Available Messages
The following is a list of recent messages for thenewstack. Select one to see the content. Messages are removed frequently. Check early. Check often.
Selected Message
To: [email protected]
Date: Fri, 24 Oct 2025 22:04:19 GMT
Subject: TNS Daily | October 24
- Plain Text
- HTML Content
- HTML Source
Plain Text
MIT's NANDA Creates Open Architecture for AI Agents
October 24, 2025
MIT's NANDA Creates Open Architecture for AI Agents
MIT Media Lab’s Project NANDA is challenging commercial control over the agent ecosystem. The project’s goal is to build a decentralized “Internet of AI Agents” with a focus on open and verifiable infrastructure. TNS Senior Editor Richard MacManus explains the architecture is built on protocols like MCP and A2A through four layers—including the global “Index” and the federated “Registry Quilt (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXhW3gP0xW7Y8-PT6lZ3lQW4dznD33Lk48hW6lfyHZ2PFKJ4W3frWh03lFf1hW7YyD3K2bRy1xW3dt2Hh1mNKPbV7BKr56F8BnmW45NSGn8724HtVTDQdK7-kzF3W1wQT6h5vPd_CDcxq80LmzlW4MVnvz16g6_cW10rdvT4p3NMbW33BHfH6ZSMX9W11hyVM5_lgtfW2WMZdJ6t68PYW6trsSD6Twqr8W1GnMsp7J4pdmW1yz0rw6bKJD5N7lvHCTBn9DSW8thVss8hnyHbW60gJw74XJh8tW5PN6h633DWdCW3VY5Jp8Z6VmPVsnqy55b8qJ0W6H6G5g1hrRX2W4b-P672Sywpkf292xjW04 ) .”
In other technology topics we’re covering today:
- Security firm Edera discovered a critical logic vulnerability, dubbed TARmageddon (CVE-2025-62518), in the tokio-tar library that allows attackers to “smuggle” malicious files into nested TAR archives, posing a risk to applications like Python’s uv package manager. Technology journalist Steven J. Vaughan-Nichols writes that the flaw shows even Rust’s memory-safety guarantees do not prevent logic bugs (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXhW3gP0xW7Y8-PT6lZ3mlW4g3F9Q5CSBKZW2H9zTl7cF0CzW1vW-rQ67THhLN5lNrsStg5ymW8GFjHr6W0wQzN6J7d2kTdj1WW1q_g9c51P75XW4L8lTs2fJYncW4MGZdJ65Yn9FW8ks98T3xM59LW3XN68S5gCYQTW74_1tk2r8KvkW5FvFwr7rn1VNVMk2Mg29c5cWN5JtxKr98mVcV-Q8704yKQFSW5yKzdh76X92CW57sKt_7BTD1QW4p-rSP6KrgtWW2F4P1-3Jlhb4W4_SSf15qnDXKW7Y03m86PHFt0W37v3vC1RM8M4W8h6Wb836P4kkVv_2fQ7HhMqVN9h4WPKTRx5rf4ZGFC004 ) .
- Crystal Morin, a senior cybersecurity strategist at Sysdig, writes that her motto with vibe coding is “Use the tool; trust the human.” In this contributed article, Morin writes that vibe coding introduces significant security risks because AI-generated code often lacks proper structure, authentication and adherence to security policies. She outlines how developers can apply the STRIDE threat model early and use the OWASP Top 10 for LLM Applications as a checklist to guide human review (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXhW3gP0xW7Y8-PT6lZ3pyVz4WSv6YD6fNVg70fZ6pd8jlW6ydJpB63sfnvN5_44ZtQ_XP8W1wDXGd1gDQksW8nslFn3bz4pGVK0B0286qmywN2NRTDnbM3LWVzfJZj77bFlbW4vRZxb7fTYp_W49xrJ_21lq1LM_J33plwDjWW5phKpg5NqVYmW3KrgRs1_X5LXW5tHk1y4DTkglW5x4Bh132msHGW1d2D-H5Pd6zHW2Yx8d63ssJMbW2qQNmQ8_wsd7W3q_BDV7Gdf1yW1BQ11V1KHcwZW1yTNXN8cDhp7W2qVpkr1K8kkZW6mxdDQ3CbxrmW3KLtvL5qk-8FVg0Zxk1P9cJZf6RnfxH04 ) .
