drj logo

"*" indicates required fields

Name*
Region*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!
This field is for validation purposes and should be left unchanged.

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
DRJ Fall 2025 Dallas Show
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Fall 2025
    • DRJ Spring 2025
    • DRJ Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • DRJ ACADEMY
    • DRJ Academy
    • Beginner’s Guide to BC
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • DEI
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

2025 Predictions: Tigera

by Jon Seals | December 5, 2024 | | 0 comments

Ratan Tipirneni, President and CEO, Tigera

Prediction #1: Organizations will increasingly create GenAI applications with Kubernetes, creating the need for more robust Kubernetes security.  

To derive the most value from GenAI applications, enterprises will utilize proprietary data to create these models. Using a Retrieval-Augmented Generation (RAG) architecture, organizations can customize models based on company data, so that GenAI applications are personalized to an enterprise and their specific use cases. 

Most GenAI applications will contain confidential company data as a result of this approach, leading to security considerations. To address concerns around data security, privacy, and integrity, some organizations will opt to deploy GenAI applications in their data center, an existing hub for sensitive enterprise data. Most organizations, however, want the flexibility to deploy GenAI applications across both cloud environments and on-premises in their data center. 

With flexibility at the forefront, Kubernetes is quickly becoming the de facto platform in which GenAI applications are being deployed. Organizations can run Kubernetes for GenAI across various workloads including virtual machines (VMs), containers, or bare metal servers – or a mixture of all three. Against this backdrop, in 2025, there will be a heightened focus on Kubernetes security. 

To achieve comprehensive security for GenAI applications being deployed on Kubernetes, organizations should prioritize:

1. Implementing Network Security Access Controls 

    Network security is a critical aspect of any Kubernetes deployment, ensuring that data transmitted within clusters is protected against unauthorized access, interception, or modification. Microsegmentation in particular is crucial to enhancing network security within Kubernetes environments. This technique divides networks into smaller, isolated segments, allowing for granular control over traffic flow and significantly bolsters security posture. 

    2. Proactively Managing Vulnerabilities

    Organizations must implement continuous monitoring, image scanning and policy enforcement processes to detect vulnerabilities, malware, and unsafe configurations across all Kubernetes clusters. By implementing vulnerability management practices, organizations can proactively identify and address vulnerabilities within container images before they are deployed into production. 

    3. Protecting Against Known and Unknown Threats

    Runtime security is another crucial element to securing Kubernetes, protecting against known and zero-day attacks, whether they are network or container-based. This is crucial for GenAI applications as any breach could pose an existential threat to an organization given how much proprietary and sensitive company data resides within such applications. 

    4. Preventing & Addressing Misconfigurations

    In the context of GenAI, misconfigurations can leave an organization’s private information dangerously exposed, hence the need for careful management and monitoring. This process involves continuously monitoring images, workloads, and Kubernetes infrastructure configuration against common configuration security standards and referencing CIS benchmarks when configuring Kubernetes. 

    5. Maintaining Observability

    Organizations must maintain a real-time view of traffic flows within and outside Kubernetes clusters to understand workload communications and connections, service dependencies, and policy enforcement. This will enable organizations to proactively identify and resolve security gaps and policy violations.

    2025 will be the year that many organizations officially deploy GenAI applications across their infrastructure. With Kubernetes set to serve as the core platform for deploying and running these applications, there is a critical need for organizations to step up their security in this domain.

    Prediction #2: Open Source LLM vs. Subscription-Based: Who Will Win in 2025? 

    Meta changed the rules of the Large Language Model (LLM) game by open sourcing their model, Llama. Now, Meta is on track to have the most widely deployed chatbot in the world by the end of the calendar year 2024, despite OpenAI’s initial leadership with ChatGPT.

    As the GenAI race heats up and more native artificial intelligence Independent Software Vendors (ISVs) emerge, open source models will continue experiencing exponential growth. ISVs will adopt an open source model like Llama instead of building on top of a model with a licensing fee involved. Ecosystems will form around open source LLMs, and they will gain critical mass. 

    Prediction #3: Big Tech Bets on GenAI – Will the Risk be Worth the Reward?

    Recent earnings reports from major players like Meta, Google, Amazon, and Microsoft revealed a spike in quarterly capital expenses–capital being invested in land, data centers, networking, and GPU. The payback from the capital is not clear, but the reports indicate that the payback time could take up to 15 years. 

