Filter & Sort
  1. 7 Reasons Why Businesses Need To Secure AI-Driven Applications With Mend AI

    Why securing AI applications is important for businesses and how Mend AI can help protect against emerging AI threats.

  2. Google Unveils Sol: A New Transatlantic Cable to Boost Global Cloud Connectivity

    Google reveals the Sol undersea cable linking the U.S., Bermuda, the Azores, and Spain to boost cloud ability, dependability, and overall network toughness.

  3. How Ridgeline Enhanced (And Saved Money) on Their Cloud Security with CloudQuery

    Ridgeline, a cloud-native investment management platform, improved infrastructure visibility, automated compliance, and cut cloud costs by over 30% using CloudQuery. By integrating it into their CI/CD pipeline, they scaled to 300+ AWS accounts, expanded resource coverage, and reduced manual overhead—ensuring secure, efficient, and compliant cloud operations.

  4. How Dunelm Uses CloudQuery and Snowflake to Enhance AWS Security

    CloudQuery simplifies data movement with powerful integrations and a flexible CLI. Learn how it supports cloud asset inventory, security, compliance, and more.

  5. Tempus Multi-Cloud Asset Inventory

    Discover how Tempus uses CloudQuery to manage multi-cloud environments at scale, leveraging GCP, Terraform, and Grafana for compliance monitoring and cloud security. Learn from their real-world deployment fetching resources across 80+ AWS accounts and 1000+ GCP projects.

  6. How SkyHawk Security Powers their Cyber-Security Platform Data Collection with CloudQuery

    Discover how SkyHawk Security, a leading cloud cybersecurity firm, supercharged its platform by integrating CloudQuery. Learn how they streamlined multi-cloud data collection, saved engineering time, boosted performance, and ensured compliance, empowering their team to focus on core security innovations.

  7. Mitsubishi UFJ e-Smart Securities Optimizes Package Management and Automates Deployment with JFrog

    Mitsubishi UFJ e-Smart Securities has historically faced challenges around optimizing deployment and package management. By adopting the JFrog Software Supply Chain Platform, the company has transformed its approach to DevOps and realized significant improvements in security, efficiency, and speed.

  8. Fintech Developer Streamlines Software Production with JFrog’s Release Lifecycle Management

    A multinational financial technology firm improved security and compliance by adopting the JFrog Platform for software releases. Using immutable release bundles and controlled promotion, they minimized risks while maintaining strict regulatory standards. JFrog’s Release Lifecycle Management (RLM) capabilities reduced manual intervention, allowing teams to focus on innovation.

  9. National Energy Operator’s Journey to DevSecOps Excellence with JFrog

    This energy operator and facilitator oversees key national electricity and gas markets. By adopting the JFrog Platform, they transformed their software development operations and security practices, achieving significant operational efficiencies, enhanced security, and millions in cost savings.

  10. How to provision certificates for internal services with Teleport Workload Identity

    In today's security landscape, relying on firewalls alone is no longer enough. This article explores how Teleport Workload Identity enables secure, short-lived X.509 certificates for internal services using Mutual TLS (mTLS), eliminating long-lived secrets and enhancing workload trust. Learn how to configure and audit mTLS connections between services like NGINX and a client using SPIFFE-compliant certificates, all backed by fine-grained RBAC and detailed audit logging.

  11. Fintech Company Streamlines Software Supply Chain Management for Enhanced Security

    This leading financial services technology company has significantly improved auditability and traceability, streamlined its security technology tool stack, and strengthened its end-to-end software supply chain security by adopting JFrog Advanced Security.

  12. Security Benchmarking Authorization Policy Engines: Rego, Cedar, OpenFGA & Teleport ACD

    In collaboration with Teleport, Doyensec has developed the Security Policy Evaluation Framework (SPEF) — a dynamic testing and benchmarking tool for evaluating the security, performance, and reliability of popular authorization policy engines like Rego, Cedar, OpenFGA, and Teleport ACD. Built with modular architecture and containerized execution, SPEF allows researchers and engineers to validate policies under consistent, controlled conditions. This article walks through its architecture, supported engines, and key insights from early testing across 27 threat-driven test cases.

Items 13 to 24 of 363 total

Show per page