TOP OF THE STACK
2 Fixes Vastly Cut TiKV Write Stalls From SST File Ingestion
Featued image for: 2 Fixes Vastly Cut TiKV Write Stalls From SST File Ingestion (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjv3prCCW95jsWP6lZ3kDW6hpnCH8zMPP4W4K4mp62W1dmMW5sxf901hDKc4W6xQbgp2SftqcW9bR5yk1HK5lVW6NYS5q7B8fWmW2DygJR58F9J6W70RDM15N-2q3W6Gd-pV84Yr2dMTqXqBSH7-hW939jKw7B5VgrN3gF3jqJMP5gW4b_yrb1l2mTtW8Pmh0C4nw2TkW4dFN4f4Z_9-TW7x2q515yQNTVW6YV2QG3v_dJ4N8XfF2Kyx3kBVzRpTf1P0rC7W5NRRdl6DSS-NW2FwC3w8q2RVbW5C41Tj4vGkFHW8PcMnS6h4BV5W6C8BX57Sn-YFW7BP-vF2jWCH3W27m3Xk8M6zYlW55M6Pz5mtdFGW73sQ753hf3HDW3nGNZr4vYWCJW5Jbck_5ncrGJf1Gks6-04 )
Sudden write stalls were causing unpredictable performance in TiKV. Learn how we boosted performance and predictability under load.
TiKV is an open source, distributed and transactional key-value database. Growing applications demand consistent performance, and unexpected write latency spikes, especially during Sorted String Table (SST) file ingestion, were hurting predictability in TiKV. Yet we found...
READ MORE
From Friction to Flow: Shifting How Developers Leverage Observability
In this live webinar (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjv3gP0xW95jsWP6lZ3mWW96wRKN6frBPxW3Q1LVD2ZSM2_W1l0R1s5zT1fcW7TzSFF7n7fSpW7-kPK32YMmLtN9g5-5X5JQHbW6pSQ7w17gCbxW4T55g16fRhfzW8fcfxQ7ZmxKxW8rcBrn7T1f07VVFXly95dYbhW51VzHP6G5PVVW3t4-q86Yng30VK-Y797kxmp2W6C236b6R46DQW6yJ98N8X77mqW7w5V4p2nbxkqW86jV9Y4hv0y8W4LTgwq4v40GgW3NPHDr24dSHHVX2QFd8bB97kW2SmwCy3PnGwcW3WVFLx5XCPg2W8fpfzw87GLZJW3HlMHL6ZfGb4W2jq8jD1PZMKxW20dqYd2XJsg8W46R2hH5Gb3NjW17_Cml11L9zqW4q3q_f2gq3tFf7qpBPj04 ) , Dynatrace will join The New Stack to explore how AI-powered observability transforms the developer experience from friction-filled to flow-driven. You’ll walk away with practical insights to simplify workflows, accelerate innovation, and unlock developer productivity.
REGISTER FOR THE WEBINAR
WHAT ELSE IS NEW?