    This is a staggering amount of capital and an extraordinarily risky bet. What’s more, this investment is not coming from the venture capital community; it’s a Balance Sheet item for these companies, and the cash is coming from their reserves. 

    Why is Big Tech making such risky investments? Simple: because they cannot afford not to. 

    If they don’t make the investment, they will be shut out of the race. We are witnessing a market transition: If you look at the last 30 to 40 years in the tech industry, we have never seen capital investments at this scale. GenAI is going to become the next platform and to play in that, companies must make these kinds of capital investments or risk becoming irrelevant. 

    Related Content

    1. Corporate Security Predictions and Trends 2021
    2. fully homomorphic encryption in 2025
      2025 Forecast: A Perfect Storm for Privacy Technology
    3. Disaster Recovery Journal
      2025 Cybersecurity Predictions: Roundup from Cyber Experts

    Recent Posts

    Virtana Unveils the First Full-Stack AI Factory Observability Platform

    May 20, 2025

    Aligned Data Centers Earns Great Place To Work Certification

    May 20, 2025

    Alluxio Enterprise AI 3.6 Accelerates Model Distribution, Optimizes Model Training Checkpoint Writing, and Enhanced Multi-Tenancy Support

    May 20, 2025

    Next-Gen Laptop Audio: Cirrus Logic and Compal Unleash AI Innovation

    May 20, 2025

    STACK Infrastructure and Blue Owl Capital Host Fourth Annual Women Leadership Summit

    May 20, 2025

    Chemours and DataVolt Announce Agreement to Accelerate Adoption of Liquid Cooling Solutions & Support Broader Innovation for Future-Ready AI Data Centers

    May 20, 2025

    Archives

  1. May 2025 (47)
  2. April 2025 (91)
  3. March 2025 (57)
  4. February 2025 (47)
  5. January 2025 (73)
  6. December 2024 (82)
  7. November 2024 (41)
  8. October 2024 (87)
  9. September 2024 (61)
  10. August 2024 (65)
  11. July 2024 (48)
  12. June 2024 (55)
  13. May 2024 (70)
  14. April 2024 (79)
  15. March 2024 (65)
  16. February 2024 (73)
  17. January 2024 (66)
  18. December 2023 (49)
  19. November 2023 (80)
  20. October 2023 (67)
  21. September 2023 (53)
  22. August 2023 (72)
  23. July 2023 (45)
  24. June 2023 (61)
  25. May 2023 (50)
  26. April 2023 (60)
  27. March 2023 (69)
  28. February 2023 (54)
  29. January 2023 (71)
  30. December 2022 (54)
  31. November 2022 (59)
  32. October 2022 (66)
  33. September 2022 (72)
  34. August 2022 (65)
  35. July 2022 (66)
  36. June 2022 (53)
  37. May 2022 (55)
  38. April 2022 (60)
  39. March 2022 (65)
  40. February 2022 (50)
  41. January 2022 (46)
  42. December 2021 (39)
  43. November 2021 (38)
  44. October 2021 (39)
  45. September 2021 (50)
  46. August 2021 (77)
  47. July 2021 (63)
  48. June 2021 (42)
  49. May 2021 (43)
  50. April 2021 (50)
  51. March 2021 (60)
  52. February 2021 (16)
  53. January 2021 (554)
  54. December 2020 (30)
  55. November 2020 (35)
  56. October 2020 (48)
  57. September 2020 (57)
  58. August 2020 (52)
  59. July 2020 (40)
  60. June 2020 (72)
  61. May 2020 (46)
  62. April 2020 (59)
  63. March 2020 (46)
  64. February 2020 (28)
  65. January 2020 (36)
  66. December 2019 (22)
  67. November 2019 (11)
  68. October 2019 (36)
  69. September 2019 (44)
  70. August 2019 (77)
  71. July 2019 (117)
  72. June 2019 (106)
  73. May 2019 (49)
  74. April 2019 (47)
  75. March 2019 (24)
  76. February 2019 (37)
  77. January 2019 (12)
  78. ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2025
    • Spring 2025

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal is the industry’s largest resource for business continuity, disaster recovery, crisis management, and risk management, reaching a global network of more than 138,000 professionals. Offering weekly webinars, the latest industry news, rules and regulations, podcasts, the industry’s only official mentoring program, a quarterly magazine, and two annual live conferences, DRJ is leading the way to keep professionals up-to-date and connected in an ever-changing world.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2025 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy