Wednesday, February 4, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

container networking

kubernetes, survey, Dapr, CNCF, Survey Finds Growing Container Security Concerns

Survey Surfaces Myriad Kubernetes Networking Challenges

New survey data shows Kubernetes networking complexity rising, with teams struggling across observability, egress, multi-cluster security, and tool sprawl—highlighting the growing need for platform engineering and unified networking approaches ...
Mike Vizard | November 17, 2025 | cloud-native networking, container networking, debugging, devops, eBPF, egress control, Kubernetes clusters, Kubernetes networking, Kubernetes security, load balancing, microservices, multi-cluster networking, network management complexity, network transparency., observability, platform engineering, SRE
service mesh, Buoyant, Istio Solo.io Buoyant Linkerd service mesh

Service Mesh Evolution: Ambient Mode, Gateways & The Return of Simpler Architectures

Service mesh is evolving beyond sidecars. Ambient mode and Gateway APIs deliver security, observability, and traffic control with less overhead. Teams benefit from leaner, more flexible architectures ...
Alan Shimel | October 1, 2025 | Alan, ambient mode, cloud native security, container networking, devops, gateway API, Istio, Kubernetes networking, microservices, observability, OpenShift Service Mesh, platform engineering, service mesh, sidecar alternatives, SRE, traffic management, waypoints, ztunnel
Tigera Extends Project Calico Reach to Secure AI Workloads

Tigera Extends Project Calico Reach to Secure AI Workloads

Tigera this week added an instance of its integrated container networking and security platform for Kubernetes environments that is specifically designed for artificial intelligence (AI) workloads. Based on open source Project Calico ...
Mike Vizard | September 19, 2025 | AI, Calico, container networking, security, Tigera
Cilium containerized network Remote.It service mesh eBPF

Network Topology in Containerized Environments

Managing network topology in a containerized environment can be challenging, but with the right tools and practices, it's achievable ...
Gilad David Mayaan | January 31, 2024 | container networking, microservices, network topology, service mesh, topology
Linkerd, Buoyant, kubernetes, service mesh, NVMe fabrics Tetrate Istio Buoyant service mesh Solo.io Weaveworks Diamanti Spektra data fabric

Tetrate Adds Curated Instance of Istio for EKS to Service Mesh Portfolio

Tetrate today unfurled a technical preview of a curated instance of the Istio service mesh designed to be simpler to deploy on the Amazon Elastic Kubernetes Service (EKS) cloud platform. David Wang, ...
Mike Vizard | April 12, 2023 | Amazon EKS, container networking, Istio, service mesh, Tetrate
kubernetes, network, logistics, security, Traefik Tigera container security Calico Red Hat Dynatrace

Tigera Extends Zero-Trust IT to Kubernetes Pod Level

Tigera has extended its ability to network Kubernetes clusters together to include the ability to assign identities to individual pods. Utpal Bhatt, chief marketing officer for Tigera, said the cluster mesh capabilities ...
Mike Vizard | December 5, 2022 | container networking, kubernetes, Kubernetes networking, pods, Tigera
Sylva StackRox to Advance Container Security

Project Sylva Initiative Lays Cloud-Native Foundation for Telco Services

At the ONE Summit North America 2022 event this week, the Linux Foundation Europe consortium launched an open source Project Sylva framework that leverages cloud-native platforms such as container network functions (CNFs) ...
Mike Vizard | November 17, 2022 | container networking, kubernetes, Linux Foundation, Project Sylva
Apache Spark Grafana eBPF CNI OpenELB Anchore Grype API NetApp Spot

Grafana Labs Allies With Isovalent to Improve Cloud-Native Observability

Grafana Labs and Isovalent have integrated open source Grafana dashboards with the Cilium network overlay for containers that runs at the extended Berkeley Packet Filter (eBPF) microkernel level of the Linux operating ...
Mike Vizard | October 31, 2022 | Cilium, container networking, eBPF, Grafana Labs, Isovalent, kubernetes
IoT Cosmonic Solo.io Isovalent Spectro Cloud Mavenir F5 edge