Featued image for: How TARmageddon Compromises Rust Security: A Developer’s Guide (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjv3prCCW95jsWP6lZ3lQW8YWPSp3K-MffW4crXyC9kWzK_W3VJklw3H9QxVW4nXpYf9286-7N25_Bslk1s6FW2NflS5276GXRW3177zm1R5pYgW2VcFKC2NXzLGW1cg11T50wbbnVY40Pf20rn6zW2fwPbm6wmd4mW8qPH2_6Yks1dW4zG1kb4FBY5dW296vVT488GWjW7M69Cy79Mtk6VcTvJT6MgfVQW1lcqLd1BD766VFB7Zg446cCQW59Q2SQ6MTd10W1FbV783f5HpBW8VyVpz7zhFd_W8Wb9HK4fd_4GW3ry-sb7ydPyMW8fZ74d7hWcGJW3QQWsD1VhF1zW3hHS281JwpyXW7yQ-hy1KCVYjW1Z9W884P6VQPW4f199-16L9ynW87GkVm3Dy69Cf12H76C04 )
How TARmageddon Compromises Rust Security: A Developer's Guide (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjv3prCCW95jsWP6lZ3lQW8YWPSp3K-MffW4crXyC9kWzK_W3VJklw3H9QxVW4nXpYf9286-7N25_Bslk1s6FW2NflS5276GXRW3177zm1R5pYgW2VcFKC2NXzLGW1cg11T50wbbnVY40Pf20rn6zW2fwPbm6wmd4mW8qPH2_6Yks1dW4zG1kb4FBY5dW296vVT488GWjW7M69Cy79Mtk6VcTvJT6MgfVQW1lcqLd1BD766VFB7Zg446cCQW59Q2SQ6MTd10W1FbV783f5HpBW8VyVpz7zhFd_W8Wb9HK4fd_4GW3ry-sb7ydPyMW8fZ74d7hWcGJW3QQWsD1VhF1zW3hHS281JwpyXW7yQ-hy1KCVYjW1Z9W884P6VQPW4f199-16L9ynW87GkVm3Dy69Cf12H76C04 )
Featued image for: How To Build Resilient IT Operations in 4 Steps (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjb3prCCW8wLKSR6lZ3pxW3d1bG81-F2kmW7Z31_C2q8x3lVlmzc65kRjnjW9f3kp58-LfTLW2PvB_k6B8Gf4MSDJ3mQHQZpW1K6Q366By4sWW9344w68KLcDQVQ9-rS6QCp80W2HZYy21ycq6HW8GzLqr8QpkfVW7ZfR0j7H7WjKW7_FL3c3bbm-PW2qJJSv2G2RwWW3D7CnB19B-W9V2mNtN2XTmCKW3WZJhQ13Vp8GW2bX8NQ52_zY7W4p60dj4MCF90W8rn7DD8bkyY7W2dHZB04G10qCW3znssg3bh2XxW3PbMh-9h3FZcW6M0LYn61H5ZvW4ccpRl2hJ8WnW6821B43QhhMDVwLKVJ5bZnLCW63MkbZ6n3X7vf7yHT5P04 )
Featued image for: How MIT’s Project NANDA Aims To Decentralize AI Agents (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjb3prCCW8wLKSR6lZ3q1W2HqJVH87KYjgW4mntd452W6w3W8mrS0X7jSc7bW2PB30C2Cf1LxW916mfG5qF360Vhydm34l8CvvVsn-3G3Y1WffW5ynK7697yM6XW1hHX1w21ntd4N2YnQwWNnmcXV_2J8l14Lnf-W7VKXy-6vVlWZW1gjr2m2CM2wzW4tWYZ26Ts5gZW3mhwHx4HvBZ0W4M-37w6Mw7SGN62VLPpLV2t6N8jSJ83-zmF1N1fvDllZ6fsHW5-KDxb5NfzV3W9fj0Hb1qzh_VW4fjdG66gKxSQW3F82QR8g51nCW3MKv651NsbjfW6QfGXn2JWd-GW6_1Rdk21Yg4lW4HZkbr962zR_W2JFzNn9cbnbFf85K8JY04 )
