Wednesday, January 14, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

container networking

kubernetes, survey, Dapr, CNCF, Survey Finds Growing Container Security Concerns

Survey Surfaces Myriad Kubernetes Networking Challenges

New survey data shows Kubernetes networking complexity rising, with teams struggling across observability, egress, multi-cluster security, and tool sprawl—highlighting the growing need for platform engineering and unified networking approaches ...
Mike Vizard | November 17, 2025 | cloud-native networking, container networking, debugging, devops, eBPF, egress control, Kubernetes clusters, Kubernetes networking, Kubernetes security, load balancing, microservices, multi-cluster networking, network management complexity, network transparency., observability, platform engineering, SRE
service mesh, Buoyant, Istio Solo.io Buoyant Linkerd service mesh

Service Mesh Evolution: Ambient Mode, Gateways & The Return of Simpler Architectures

Service mesh is evolving beyond sidecars. Ambient mode and Gateway APIs deliver security, observability, and traffic control with less overhead. Teams benefit from leaner, more flexible architectures ...
Alan Shimel | October 1, 2025 | Alan, ambient mode, cloud native security, container networking, devops, gateway API, Istio, Kubernetes networking, microservices, observability, OpenShift Service Mesh, platform engineering, service mesh, sidecar alternatives, SRE, traffic management, waypoints, ztunnel
Tigera Extends Project Calico Reach to Secure AI Workloads

Tigera Extends Project Calico Reach to Secure AI Workloads

Tigera this week added an instance of its integrated container networking and security platform for Kubernetes environments that is specifically designed for artificial intelligence (AI) workloads. Based on open source Project Calico ...
Mike Vizard | September 19, 2025 | AI, Calico, container networking, security, Tigera
Cilium containerized network Remote.It service mesh eBPF

Network Topology in Containerized Environments

Managing network topology in a containerized environment can be challenging, but with the right tools and practices, it's achievable ...
Gilad David Mayaan | January 31, 2024 | container networking, microservices, network topology, service mesh, topology
Linkerd, Buoyant, kubernetes, service mesh, NVMe fabrics Tetrate Istio Buoyant service mesh Solo.io Weaveworks Diamanti Spektra data fabric

Tetrate Adds Curated Instance of Istio for EKS to Service Mesh Portfolio

Tetrate today unfurled a technical preview of a curated instance of the Istio service mesh designed to be simpler to deploy on the Amazon Elastic Kubernetes Service (EKS) cloud platform. David Wang, ...
Mike Vizard | April 12, 2023 | Amazon EKS, container networking, Istio, service mesh, Tetrate
kubernetes, network, logistics, security, Traefik Tigera container security Calico Red Hat Dynatrace

Tigera Extends Zero-Trust IT to Kubernetes Pod Level

Tigera has extended its ability to network Kubernetes clusters together to include the ability to assign identities to individual pods. Utpal Bhatt, chief marketing officer for Tigera, said the cluster mesh capabilities ...
Mike Vizard | December 5, 2022 | container networking, kubernetes, Kubernetes networking, pods, Tigera
Sylva StackRox to Advance Container Security

Project Sylva Initiative Lays Cloud-Native Foundation for Telco Services

At the ONE Summit North America 2022 event this week, the Linux Foundation Europe consortium launched an open source Project Sylva framework that leverages cloud-native platforms such as container network functions (CNFs) ...
Mike Vizard | November 17, 2022 | container networking, kubernetes, Linux Foundation, Project Sylva
Apache Spark Grafana eBPF CNI OpenELB Anchore Grype API NetApp Spot

Grafana Labs Allies With Isovalent to Improve Cloud-Native Observability

Grafana Labs and Isovalent have integrated open source Grafana dashboards with the Cilium network overlay for containers that runs at the extended Berkeley Packet Filter (eBPF) microkernel level of the Linux operating ...
Mike Vizard | October 31, 2022 | Cilium, container networking, eBPF, Grafana Labs, Isovalent, kubernetes
IoT Cosmonic Solo.io Isovalent Spectro Cloud Mavenir F5 edge

