SmartBear announced AI enhancements for API testing, UI test automation, and test management across its product suite, the SmartBear Application Integrity Core™.
Zero Networks announced the Kubernetes Access Matrix, a real time visual map that exposes every allowed and denied rule inside Kubernetes clusters.
The new capability enables security and DevOps teams to see, understand, and control Kubernetes access at scale, closing "understanding what is going on inside K8s” gaps that leave organizations exposed to lateral movement and operational risk.
The Kubernetes Access Matrix transforms complex Kubernetes Network Policies into a single, intuitive matrix view that shows what can talk to what across namespaces, applications, and workloads. By translating policy logic into clear visual outcomes, it creates a shared source of truth for both security and DevOps teams.
The Access Matrix provides a real time understanding of how far an attacker could move once inside a cluster, exposing implicit trust relationships and over-permissive access paths before they are exploited. Instead of relying solely on detection after compromise, teams can proactively reduce blast radius, protect critical services, and maintain uptime even during a security event. This shifts Kubernetes security from reactive response to proactive resilience, aligning operational maturity with the reality of near-instant attack attempts.
Upon onboarding, the Access Matrix automatically discovers existing Kubernetes Network Policies with no manual configuration required. Within minutes, teams can visualize namespace to namespace, application to application, workload to workload, and egress access. Color coded indicators clearly distinguish full access, partial access, explicit deny, and areas with no defined policy. Users can drill into any connection to view the exact policies, labels, workloads, and ports governing that flow.
More than a visualization tool, the Kubernetes Access Matrix becomes the foundation for enforceable guardrails across clusters. Security teams can define boundaries and validate them directly in the matrix, while DevOps teams maintain flexibility within approved limits. Policy changes can be validated before deployment, preventing risky access paths from reaching production.
The Kubernetes Access Matrix is available immediately as part of the Zero Networks platform.
Industry News
JFrog announced its partnership with iZeno Pte Ltd, a Singapore-headquartered enterprise technology solutions provider.
Red Hat announced an expanded collaboration with Google Cloud to help organizations accelerate application modernization and cloud migrations.
The Linux Foundation, the nonprofit organization enabling mass innovation through open source, announced the contribution of SQLMesh, an open source data transformation framework, to the Foundation by Fivetran.
Check Point® Software Technologies Ltd. released the AI Factory Security Architecture Blueprint — a comprehensive, vendor-tested reference architecture for securing private AI infrastructure from the hardware layer to the application layer.
CMD+CTRL Security won the following awards from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine: Most Innovative Cybersecurity Training and Pioneering Secure Coding: Developer Upskilling.
Check Point® Software Technologies Ltd. announced the Check Point AI Defense Plane, a unified AI security control plane designed to help enterprises govern how AI is connected, deployed, and operated across the business.
Oracle announced the latest updates to Oracle AI Agent Studio for Fusion Applications, a complete development platform for building, connecting, and running AI automation and agentic applications.
The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, announced that Istio has launched a host of new features designed to meet the rising needs of modern, AI-driven infrastructure while reducing operational complexity.
Chainguard announced Chainguard Repository, a single Chainguard-managed experience for pulling secure-by-default open source containers, dependencies, OS packages, virtual machine images, CI/CD workflows, and agent skills that have built-in, intelligent policies to enforce enterprise security standards.
Backslash Security announced new cross-product support for agentic AI Skills within its platform, enabling organizations to discover, assess, and apply security guardrails to Skills used across AI-native software development environments.
The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, announced the graduation of Kyverno, a Kubernetes-native policy engine that enables organizations to define, manage and enforce policy-as-code across cloud native environments.
Zero Networks announced the Kubernetes Access Matrix, a real time visual map that exposes every allowed and denied rule inside Kubernetes clusters.
Apiiro announced AI Threat Modeling, a new capability within Apiiro Guardian Agent that automatically generates architecture-aware threat models to identify security and compliance risks before code exists.
GitLab released GitLab 18.10, making it easier and more affordable to use agentic AI capabilities across the entire software development lifecycle.