How MIT’s Project NANDA Aims To Decentralize AI Agents (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjb3prCCW8wLKSR6lZ3q1W2HqJVH87KYjgW4mntd452W6w3W8mrS0X7jSc7bW2PB30C2Cf1LxW916mfG5qF360Vhydm34l8CvvVsn-3G3Y1WffW5ynK7697yM6XW1hHX1w21ntd4N2YnQwWNnmcXV_2J8l14Lnf-W7VKXy-6vVlWZW1gjr2m2CM2wzW4tWYZ26Ts5gZW3mhwHx4HvBZ0W4M-37w6Mw7SGN62VLPpLV2t6N8jSJ83-zmF1N1fvDllZ6fsHW5-KDxb5NfzV3W9fj0Hb1qzh_VW4fjdG66gKxSQW3F82QR8g51nCW3MKv651NsbjfW6QfGXn2JWd-GW6_1Rdk21Yg4lW4HZkbr962zR_W2JFzNn9cbnbFf85K8JY04 )
Featued image for: Beyond Basic Scaling: Advanced Kubernetes Resource Strategies (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjv3prCCW95jsWP6lZ3phW1kJ3sD2g371lW46hRDq81RKG_W5QyN_g1b23zmW57Kbz_2VGK1_N8tzgpj-s_NGN1bfl0ztjTm7W4DbjwL2_sV0SVF8bM-3V4L_2W2Jxcdp15-2J-W6b1-Hs894CtVN2JMV411_nXQML6xNG7hmwmW6301vl7ns_TpN75d-Wz405w7W3sJ1v64MqGtJW50Mw9v8nhq7rW5w4rQ-6Tvv-BW573hGX3WzHGwW3YPPfs6ty16YW3LDNrY7GlBJGW353Hpz1VfRlqW5tsGQQ4S1_J5W8znzqK7DCYvSW5dX0FW7Q2Q4zW6Zn9sB5SvzM7W3Q7NwN3twR42W1yPKNh32Rnm4W5CsfM22_tztqW6W1y778KD2FqVgWxYl5xKNCdf5rbYhg04 )
Beyond Basic Scaling: Advanced Kubernetes Resource Strategies (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjv3prCCW95jsWP6lZ3phW1kJ3sD2g371lW46hRDq81RKG_W5QyN_g1b23zmW57Kbz_2VGK1_N8tzgpj-s_NGN1bfl0ztjTm7W4DbjwL2_sV0SVF8bM-3V4L_2W2Jxcdp15-2J-W6b1-Hs894CtVN2JMV411_nXQML6xNG7hmwmW6301vl7ns_TpN75d-Wz405w7W3sJ1v64MqGtJW50Mw9v8nhq7rW5w4rQ-6Tvv-BW573hGX3WzHGwW3YPPfs6ty16YW3LDNrY7GlBJGW353Hpz1VfRlqW5tsGQQ4S1_J5W8znzqK7DCYvSW5dX0FW7Q2Q4zW6Zn9sB5SvzM7W3Q7NwN3twR42W1yPKNh32Rnm4W5CsfM22_tztqW6W1y778KD2FqVgWxYl5xKNCdf5rbYhg04 )
Featued image for: Multipass: Fast, Scriptable Ubuntu VMs for Modern DevOps (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjb3prCCW8wLKSR6lZ3nCW15NDnm3cGsdpN4sz42fjYV4gW26V4WH4JBwVbW28M-k-3PQ9L9W3x5hck80Rh8BW8wRdQT7byLvbW1d0s544rNQyBW11HHV41bxZsvW6JRwDk7JX5r2W3NB1qd5zbtdYV2DlV7199mfFW55rw5R6jDlgbVTB1XW1rVD3ZW35s4Yv7sp9LTW2ZnnSK35tfg4W2PS8TH7RvBpVW28VNHx9j_LSrW1lYfjS3cC7twW5W9L1Z4ht1FYW41yVw33D28N-W6zp4lZ7PmNLlW51Mxbj1nftV2W1j2YND4ds01wW238YXV39P09sW63smJK2mkWhsW2yX2vQ7mQ9JbW5VcFkL1lxzp3W78dHB062w7vyf3vZnBz04 )
Multipass: Fast, Scriptable Ubuntu VMs for Modern DevOps (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjb3prCCW8wLKSR6lZ3nCW15NDnm3cGsdpN4sz42fjYV4gW26V4WH4JBwVbW28M-k-3PQ9L9W3x5hck80Rh8BW8wRdQT7byLvbW1d0s544rNQyBW11HHV41bxZsvW6JRwDk7JX5r2W3NB1qd5zbtdYV2DlV7199mfFW55rw5R6jDlgbVTB1XW1rVD3ZW35s4Yv7sp9LTW2ZnnSK35tfg4W2PS8TH7RvBpVW28VNHx9j_LSrW1lYfjS3cC7twW5W9L1Z4ht1FYW41yVw33D28N-W6zp4lZ7PmNLlW51Mxbj1nftV2W1j2YND4ds01wW238YXV39P09sW63smJK2mkWhsW2yX2vQ7mQ9JbW5VcFkL1lxzp3W78dHB062w7vyf3vZnBz04 )
