Monday, January 26, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

container images

Docker, secrets, gitguardian Thycotic Kubernetes secrets

Flare Finds 10,000 Docker Hub Images Exposing Secrets

Researchers found thousands of Docker images exposing API keys and tokens, revealing how secrets sprawl, shadow IT, and poor hygiene fuel modern breaches ...
Jeff Burt | December 16, 2025 | API, CI/CD security, cloud computing, container images, credentials, developers and containers, docker hub, exposed secrets, Flare Systems, passwords, shadow IT
The Case for Hardened Container Images with Ryan Carlson

The Case for Hardened Container Images with Ryan Carlson

Chainguard president Ryan Carlson explains how $350 Million in additional funding will be applied to better secure modern cloud-native application development environments using hardened container images. Despite all the talk about shifting ...
Mike Vizard | June 12, 2025 | application development, Chainguard, cloud native, container images
container, Docker, OpenInfra, Epoxy, Buildah for Constructing Container Images

OpenInfra Foundation Brings Bootc Container Images to OpenStack

The OpenInfra Foundation has released its 31st update to the open source OpenStack framework, dubbed Epoxy, that enables bootc container images that incorporate operating systems to now be directly deployed on bare ...
Mike Vizard | April 5, 2025 | container images, open source, updates
CI/CD, GitOps, pipelines, Jenkins, kubernetes, kpack, buildpacks, CI/CD, Codefresh, Komodor, AI, clusters, kubernetes, generative AI Kubernetes Argo container security continuous SQL Server Windocks Tekton Kubeflow Red Hat CI/CD

Kickstart Your Kubernetes Security

Security is a challenging aspect of Kubernetes management, but leveraging the knowledge and tools from the community can significantly help ...
Sylvain Kalache | July 2, 2024 | container images, Kubernetes security, open source tools, Role-Based Access Control (RBAC), Zero-Trust Security
Docker Simplify AI Model Development

What to Know About Deploying Docker

With careful preparation and consideration of potential pitfalls, you can reap Docker's benefits without running into issues ...
Mariusz Michalowski | August 31, 2023 | container images, containers, docker, Docker deployment
Konveyor Loft Labs Ubuntu

Canonical Expands Ubuntu Container Image Portfolio

As part of an update to its Ubuntu operating system, Canonical has added Grafana Loki, Apache Kafka and Apache Cassandra container images to the portfolio of images to which it provides long-term ...
Mike Vizard | April 21, 2022 | Canonical, container images, linux, operating system, ubuntu
Docker Red Hat edge IBM 5G Container edge computing

Docker, Inc. Official Images Available on AWS Container Registry

This week at the AWS re:Invent conference, Docker Inc. announced it is making Docker Official Images available on the Amazon Elastic Container Registry Public (Amazon ECR Public) registry. Previously, Docker Inc. made ...
Mike Vizard | December 3, 2021 | AWS re:invent, container images, containers, Docker Inc.
container vulnerabilities

Report: Docker Hub Container Vulnerabilities High

Prevasio, a provider of a cloud service for scanning container images, this week released a report based on a scan of 4 million public container images found in Docker Hub that concludes ...
Mike Vizard | December 3, 2020 | container images, container security, containers, malware, vulnerabilities
ingress Sysdig SUSE Siloscape security-as-code Docker

Canonical Allies With Docker Inc. on Secure Containers

Canonical has published a curated set of secure container application images on Docker Hub that it has committed to supporting for the next 10 years. The company vowed to fix within 24 ...
Mike Vizard | November 25, 2020 | Canonical, container images, container security, DevSecOps, docker
Kubernetes security FusionAuth secure container images

5 Best Practices for Ensuring Secure Container Images

Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will be in production. For containerized workloads, securing the container image throughout the ...
Loris Degioanni | November 4, 2020 | application, best practices, container images, container security, secure, vulnerabilities
  • 1
  • 2
  • 3
  • ›
Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
4 February 2026
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
17 March 2026
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
The AI Code Wave: How to Use Intelligent Quality Gates to Prevent Reviewer Burnout
4 March 2026
The AI Code Wave: How to Use Intelligent Quality Gates to Prevent Reviewer Burnout
Your “Pager” Is Lying to You: Fixing On-Call, Alerts, and MTTR for Real
3 March 2026
Your “Pager” Is Lying to You: Fixing On-Call, Alerts, and MTTR for Real
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
17 March 2026
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
The Prescriptive Path to AI Security: From Chaos to Scalable Governance
3 March 2026
The Prescriptive Path to AI Security: From Chaos to Scalable Governance
From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer
19 February 2026
From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

Best of 2025: How Anthropic Dogfoods On Claude Code 

January 2, 2026

Best of 2025: Hardening Kubernetes Security with DevSecOps Practices

December 31, 2025

Best of 2025: The Observability Evolution: How AI and Open Source are Taming Kubernetes Complexity

December 31, 2025

Best of 2025: CAST AI Report Surfaces Massive Kubernetes Cloud Infrastructure Waste

January 2, 2026

Predict 2026: AI is Forcing Cloud Native to Grow Up

January 9, 2026

RECENT POSTS

CNCF Survey Surfaces Widespread Adoption of Kubernetes Clusters
Cloud-Native Development Features Social - Facebook Social - LinkedIn Social - X 

CNCF Survey Surfaces Widespread Adoption of Kubernetes Clusters

January 26, 2026 Mike Vizard 0
MetalBear Simplifies Testing of CI Pipelines on Kubernetes Staging Servers
App Dev Platforms for Kubernetes Features Social - Facebook Social - LinkedIn Social - X 

MetalBear Simplifies Testing of CI Pipelines on Kubernetes Staging Servers

January 23, 2026 Mike Vizard 0
How to Keep Cloud-Native Applications Running During DDoS-Scale Traffic Surges
Cloud-Native Development Contributed Content Social - Facebook Social - LinkedIn Social - X Topics 

How to Keep Cloud-Native Applications Running During DDoS-Scale Traffic Surges

January 20, 2026 Carl Torrence 0
IBM Adds Sovereign Core Platform Based on Red Hat OpenShift
Features Social - Facebook Social - LinkedIn Social - X 

IBM Adds Sovereign Core Platform Based on Red Hat OpenShift

January 15, 2026 Mike Vizard 0
How Do Cloud-Native Teams Balance Engineering Excellence With Strong Product Branding? 
Cloud-Native Development Contributed Content Social - Facebook Social - LinkedIn Social - X Topics 

How Do Cloud-Native Teams Balance Engineering Excellence With Strong Product Branding? 

January 13, 2026 Lucy Manole 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×

Exploring Trends in Mainframe Application Modernization

Step 1 of 8

12%
What is your organization’s primary approach to modernizing mainframe applications?(Required)
Does your organization currently have an application modernization initiative in place?(Required)
What TWO factors MOST OFTEN drive your organization’s decisions to modernize specific mainframe modules? (Select up to 2 responses)(Required)
What strategies does your organization use for mainframe code transformation?(Required)
What is your organization's strategic direction for mainframe applications over the next 3-5 years?(Required)

What factors MOST influence your organization's platform decisions for mainframe applications? (Select up to 2 responses)(Required)
What are the TOP TWO benefits your organization expects from mainframe modernization? (Select up to 2 responses)(Required)
How effective have AI-powered tools for code conversion been in your modernization efforts?(Required)

×