Wallarm to Sponsor KubeCon + CloudNative Con

If you have not registered yet for the main Kubernetes event in North America which will start on December 10th in Seattle, you may be out of luck.

The event is sold out and is only taking the waitlist applications.

But if you are going, KubeCon + CloudNativeCon promises to be a treat with the content geared for developers, IT professionals, and C-level leaders. The topics will include emerging trends in microservices architectures, cloud deployments and container orchestration with technologies like Kubernetes, Prometheus, Envoy and many more.

With over 6,000 attendees, there should be plenty of discovery and networking opportunities. In addition to end users and technology providers, this vendor-neutral cloud event brings together the industry’s most respected experts and key maintainers behind the most popular projects in the cloud native ecosystem.

The first day of the conference, December 10th, will also include KubeSec Enterprise Summit, a co-located event focused on the challenges faced by larger organizations with demanding security and compliance requirements when deploying Kubernetes in production. The day will provide a unique opportunity to hear from organizations like JMPC, Starbucks and Tinder who have already deployed Kubernetes to support highly secure solutions, as well as a range industry & technology experts who will talk about trends and best practices in securing cloud-native applications.

In Wallarm booth S/A3 you will have the opportunity to view the demo of Wallarm-on-Kubernetes deployment with a secure ingress controller. First introduced at Google Next conference earlier this year, Wallarm solution includes secure NGINX-based ingress controller compatible with most cloud-native deployments and enriched with Prometheus monitoring. Also, on December 12th, we will also be announcing the winners of Wallarm Machine Learning Hackathon; a project stemming from a module for false-positive detection we have recently released into open source.

See you in Seattle!

You can learn more about the conference here and view last year’s keynotes and other videos here.

Recent Posts

Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities.  It features in the…

6 days ago

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

3 weeks ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

3 weeks ago

CISO Spotlight: Craig Riddell on Curiosity, Translation, and Why API Security is the New Business Imperative

It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his…

4 weeks ago

The Myth of “Known APIs”: Why Inventory-First Security Models Are Already Obsolete

You probably think the security mantra “you can’t protect what you don’t know about” is…

4 weeks ago

Why API Security Is No Longer an AppSec Problem – And What Security Leaders Must Do Instead

APIs are one of the most important technologies in digital business ecosystems. And yet, the…

1 month ago