers. The numbers tell a sobering story: ...
How Distroless Containers Defend Against npm Malware Attacks
The npm breach shows why distroless containers matter. Learn how minimal, continuously rebuilt images strengthen cloud-native supply-chain security ...
Why Traditional Kubernetes Security Falls Short for AI Workloads
AI workloads on Kubernetes bring new security risks. Learn five principles—zero trust, observability, and policy-as-code—to protect distributed AI pipelines ...