Featued image for: When To Use Synthetic Monitoring vs. Real User Monitoring (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjb3prCCW8wLKSR6lZ3pfW1gRWQR18KpfhW5chJkm7xRb9fW4yBGHY10H5QWW82H1Qd18wLHGW3HQVGR4bSKmpW5WTrbf26D8GZW3cRqLD8ml5LLVCW_z217D7RGW41hdw25sgkTqW7JdTmk1W2H9TW5x06Y_2gGZJKW2pbgLp5H4JwyW2PR-wk8kflspW1ZCh574Vsg-wW3LYHf45T0qsMW5nQPTR5YcJrDW8qPzhv59dMF6W8ktBRT8bKmkjW3lXMmf1L947FW5MY1Wg3QB3RGW1WHtN91dwQZXW8n_ndV7l09N_W7wFPsH1HWy5cW3tgqgD4RFBm-W6R-2_J9jr16zW72Kfq096GhlqW5lmK-w5rh_42W5tpGdk9lVGxWdXzsf204 )
When To Use Synthetic Monitoring vs. Real User Monitoring (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjb3prCCW8wLKSR6lZ3pfW1gRWQR18KpfhW5chJkm7xRb9fW4yBGHY10H5QWW82H1Qd18wLHGW3HQVGR4bSKmpW5WTrbf26D8GZW3cRqLD8ml5LLVCW_z217D7RGW41hdw25sgkTqW7JdTmk1W2H9TW5x06Y_2gGZJKW2pbgLp5H4JwyW2PR-wk8kflspW1ZCh574Vsg-wW3LYHf45T0qsMW5nQPTR5YcJrDW8qPzhv59dMF6W8ktBRT8bKmkjW3lXMmf1L947FW5MY1Wg3QB3RGW1WHtN91dwQZXW8n_ndV7l09N_W7wFPsH1HWy5cW3tgqgD4RFBm-W6R-2_J9jr16zW72Kfq096GhlqW5lmK-w5rh_42W5tpGdk9lVGxWdXzsf204 )
Featued image for: Securing the Vibe: Reducing the Risk of AI-Generated Code (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjb3prCCW8wLKSR6lZ3lsW3NTv_x85tC4fW8R_tZ16PxfypW4tWwtN48ymSmW3JFcns1r1fH7W7Z6t0g79Q0mqN3144WT9LVSRW5knb5x5rXjRdW6V-D5b24jSVZW2xfZDn5-k2gTW5wmQdN4GxFjxW6ZlHGy8JNRCGW1lKSDc88zQvjW2MM06H8VztgNW33NwrY2wHXPPVzSyMv7f7sKtW6rpD5R1w6SzRW5885cf8PZHsJN5nMw6k7YQX5W32kS8H1QVnLSW6m4KRw2H1P0rW5-Bz2X1t76GdW1DFC2-821G2qW6TVlvp6_nsNnN3lqvSbMXdkmW96xkhl4KrZ1YVh0Smq4CrBY2W8S_0hc2bb0YBTjX_s8J924sf6Y045204 )
Securing the Vibe: Reducing the Risk of AI-Generated Code (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjb3prCCW8wLKSR6lZ3lsW3NTv_x85tC4fW8R_tZ16PxfypW4tWwtN48ymSmW3JFcns1r1fH7W7Z6t0g79Q0mqN3144WT9LVSRW5knb5x5rXjRdW6V-D5b24jSVZW2xfZDn5-k2gTW5wmQdN4GxFjxW6ZlHGy8JNRCGW1lKSDc88zQvjW2MM06H8VztgNW33NwrY2wHXPPVzSyMv7f7sKtW6rpD5R1w6SzRW5885cf8PZHsJN5nMw6k7YQX5W32kS8H1QVnLSW6m4KRw2H1P0rW5-Bz2X1t76GdW1DFC2-821G2qW6TVlvp6_nsNnN3lqvSbMXdkmW96xkhl4KrZ1YVh0Smq4CrBY2W8S_0hc2bb0YBTjX_s8J924sf6Y045204 )