Spectro Cloud Strengthens Kubernetes Security at the Network Edge

Spectro Cloud has updated its Palette Edge platform with the option to include a distribution of Kubernetes optimized for the network edge. The latest version also adds tamperproof security capabilities for immutable ...
Mike Vizard | October 7, 2022 | container networking, edge computing, kubernetes, Spectro Cloud
cryptojacking Docker Hub

Aqua Security Finds New Cryptojacking Technique

Aqua Security this week issued an alert about a new type of cryptojacking attack that uses containers to consume network bandwidth rather than CPU resources to mine cryptocurrencies. Assaf Morag, lead data ...
Mike Vizard | August 11, 2022 | Aqua Security, container networking, container security, cryptojacking
  • 1
  • 2
  • 3
  • ›
Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
Closing the Cloud Security Gap With Runtime Protection
25 March 2026
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
4 February 2026
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
Run and Scale Agentic AI Applications in Production
7 April 2026
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
17 March 2026
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
The AI Code Wave: How to Use Intelligent Quality Gates to Prevent Reviewer Burnout
10 March 2026
The AI Code Wave: How to Use Intelligent Quality Gates to Prevent Reviewer Burnout
Closing the Cloud Security Gap With Runtime Protection
25 March 2026
Closing the Cloud Security Gap With Runtime Protection
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
17 March 2026
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
The Prescriptive Path to AI Security: From Chaos to Scalable Governance
3 March 2026
The Prescriptive Path to AI Security: From Chaos to Scalable Governance

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

Predict 2026: AI is Forcing Cloud Native to Grow Up

January 9, 2026

IBM Adds Sovereign Core Platform Based on Red Hat OpenShift

January 15, 2026

Kubernetes v1.35 Arrived, Right On Workload-Aware Schedule

January 12, 2026

CNCF Survey Surfaces Widespread Adoption of Kubernetes Clusters

January 26, 2026

MetalBear Simplifies Testing of CI Pipelines on Kubernetes Staging Servers

January 23, 2026

RECENT POSTS

Noma Security Identifies Security Flaw in Docker AI Assistant
Cloud-Native Security Docker Features Social - Facebook Social - LinkedIn Social - X 

Noma Security Identifies Security Flaw in Docker AI Assistant

February 3, 2026 Mike Vizard 0
Designing Reliable Data Pipelines in Cloud-Native Environments 
Contributed Content Data Governance Observability Social - Facebook Social - LinkedIn Social - X Topics 

Designing Reliable Data Pipelines in Cloud-Native Environments 

February 3, 2026 Alex Williams 0
Kubernetes Begins Work on Pod Checkpoint/Restore
Container/Kubernetes Management Features Kubernetes - Beyond Orchestration Social - Facebook Social - LinkedIn Social - X 

Kubernetes Begins Work on Pod Checkpoint/Restore

February 2, 2026 Joab Jackson 0
Wasm at 10, What Lies Ahead
Features News Social - Facebook Social - LinkedIn Social - X 

Wasm at 10, What Lies Ahead

February 1, 2026 Alan Shimel 0
Edera Advisory Highlights Remote Code Execution Flaw in Kubernetes
Features Kubernetes Security Social - Facebook Social - LinkedIn Social - X 

Edera Advisory Highlights Remote Code Execution Flaw in Kubernetes

January 29, 2026 Mike Vizard 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×

Exploring Trends in Mainframe Application Modernization

Step 1 of 8

12%
What is your organization’s primary approach to modernizing mainframe applications?(Required)
Does your organization currently have an application modernization initiative in place?(Required)
What TWO factors MOST OFTEN drive your organization’s decisions to modernize specific mainframe modules? (Select up to 2 responses)(Required)
What strategies does your organization use for mainframe code transformation?(Required)
What is your organization's strategic direction for mainframe applications over the next 3-5 years?(Required)

What factors MOST influence your organization's platform decisions for mainframe applications? (Select up to 2 responses)(Required)
What are the TOP TWO benefits your organization expects from mainframe modernization? (Select up to 2 responses)(Required)
How effective have AI-powered tools for code conversion been in your modernization efforts?(Required)

×