Thursday, October 2, 2025
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

container networking

service mesh, Buoyant, Istio Solo.io Buoyant Linkerd service mesh

Service Mesh Evolution: Ambient Mode, Gateways & The Return of Simpler Architectures

Service mesh is evolving beyond sidecars. Ambient mode and Gateway APIs deliver security, observability, and traffic control with less overhead. Teams benefit from leaner, more flexible architectures ...
Alan Shimel | October 1, 2025 | Alan, ambient mode, cloud native security, container networking, devops, gateway API, Istio, Kubernetes networking, microservices, observability, OpenShift Service Mesh, platform engineering, service mesh, sidecar alternatives, SRE, traffic management, waypoints, ztunnel
Tigera Extends Project Calico Reach to Secure AI Workloads

Tigera Extends Project Calico Reach to Secure AI Workloads

Tigera this week added an instance of its integrated container networking and security platform for Kubernetes environments that is specifically designed for artificial intelligence (AI) workloads. Based on open source Project Calico ...
Mike Vizard | September 19, 2025 | AI, Calico, container networking, security, Tigera
Cilium containerized network Remote.It service mesh eBPF

Network Topology in Containerized Environments

Managing network topology in a containerized environment can be challenging, but with the right tools and practices, it's achievable ...
Gilad David Mayaan | January 31, 2024 | container networking, microservices, network topology, service mesh, topology
Linkerd, Buoyant, kubernetes, service mesh, NVMe fabrics Tetrate Istio Buoyant service mesh Solo.io Weaveworks Diamanti Spektra data fabric

Tetrate Adds Curated Instance of Istio for EKS to Service Mesh Portfolio

Tetrate today unfurled a technical preview of a curated instance of the Istio service mesh designed to be simpler to deploy on the Amazon Elastic Kubernetes Service (EKS) cloud platform. David Wang, ...
Mike Vizard | April 12, 2023 | Amazon EKS, container networking, Istio, service mesh, Tetrate
network, logistics, security, Traefik Tigera container security Calico Red Hat Dynatrace

Tigera Extends Zero-Trust IT to Kubernetes Pod Level

Tigera has extended its ability to network Kubernetes clusters together to include the ability to assign identities to individual pods. Utpal Bhatt, chief marketing officer for Tigera, said the cluster mesh capabilities ...
Mike Vizard | December 5, 2022 | container networking, kubernetes, Kubernetes networking, pods, Tigera
Sylva StackRox to Advance Container Security

Project Sylva Initiative Lays Cloud-Native Foundation for Telco Services

At the ONE Summit North America 2022 event this week, the Linux Foundation Europe consortium launched an open source Project Sylva framework that leverages cloud-native platforms such as container network functions (CNFs) ...
Mike Vizard | November 17, 2022 | container networking, kubernetes, Linux Foundation, Project Sylva
Apache Spark Grafana eBPF CNI OpenELB Anchore Grype API NetApp Spot

Grafana Labs Allies With Isovalent to Improve Cloud-Native Observability

Grafana Labs and Isovalent have integrated open source Grafana dashboards with the Cilium network overlay for containers that runs at the extended Berkeley Packet Filter (eBPF) microkernel level of the Linux operating ...
Mike Vizard | October 31, 2022 | Cilium, container networking, eBPF, Grafana Labs, Isovalent, kubernetes
IoT Cosmonic Solo.io Isovalent Spectro Cloud Mavenir F5 edge

Spectro Cloud Strengthens Kubernetes Security at the Network Edge

Spectro Cloud has updated its Palette Edge platform with the option to include a distribution of Kubernetes optimized for the network edge. The latest version also adds tamperproof security capabilities for immutable ...
Mike Vizard | October 7, 2022 | container networking, edge computing, kubernetes, Spectro Cloud
cryptojacking Docker Hub

Aqua Security Finds New Cryptojacking Technique

Aqua Security this week issued an alert about a new type of cryptojacking attack that uses containers to consume network bandwidth rather than CPU resources to mine cryptocurrencies. Assaf Morag, lead data ...
Mike Vizard | August 11, 2022 | Aqua Security, container networking, container security, cryptojacking
7 CNCF Projects For Building Cloud-Native Networks

7 CNCF Projects For Building Cloud-Native Networks

Cloud-native is more than a trend—it’s estimated that by 2023, the majority of new applications will adopt cloud-native components. One aspect of cloud-native is connectivity—networking is essential to enabling containers to talk ...
Bill Doerrfeld | July 6, 2022 | cncf, container networking, networking, networks
  • 1
  • 2
  • 3
  • ›
Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • Error
  • Error
Big Risks, Engineering Bottlenecks, and AI
23 October 2025
Big Risks, Engineering Bottlenecks, and AI

RSS Error: A feed could not be found at `https://devops.com/webinars/feed/`; the status code is `403` and content-type is `text/html; charset=UTF-8`

RSS Error: A feed could not be found at `https://securityboulevard.com/webinars/feed/`; the status code is `403` and content-type is `text/html; charset=UTF-8`

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

eBPF: The Silent Power Behind Cloud Native’s Next Phase

September 10, 2025

vCluster Embraces Karpenter for Dynamic Scaling of Virtual Kubernetes Nodes

September 9, 2025

Apple Buys Styra Brains, OPA Remains Open

September 3, 2025

From Observability to Actionability: Why Metrics Alone Aren’t Enough

September 5, 2025

Fitting Square Kubernetes Into the Round AI-Native Apps

September 8, 2025

RECENT POSTS

LLMs & Kubernetes Configuration: Automating Hardening, Drift Detection and Policy Enforcement
Features Kubernetes Social - Facebook Social - LinkedIn Social - X 

LLMs & Kubernetes Configuration: Automating Hardening, Drift Detection and Policy Enforcement

October 2, 2025 Alan Shimel 0
Report Details Raft of Kubernetes Management Challenges
Container/Kubernetes Management Features Social - Facebook Social - LinkedIn Social - X 

Report Details Raft of Kubernetes Management Challenges

October 1, 2025 Mike Vizard 0
Service Mesh Evolution: Ambient Mode, Gateways & The Return of Simpler Architectures
Features Social - Facebook Social - LinkedIn Social - X 

Service Mesh Evolution: Ambient Mode, Gateways & The Return of Simpler Architectures

October 1, 2025 Alan Shimel 0
Mirantis Adds Consulting Team to Help Deploy MCP Servers on Kubernetes Clusters
Container/Kubernetes Management Features Social - Facebook Social - LinkedIn Social - X 

Mirantis Adds Consulting Team to Help Deploy MCP Servers on Kubernetes Clusters

September 30, 2025 Mike Vizard 0
Stateful Microservice Migration & the Live-State Challenge in Kubernetes
Container Storage/Rise of Stateful Apps Container/Kubernetes Management Features Social - Facebook Social - LinkedIn Social - X 

Stateful Microservice Migration & the Live-State Challenge in Kubernetes

September 30, 2025 Alan Shimel 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2025 Techstrong Group, Inc. All rights reserved.
×