Tuesday, January 27, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

CNAPP

Supply Chain Security: Cloud Native’s Weakest Link?

Supply Chain Security: Cloud Native’s Weakest Link?

For years, the conversation in security revolved around networks, firewalls, and endpoints. The perimeter was king. But in the cloud-native era, the old perimeter has dissolved into microservices, APIs, and pipelines. What’s ...
Alan Shimel | September 17, 2025 | cloud native, CNAPP, Log4j, SolarWinds, supply chain
visibility, runtime, eBPF Packet-Level Visibility to Workloads

Runtime Visibility: The Missing Layer in Cloud-Native Security

Cloud-native security can’t rely on old perimeter defenses. With workloads spinning up in seconds, runtime visibility is now the missing layer leaders must prioritize. Learn why observability is security, how tools like ...
Alan Shimel | September 16, 2025 | cloud native security, cloud workload protection, CNAPP, container runtime monitoring, DevSecOps, eBPF observability, Kubernetes security, real-time anomaly detection, runtime visibility, security observability
a yawning fox in a green field.

Safeguarding Serverless Architectures: Understanding the Vital Role of CNAPP

In today's rapidly evolving tech landscape, understanding serverless architectures is crucial for organizations striving to leverage cloud computing efficiently ...
Anton Lucanus | April 30, 2024 | CNAPP, CSPM, cybersecurity, cyberthreats, serverless architecture
AI, legacy, applications, Uptycs containerization legacy Kubernetes Ermetic CNAPP antipatterns Mirantis Twistlock Provides Full Lifecycle

Uptycs Deepens CNAPP Support for Kubernetes

Uptycs' CNAPP now has the ability to detect and highlight Kubernetes security issues and misconfigurations using the Goat playground ...
Mike Vizard | November 7, 2023 | application protection, cloud native security, cloud-native application security, CNAPP, Uptycs
AI, legacy, applications, Uptycs containerization legacy Kubernetes Ermetic CNAPP antipatterns Mirantis Twistlock Provides Full Lifecycle

Ermetic Adds Kubernetes Support to CNAPP

Ermetic has added Kubernetes support to its cloud-native application protection platform (CNAPP) that enables IT and cybersecurity teams to discover and fix misconfigurations, compliance violations and risky or excessive privileges. Amy Ariel, ...
Mike Vizard | March 9, 2023 | cloud native, CNAPP, Ermetic, kubernetes, security
runtime, visibility, Chainguard, threat, cloud-native security, Venafi, security, sigstore, KubeCon, cloud-native, security, secure, Rubrik, Kubernetes, Cloud-Native Security Best Practices

Cybersecurity in Cloud-Native Environments

The rapid adoption of the cloud has broadened the horizons for businesses embarking on a digital transformation journey, and organizations are swiftly taking the leap to cloud-native applications that are built using ...
Deepak Gupta | February 23, 2023 | cloud native security, cloud-native applications, CNAPP
metrics, agents, ai, cloud-native, cloud native, project, istio, ambient, architecture, modules, cloud native, CCoE Kubernetes Virtana CrowdStrike cloud native

CrowdStrike Adds Container Support to Cloud Security Platform

CrowdStrike today launched a cloud-native application protection platform (CNAPP) based on its Falcon Cloud Workload Protection (CWP) offering that can now detect threats aimed at containers, prevent rogue containers from running and ...
Mike Vizard | April 27, 2022 | cloud security, cloud-native apps, cloud-native platforms, CNAPP, CrowdStrike
Tigera container platform

Tigera Adds Scanning Engine to CNAPP for Kubernetes

Tigera today announced the addition of a scanning engine to its Calico Cloud service that will continuously assess images for vulnerabilities and misconfigurations in addition to managing interactions among microservices running on ...
Mike Vizard | February 10, 2022 | Calico Cloud, cloud native security, CNAPP, Tigera

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
4 February 2026
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
17 March 2026
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
The AI Code Wave: How to Use Intelligent Quality Gates to Prevent Reviewer Burnout
4 March 2026
The AI Code Wave: How to Use Intelligent Quality Gates to Prevent Reviewer Burnout
Your “Pager” Is Lying to You: Fixing On-Call, Alerts, and MTTR for Real
3 March 2026
Your “Pager” Is Lying to You: Fixing On-Call, Alerts, and MTTR for Real
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
17 March 2026
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
The Prescriptive Path to AI Security: From Chaos to Scalable Governance
3 March 2026
The Prescriptive Path to AI Security: From Chaos to Scalable Governance
From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer
19 February 2026
From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

Best of 2025: How Anthropic Dogfoods On Claude Code 

January 2, 2026

Best of 2025: Hardening Kubernetes Security with DevSecOps Practices

December 31, 2025

Best of 2025: The Observability Evolution: How AI and Open Source are Taming Kubernetes Complexity

December 31, 2025

Best of 2025: CAST AI Report Surfaces Massive Kubernetes Cloud Infrastructure Waste

January 2, 2026

Predict 2026: AI is Forcing Cloud Native to Grow Up

January 9, 2026

RECENT POSTS

CNCF Survey Surfaces Widespread Adoption of Kubernetes Clusters
Cloud-Native Development Features Social - Facebook Social - LinkedIn Social - X 

CNCF Survey Surfaces Widespread Adoption of Kubernetes Clusters

January 26, 2026 Mike Vizard 0
MetalBear Simplifies Testing of CI Pipelines on Kubernetes Staging Servers
App Dev Platforms for Kubernetes Features Social - Facebook Social - LinkedIn Social - X 

MetalBear Simplifies Testing of CI Pipelines on Kubernetes Staging Servers

January 23, 2026 Mike Vizard 0
How to Keep Cloud-Native Applications Running During DDoS-Scale Traffic Surges
Cloud-Native Development Contributed Content Social - Facebook Social - LinkedIn Social - X Topics 

How to Keep Cloud-Native Applications Running During DDoS-Scale Traffic Surges

January 20, 2026 Carl Torrence 0
IBM Adds Sovereign Core Platform Based on Red Hat OpenShift
Features Social - Facebook Social - LinkedIn Social - X 

IBM Adds Sovereign Core Platform Based on Red Hat OpenShift

January 15, 2026 Mike Vizard 0
How Do Cloud-Native Teams Balance Engineering Excellence With Strong Product Branding? 
Cloud-Native Development Contributed Content Social - Facebook Social - LinkedIn Social - X Topics 

How Do Cloud-Native Teams Balance Engineering Excellence With Strong Product Branding? 

January 13, 2026 Lucy Manole 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×

Exploring Trends in Mainframe Application Modernization

Step 1 of 8

12%
What is your organization’s primary approach to modernizing mainframe applications?(Required)
Does your organization currently have an application modernization initiative in place?(Required)
What TWO factors MOST OFTEN drive your organization’s decisions to modernize specific mainframe modules? (Select up to 2 responses)(Required)
What strategies does your organization use for mainframe code transformation?(Required)
What is your organization's strategic direction for mainframe applications over the next 3-5 years?(Required)

What factors MOST influence your organization's platform decisions for mainframe applications? (Select up to 2 responses)(Required)
What are the TOP TWO benefits your organization expects from mainframe modernization? (Select up to 2 responses)(Required)
How effective have AI-powered tools for code conversion been in your modernization efforts?(Required)

×