Spectro Cloud Strengthens Kubernetes Security at the Network Edge

Spectro Cloud has updated its Palette Edge platform with the option to include a distribution of Kubernetes optimized for the network edge. The latest version also adds tamperproof security capabilities for immutable ...
Mike Vizard | October 7, 2022 | container networking, edge computing, kubernetes, Spectro Cloud
cryptojacking Docker Hub

Aqua Security Finds New Cryptojacking Technique

Aqua Security this week issued an alert about a new type of cryptojacking attack that uses containers to consume network bandwidth rather than CPU resources to mine cryptocurrencies. Assaf Morag, lead data ...
Mike Vizard | August 11, 2022 | Aqua Security, container networking, container security, cryptojacking
  • 1
  • 2
  • 3
  • ›
Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
4 February 2026
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
Agentic Automation: The Future of Workflows – Beyond Automation: Designing Multi-Agent Systems for Enterprise Scale
13 January 2026
Agentic Automation: The Future of Workflows – Beyond Automation: Designing Multi-Agent Systems for Enterprise Scale
State of Cloud Security: The Speed of AI, The Consolidation of Defense, and The Future of the SOC
13 January 2026
State of Cloud Security: The Speed of AI, The Consolidation of Defense, and The Future of the SOC
A Follow-Up Session: The Five Most Dangerous New Attack Techniques…and What to Do for Each
28 February 2026
A Follow-Up Session: The Five Most Dangerous New Attack Techniques…and What to Do for Each
Protect Your SDLC From Risky And Malicious third party (from packages to models and more)
26 February 2026
Protect Your SDLC From Risky And Malicious third party (from packages to models and more)
Building a Platform for Velocity: Accelerating Adoption with Internal Developer Portals
17 February 2026
Building a Platform for Velocity: Accelerating Adoption with Internal Developer Portals
From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer
19 February 2026
From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer
From SIEM to Lakehouse: A Practical Path to SOC Modernization with Databricks & Anvilogic
19 February 2026
From SIEM to Lakehouse: A Practical Path to SOC Modernization with Databricks & Anvilogic
Autonomous IT: Transforming Operations and Security in Real Time with AI
10 February 2026
Autonomous IT: Transforming Operations and Security in Real Time with AI

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

Flare Finds 10,000 Docker Hub Images Exposing Secrets

December 16, 2025

Best of 2025: How Anthropic Dogfoods On Claude Code 

January 2, 2026

Docker, Inc. Adds More Than a Thousand Free Hardened Container Images

December 17, 2025

Best of 2025: Hardening Kubernetes Security with DevSecOps Practices

December 31, 2025

Best of 2025: Why Kubernetes 1.33 Is a Turning Point for MLOps — and Platform Engineering

December 22, 2025

RECENT POSTS

How Do Cloud-Native Teams Balance Engineering Excellence With Strong Product Branding? 
Cloud-Native Development Contributed Content Social - Facebook Social - LinkedIn Social - X Topics 

How Do Cloud-Native Teams Balance Engineering Excellence With Strong Product Branding? 

January 13, 2026 Lucy Manole 0
Kubernetes v1.35 Arrived, Right On Workload-Aware Schedule
Cloud-Native Development Features Kubernetes Social - Facebook Social - LinkedIn Social - X 

Kubernetes v1.35 Arrived, Right On Workload-Aware Schedule

January 12, 2026 Adrian Bridgwater 0
Predict 2026: AI is Forcing Cloud Native to Grow Up
Features News Social - Facebook Social - LinkedIn Social - X 

Predict 2026: AI is Forcing Cloud Native to Grow Up

January 9, 2026 Alan Shimel 0
Autonomous Patching for Cloud-Native Workloads
Video Interviews 

Autonomous Patching for Cloud-Native Workloads

January 7, 2026 Alan Shimel 0
From Cloud First to Cloud Fit: Rethinking Where Workloads Belong
Video Interviews 

From Cloud First to Cloud Fit: Rethinking Where Workloads Belong

January 7, 2026 Alan Shimel 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×