Saturday, May 23, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

Trend Micro

Bad Actors Exploiting Docker Remote API Servers in Attacks

Bad Actors Exploiting Docker Remote API Servers in Attacks

Researchers from cybersecurity vendor Trend Micro are urging developers to secure and monitor their Docker remote API servers after attacks by threat actors targeting the systems to install a Linux malware and ...
Jeff Burt | November 4, 2024 | cryptomining, Docker attack, malware campaign, remote API, Trend Micro
Trend Micro Tightens Container Security Integration in Cloud Platform

Trend Micro Tightens Container Security Integration in Cloud Platform

Trend Micro today extended its Trend Micro Cloud One platform to more tightly integrate its container security offering. Mike Milner, vice president of cloud technology for Trend Micro, said the latest edition ...
Mike Vizard | July 25, 2022 | cloud, container platform, container security, Trend Micro

Influencing Future of Cloud Security with MITRE ATT&CK® for Containers

Trend Micro contributes to new framework, helping businesses build and deploy secure container environments DALLAS, May 4, 2021 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global leader in cloud security, ...
Deborah Schalm | May 4, 2021 | MITRE ATT&CK®, Trend Micro
Cado Trend Micro Docker vulnerability

Trend Micro Details Attack Against Containers

Trend Micro revealed this week it has encountered a malicious payload within a Docker container; the payload was specifically crafted to escape from a privileged container in a way that would enable ...
Mike Vizard | February 11, 2021 | containers, Docker vulnerability, privileged container, Trend Micro

Trend Micro Achieves AWS Outposts Ready Designation to Deliver Seamless Hybrid Cloud Security

Data protection for financial services and governments with data residency requirements DALLAS, September 15, 2020 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), the leader in cloud security, today announced that its hybrid cloud security offerings ...
Deborah Schalm | September 15, 2020 | AWS Outposts, Trend Micro
Kubernetes Carbonetes

Trend Micro Publishes Guide to Kubernetes Security

Trend Micro has created a guide to Kubernetes threats that categorizes the threats into three broad categories: external attacks, misconfiguration issues and vulnerable applications. Mark Nunnikhoven, vice president of cloud research at ...
Mike Vizard | May 11, 2020 | container libraries, container misconfigurations, container security, container vulnerabilities, kubernetes, Trend Micro

Trend Micro Debuts World’s Broadest Security Services Platform for Organizations Building Applications in the Cloud

Trend Micro Cloud One automates and simplifies cloud security to give organizations the flexibility they need to meet their most strategic cloud priorities DALLAS, November 18, 2019 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global ...
Deborah Schalm | November 18, 2019 | Cloud One, Trend Micro
VMware

Trend Micro Extends Container Security Reach

Trend Micro is extending the reach of its container security offerings to now address the full range of the DevSecOps life cycle. The latest updates to Trend Micro Deep Security add the ...
Mike Vizard | May 20, 2019 | container security, containers, cybersecurity, DevSecOps, docker, kubernetes, REST APIs, Trend Micro
Trend Micro to Secure Container Images

Trend Micro Moves to Secure Container Images

As the number of organizations that are embracing containers continues to increase, so does the number of incumbent cybersecurity vendors extending the reach of their platforms. Trend Micro, as part of that ...
Mike Vizard | June 19, 2018 | container security, security platform, Trend Micro

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
Healthcare Innovation: AI in the Cloud
24 June 2026
Healthcare Innovation: AI in the Cloud
From Experimentation to Production: Why Inference Is the Defining Layer of AI
4 June 2026
From Experimentation to Production: Why Inference Is the Defining Layer of AI
How to Conduct AI-Native Bug Discovery & Triage
18 June 2026
How to Conduct AI-Native Bug Discovery & Triage
The Future of Agentic Software Delivery: Unifying Source & Binaries
17 June 2026
The Future of Agentic Software Delivery: Unifying Source & Binaries
CI/CD: Delivering Software at Enterprise Velocity
15 June 2026
CI/CD: Delivering Software at Enterprise Velocity
35 Million Lines, Zero Build-Breakers: How Adyen Scaled DevSecOps
23 June 2026
35 Million Lines, Zero Build-Breakers: How Adyen Scaled DevSecOps
How to Conduct AI-Native Bug Discovery & Triage
18 June 2026
How to Conduct AI-Native Bug Discovery & Triage
Toxic Flows: When Your Agent Skill Becomes a Supply Chain Attack
18 June 2026
Toxic Flows: When Your Agent Skill Becomes a Supply Chain Attack

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

Solo.io Extends kagent Runtime to NemoClaw Governance Framework for AI Agents

May 8, 2026

AWS Drives Kubernetes Simplification With EKS Hybrid Nodes Gateway

May 4, 2026

Red Hat Expands OpenShift Application Development Environment

May 14, 2026

Trilio Extends Disaster Recovery Reach to Red Hat OpenShift Virtualization

May 7, 2026

Red Hat Delivers On-Premises Cost Telemetry to Meet Data Sovereignty Demands

May 15, 2026

RECENT POSTS

Shattering the Kubernetes Registry Bottleneck: Scaling Enterprise CI/CD With P2P Mesh Architecture 
Contributed Content Kubernetes Social - Facebook Social - LinkedIn Social - X Topics 

Shattering the Kubernetes Registry Bottleneck: Scaling Enterprise CI/CD With P2P Mesh Architecture 

May 22, 2026 Pavan Madduri 0
Securing the Cloud-Native Edge
Video Interviews 

Securing the Cloud-Native Edge

May 21, 2026 Alan Shimel 0
Black Box Testing APIs in Microservices: Why Your Tests Pass but Your System Still Fails
Container Orchestration Contributed Content DevSecOps Social - Facebook Social - LinkedIn Social - X 

Black Box Testing APIs in Microservices: Why Your Tests Pass but Your System Still Fails

May 20, 2026 Sophie Lane 0
Azure Linux 4.0 Signals Microsoft’s Commitment to Open Source AI Infrastructure
Cloud-Native Platforms Containers Features Kubernetes News Open Source Social - Facebook Social - LinkedIn Social - X 

Azure Linux 4.0 Signals Microsoft’s Commitment to Open Source AI Infrastructure

May 19, 2026 James Maguire 0
Together, Edera and Minimus Claim They Can Protect Your Software From AI Hackers
Cloud-Native Security Containers DevSecOps Features News Social - Facebook Social - LinkedIn Social - X Virtualization 

Together, Edera and Minimus Claim They Can Protect Your Software From AI Hackers

May 18, 2026 Steven Vaughan-Nichols 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×