Filter & Sort
  1. 9 Ways to Handle Secrets Management for Multi-Cloud Setups: Rotation, Auditing, and Access Control

    Securing multi-cloud setup by ensuring uncompromised secrets management across cloud vendors like AWS, Azure, and GCP.

  2. A Costly Divide: 5 Ways to Stop AppSec and Dev from Working Against Each Other

    The disconnect between AppSec and development teams is more than a collaboration issue—it’s a major business risk. This article explores the root causes of this divide, from misaligned goals to disconnected toolchains, and offers practical strategies for uniting teams. Learn how to embed security into the developer workflow, prioritize risk over noise, and foster a culture of shared responsibility and continuous improvement.

  3. A Guide to Cyber Attack Maps for Network Protection

    Visualize the battlefield! Discover how real-time cyber attack maps offer crucial insights into global threats and targeted attacks, empowering your IT and security teams with enhanced situational awareness and streamlined communication to protect company networks.

  4. A look at the top 4 ML tools of 2024 & what’s ahead for them in 2025

    Explore the top 4 ML tools of 2024 and their future in 2025.

  5. Achieving Sovereign AI with the JFrog Platform and NVIDIA Enterprise AI Factory

    Unlock Sovereign AI! Discover how the powerful collaboration between JFrog and NVIDIA delivers secure, scalable, and compliant AI. Learn how they enable enterprises to build, manage, and deploy AI models from development to edge, ensuring full control over data, models, and infrastructure.

  6. ActiveState wants you to stay a step ahead of open source dependency woes

    Learn how ActiveState's SBOM-first approach manages open source dependencies, with insights from CTO Scott Robertson and Senior Director Pete Garcin on security practices.

  7. ActiveState’s SBOM-first approach: Revolutionizing open-source dependency management

    Discover how ActiveState’s SBOM-first approach revolutionizes open-source dependency management. Enhance security and streamline compliance.

  8. Adaptive alerting: faster, better insights with the new metrics forecasting UI in Grafana Cloud

    Ditch reactive alerting! Discover how Grafana Cloud's new metrics forecasting UI enables proactive, adaptive alerting, letting you fine-tune models in real-time, anticipate problems before they strike, and automatically account for seasonality and holidays—all now available for free!

  9. Agents, Governance, and Truth: The AI Imperatives of 2025

    As enterprises scale AI efforts to unlock productivity and innovation, they must navigate emerging challenges around governance, security, and disinformation

  10. AI for Analyzing Your Cloud Asset Inventory

    Unlock your cloud asset inventory with AI! Discover CloudQuery's new Model Context Protocol (MCP) server, enabling any AI agent to directly query your infrastructure data using natural language. Learn how to empower security, FinOps, and infrastructure teams with real-time dashboards, tables, and reports, eliminating manual exports and boosting autonomous decision-making.

  11. AI Gateways: The Missing Piece in Scalable & Responsible AI Inferencing

    As AI adoption scales, traditional gateways fall short of meeting enterprise demands for performance and governance. This article explores how AI gateways enhanced with semantic caching and content guard are reshaping the infrastructure for responsible and scalable AI deployment. From cutting inference costs to enforcing compliance across data center and edge environments, discover how a code-first approach to managing these intelligent gateways enables consistent, high-performance, and secure AI delivery across any architecture.

  12. AI is Writing Your Code—Who’s Keeping It Secure

    AI code is the new Shadow IT, and it's already everywhere. Discover why AI-generated code is a rising security risk and get a brass-tacks guide for CISOs and security leaders to implement a layered strategy, combining governance and technical controls—with tools like Checkmarx One—to secure code at the speed of AI.

Items 49 to 60 of 358 total

Show per page