Featued image for: Unblock DevEx by Getting Observability Tools Out of Their Way (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjv3prCCW95jsWP6lZ3pbW1XqPkF4dXM39W8jlVpb6tNchxW1R_g6821_bDqW82gLC277bd0MN2gXpNVCN2xKW8ZT8jY5yG6vqW3XZlZl6mslMmW4xRVRp57hcFXW46Y_113CWTLgW4MZcR429Vn0RW8LBtHG7c-qpJW3wFv6m6P1D-PW5HGTM_7XYvsKW12ShSX22SqTdW6DM1692MTsgSV9X3sQ6D691SW5Pr7hr5wf8LvN1Sb7dzxbCP6W6DK9D55bt9rsW307Plg1lbFxQW791-v69jqSphW1FYjQ63b9jhVW333zbt8ZD7GJW7xytp81vS2kBW4mY7Bb3N425KW8bBs4-7ndl8MW8BXnkz2jxbnWW2FS8gz2YXGWsVPtvk43HPZrnW2hBvDm44pH15f1DYYFR04 )
Unblock DevEx by Getting Observability Tools Out of Their Way (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjv3prCCW95jsWP6lZ3pbW1XqPkF4dXM39W8jlVpb6tNchxW1R_g6821_bDqW82gLC277bd0MN2gXpNVCN2xKW8ZT8jY5yG6vqW3XZlZl6mslMmW4xRVRp57hcFXW46Y_113CWTLgW4MZcR429Vn0RW8LBtHG7c-qpJW3wFv6m6P1D-PW5HGTM_7XYvsKW12ShSX22SqTdW6DM1692MTsgSV9X3sQ6D691SW5Pr7hr5wf8LvN1Sb7dzxbCP6W6DK9D55bt9rsW307Plg1lbFxQW791-v69jqSphW1FYjQ63b9jhVW333zbt8ZD7GJW7xytp81vS2kBW4mY7Bb3N425KW8bBs4-7ndl8MW8BXnkz2jxbnWW2FS8gz2YXGWsVPtvk43HPZrnW2hBvDm44pH15f1DYYFR04 )
Featued image for: Why Kubernetes Security Is Critical for GenAI Integrity (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjb3prCCW8wLKSR6lZ3nNW2rVJ6S825kQvW83SPfs4D1RTFW1jDnSm5vqKm6W7g2vPY3tKsMCW7KhSCv2CtYScW5jMBCt5ZZV0CW8YrlcL1SSMKHW3581Z-1Bhf9QW5V5Pbt5K7PG4W1skQhp9cJ8D9VjFnRR17-z52W50tH0J6CZN1HW4wCVx43jpgv5W3VX9CN4bql8WW11VJQq8pcJ6QW5qNWpH8NZ3F9W6wqgbw1RMy18W5s726S29zRd9W3N8xNm8m7NX-MkB_qs-RRS9W3qX-T27_0xKcW3N3FFM15XXzzN87hgFxhxyxBW77s2Ft3fp5MzW2pRwQQ41x0GFW8q__Fk80266MW4GSFdp3Hw_yJW2kyx4h2H6b2Xf4nWg6404 )
Why Kubernetes Security Is Critical for GenAI Integrity (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjb3prCCW8wLKSR6lZ3nNW2rVJ6S825kQvW83SPfs4D1RTFW1jDnSm5vqKm6W7g2vPY3tKsMCW7KhSCv2CtYScW5jMBCt5ZZV0CW8YrlcL1SSMKHW3581Z-1Bhf9QW5V5Pbt5K7PG4W1skQhp9cJ8D9VjFnRR17-z52W50tH0J6CZN1HW4wCVx43jpgv5W3VX9CN4bql8WW11VJQq8pcJ6QW5qNWpH8NZ3F9W6wqgbw1RMy18W5s726S29zRd9W3N8xNm8m7NX-MkB_qs-RRS9W3qX-T27_0xKcW3N3FFM15XXzzN87hgFxhxyxBW77s2Ft3fp5MzW2pRwQQ41x0GFW8q__Fk80266MW4GSFdp3Hw_yJW2kyx4h2H6b2Xf4nWg6404 )
Featued image for: AI Agents Will Eat Enterprise Software, Just Not in One Bite (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjv3prCCW95jsWP6lZ3nSVWxW-W7YKjZ8W6SdDyw6LcXGXN454Z3kgFlRTW8-xvGT7SrYvlV52Jxb8DRNkcW7JNCdx8hYLxqW83C8Lc2f4sWFVkFpFc2-_fZCW5sP9w46T6gXdW3YPkTK5_b4l9W4zKdd_1BhfS6W3bsQ0w62XgS9W8v2nw54mRhC6W4RGzbv6LDtw9V5p_MQ6CpQT1W82kPzx33VrcjMzBjgcg2fSNW533B5k2_NFLKW3v-Qqd2bWkNhW2m_5jX2f0qPSW2ltt9l94KyHwW5x05DY4mGMfSW2fbMpQ4tDdjxW9kwM2B51H_TSW2NncWl9jP1Z-W2CCHV673XjFJW6K0MJf1N9Nk2W7cJT2Q7tm_R5Vms5yh2_NTsCW7dZvh26J-qm1f4m6S0R04 )
