Monday, January 19, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

security

edge, containers, containerization, containers, Edara, Buildpacks, container, dockerfiles, time, containers, security, and, Docker, DevOps, docker containers, python, add-ons, kubernetes, Chainguard Docker container Stormforge Azure containers Microsoft New Relic Java Kublr platform Containers on Azure

Unlocking Value, Minimizing Risk in the Kubernetes Ecosystem

The key to mastering Kubernetes is not just selecting the right add-ons — it is about taming the complexity of managing them at scale, while ensuring they align with your evolving business ...
Itiel Shwartz | December 4, 2024 | Add-Ons, best practices, CI/CD Tools, containers, k8s, kubernetes, Policy, security, service meshes, storage, Workflow Automation
container, security, devsecops,

Edera’s Big Container Security Question: Am I Isolated?

Company releases ‘Am I Isolated’, an open source container security benchmark and Rust-based container runtime scanner ...
Adrian Bridgwater | November 11, 2024 | containers, kubernetes, security
How to Optimize Security in Cloud-Native Applications

How to Optimize Security in Cloud-Native Applications

How to optimize the security of cloud-native applications and ensure the resilience and reliability of critical cloud-based services ...
Hazel Raoult | August 20, 2024 | cloud-native applications, security, security testing
Unified Security: Connecting Executives and Engineers in Cloud DevSecOps

Unified Security: Connecting Executives and Engineers in Cloud DevSecOps

In today’s rapidly evolving digital landscape, ensuring robust security in cloud DevSecOps is more crucial than ever. Yet, a growing disconnect between executives and frontline “doers” poses significant challenges. Join JFrog and ...
Jared Harris | August 7, 2024 | Amazon Web Services (AWS), aws, devops, JFrog, security
Kubernetes Turns 10: Here’s Seven Ways to Make It Better

Kubernetes Turns 10: Here’s Seven Ways to Make It Better

What does Kubernetes need to do to maintain its growth? Here are seven ways to make it better ...
Brian Ehlert | July 15, 2024 | automation, compliance, kubernetes, observability, security, troubleshooting
devsecops, supply chain, Kubernetes, practices, DevSecOps, JFrog, DevSecOps, Snyk Cerbos DevSecOps authorization incident Deepfence misconfigured Kubernetes security

Revolutionizing Software Development With Cloud-Native DevSecOps

DevSecOps and cloud-native architectures provide robust tools for monitoring and managing cloud platform resources ...
Swetha Yalamanchili | March 28, 2024 | architecture, CI/CD, cloud native, DevSecOps, pipeline, security
Navigating Risks and Solutions of Container Security

Navigating Risks and Solutions of Container Security

This article explores the risks and threats associated with container environments and solutions and best practices for protecting them ...
Alex Vakulov | March 26, 2024 | cloud, cloud native security, container, risk, security
KubeCon

10 Hot Takes Ahead of KubeCon EU 2024

Ahead of KubeCon + CloudNativeCon EU 2024, here's what's at the top of today's savvy cloud-native and DevOps thought leaders' minds ...
Bill Doerrfeld | March 15, 2024 | application development, cloud native, compliance, IaC, KubeCon, OpenTelemetry, security
New Relic cloud-native no-code

Embracing Code-Driven Security for Cloud-Native Ecosystems

While flexible and scalable, cloud-native architectures introduce new security challenges due to their complexity and dynamic nature ...
Devin Partida | March 7, 2024 | architecture, cloud native, code, containers, kubernetes, security
Kubernetes Is Gaining Momentum, but Security Still Lags Behind

Kubernetes Is Gaining Momentum, but Security Still Lags Behind

While many organizations understand the potential benefits of Kubernetes, fewer understand the platform's cybersecurity vulnerabilities ...
Michael Ioffe | March 5, 2024 | AppSec, cloud native security, kubernetes, risk, security
  • ‹
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 23
  • ›
Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
4 February 2026
Solving Virtualization Dilemmas with Dell, Red Hat and Intel
Your “Pager” Is Lying to You: Fixing On-Call, Alerts, and MTTR for Real
3 March 2026
A Follow-Up Session: The Five Most Dangerous New Attack Techniques…and What to Do for Each
28 February 2026
A Follow-Up Session: The Five Most Dangerous New Attack Techniques…and What to Do for Each
Agentic AI vs. Identity’s Last Mile Problem
28 February 2026
Agentic AI vs. Identity’s Last Mile Problem
From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer
19 February 2026
From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer
From SIEM to Lakehouse: A Practical Path to SOC Modernization with Databricks & Anvilogic
19 February 2026
From SIEM to Lakehouse: A Practical Path to SOC Modernization with Databricks & Anvilogic
Autonomous IT: Transforming Operations and Security in Real Time with AI
10 February 2026
Autonomous IT: Transforming Operations and Security in Real Time with AI

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

Best of 2025: How Anthropic Dogfoods On Claude Code 

January 2, 2026

Best of 2025: Hardening Kubernetes Security with DevSecOps Practices

December 31, 2025

Best of 2025: Why Kubernetes 1.33 Is a Turning Point for MLOps — and Platform Engineering

December 22, 2025

Best of 2025: Microsoft Simplifies Kubernetes Management with AI Integration

December 22, 2025

Best of 2025: The Observability Evolution: How AI and Open Source are Taming Kubernetes Complexity

December 31, 2025

RECENT POSTS

IBM Adds Sovereign Core Platform Based on Red Hat OpenShift
Features Social - Facebook Social - LinkedIn Social - X 

IBM Adds Sovereign Core Platform Based on Red Hat OpenShift

January 15, 2026 Mike Vizard 0
How Do Cloud-Native Teams Balance Engineering Excellence With Strong Product Branding? 
Cloud-Native Development Contributed Content Social - Facebook Social - LinkedIn Social - X Topics 

How Do Cloud-Native Teams Balance Engineering Excellence With Strong Product Branding? 

January 13, 2026 Lucy Manole 0
Kubernetes v1.35 Arrived, Right On Workload-Aware Schedule
Cloud-Native Development Features Kubernetes Social - Facebook Social - LinkedIn Social - X 

Kubernetes v1.35 Arrived, Right On Workload-Aware Schedule

January 12, 2026 Adrian Bridgwater 0
Predict 2026: AI is Forcing Cloud Native to Grow Up
Features News Social - Facebook Social - LinkedIn Social - X 

Predict 2026: AI is Forcing Cloud Native to Grow Up

January 9, 2026 Alan Shimel 0
Autonomous Patching for Cloud-Native Workloads
Video Interviews 

Autonomous Patching for Cloud-Native Workloads

January 7, 2026 Alan Shimel 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×

Exploring Trends in Mainframe Application Modernization

Step 1 of 8

12%
What is your organization’s primary approach to modernizing mainframe applications?(Required)
Does your organization currently have an application modernization initiative in place?(Required)
What TWO factors MOST OFTEN drive your organization’s decisions to modernize specific mainframe modules? (Select up to 2 responses)(Required)
What strategies does your organization use for mainframe code transformation?(Required)
What is your organization's strategic direction for mainframe applications over the next 3-5 years?(Required)

What factors MOST influence your organization's platform decisions for mainframe applications? (Select up to 2 responses)(Required)
What are the TOP TWO benefits your organization expects from mainframe modernization? (Select up to 2 responses)(Required)
How effective have AI-powered tools for code conversion been in your modernization efforts?(Required)

×