AI Agents Will Eat Enterprise Software, Just Not in One Bite (https://info.thenewstack.io/e3t/Ctc/L2+113/d5qLSh04/VW7wX196chdqW12GgTc20l7mRW7Kkhd55F2dxQN56dXjv3prCCW95jsWP6lZ3nSVWxW-W7YKjZ8W6SdDyw6LcXGXN454Z3kgFlRTW8-xvGT7SrYvlV52Jxb8DRNkcW7JNCdx8hYLxqW83C8Lc2f4sWFVkFpFc2-_fZCW5sP9w46T6gXdW3YPkTK5_b4l9W4zKdd_1BhfS6W3bsQ0w62XgS9W8v2nw54mRhC6W4RGzbv6LDtw9V5p_MQ6CpQT1W82kPzx33VrcjMzBjgcg2fSNW533B5k2_NFLKW3v-Qqd2bWkNhW2m_5jX2f0qPSW2ltt9l94KyHwW5x05DY4mGMfSW2fbMpQ4tDdjxW9kwM2B51H_TSW2NncWl9jP1Z-W2CCHV673XjFJW6K0MJf1N9Nk2W7cJT2Q7tm_R5Vms5yh2_NTsCW7dZvh26J-qm1f4m6S0R04 )
The Infrastructure That Powers AI Could Also Break It
If we secure the infrastructure powering AI with the same discipline we apply to cloud, we can stay ahead of risk while keeping innovation moving fast.
READ MORE
FLOW STATE
Author Spotlight: Darryl Taft
In this article, Darryl breaks down the Feds' stance on C/C++: using memory-unsafe languages in new critical infrastructure software is now labeled a dangerous "bad practice."
Kubernetes: From a Federation of Bazaars to the AI Frontier
The platform we built together is more than just code. It is a robust, open and evolving foundation for the next generation of intelligent applications.
TNS Agents: MCP Security Risks Multiply With Each New Agent Connection
In this episode of The New Stack Agents, we talked to Tzvika Shneider, the CEO and co-founder of Pynt.
How did we do today?
Join TNS on Your Favorite Platform
The New Stack is a media platform for the people who build and manage software the world relies on.
Become a TNS Sponsor
© 2025 the New Stack. All rights reserved.
You’re receiving this email because you signed-up at thenewstack.io.
Mailing Address:
The New Stack
1111 6th Ave Ste 550
PMB 50938
San Diego,
CA
92101-5211
HTML Content
HTML Source
Warning
Almost all the messages that arrive here are garbage! Resist the urge to click on any unexpected or questionable links.
It may happen that e-mail will claim to come from liamon.com, especially from some administrative role or process. These are certainly garbage. There are no accounts to expire. There are no passwords to leak. There aren't administrators sending messages to liamon.com addresses. These are certainly phishing attempts.
Absolutely ignore those links!
