Filter & Sort
  1. Runtime is the real defense, not just posture

    Traditional cloud security tools focus on static scans and misconfiguration checks, but they can’t keep up with today’s fast-moving threats. This article explores why runtime security — real-time monitoring and automated response — is essential for protecting dynamic cloud-native environments. Learn how shifting to a runtime-first strategy enables faster detection, proactive defense, and true resilience in the cloud.

  2. Top 15 Kubectl plugins for security engineers in 2025

    Kubernetes security is evolving fast—and so should your tools. This roundup of the top kubectl plugins for 2025 spotlights essential extensions that help security teams audit RBAC, trace runtime activity, manage secrets securely, and respond to threats in real time. Whether you're managing complex clusters or chasing compliance, these plugins supercharge your command line with the visibility and control you need.

  3. Practical AI security in multi-cloud environments

    As organizations rapidly adopt generative and agentic AI tools across multi-cloud environments, securing those systems has never been more critical. This article explores the key challenges of AI security—such as visibility gaps, runtime threats, and compliance pressures—and outlines best practices for building a strong AI security posture. From continuous monitoring with Falco to managing AI-specific risks with frameworks like MITRE ATLAS and OWASP AI, learn how to protect your AI infrastructure against evolving threats and regulatory demands.

  4. Scaling Docker Usage with JFrog

    Worried about Docker Hub rate limits? Discover how JFrog’s universal artifact manager and container registry ensures uninterrupted Docker usage by proxy caching, enabling authentication, and providing unlimited public Docker Hub downloads via JFrog SaaS, helping you scale seamlessly.

  5. Top 5 features to look for in a cloud detection and response solution

    Cloud detection and response (CDR) is essential for securing modern hybrid and multicloud environments, where traditional tools fall short. This article explores the key challenges facing security teams—like lack of runtime visibility, alert fatigue, and skill gaps—and outlines how purpose-built CDR solutions like Sysdig address them. From real-time visibility and automated threat correlation to AI-powered threat investigation, discover what to look for in a CDR platform that delivers speed, context, and control across your entire cloud infrastructure.

  6. Introducing Support for Chocolatey and PowerShell Packages

    Unwrap more universality! JFrog Artifactory now officially supports Chocolatey and PowerShell packages within its NuGet repositories, giving Windows users unmatched flexibility for package management, streamlined automation, and solidifying JFrog as the ultimate universal solution

  7. Mitsubishi UFJ e-Smart Securities Optimizes Package Management and Automates Deployment with JFrog

    Mitsubishi UFJ e-Smart Securities has historically faced challenges around optimizing deployment and package management. By adopting the JFrog Software Supply Chain Platform, the company has transformed its approach to DevOps and realized significant improvements in security, efficiency, and speed.

  8. Workload Identity Meets Supply Chain Security: Teleport's Sigstore Integration

    Modern software supply chains face increasing complexity and risk, especially from supply chain attacks like SUNBURST. This article explores how Sigstore and Teleport's Machine & Workload Identity can fortify your CI/CD pipeline. Learn how Sigstore enables keyless, verifiable artifact signing, and how Teleport integrates these signatures into workload attestation using SPIFFE-based SVIDs. Discover how to enforce policies that block compromised containers from accessing sensitive resources, and how cryptographic identity can replace static secrets for secure service-to-service communication. A must-read for DevSecOps teams aiming to embed security into the development lifecycle.

  9. Fintech Developer Streamlines Software Production with JFrog’s Release Lifecycle Management

    A multinational financial technology firm improved security and compliance by adopting the JFrog Platform for software releases. Using immutable release bundles and controlled promotion, they minimized risks while maintaining strict regulatory standards. JFrog’s Release Lifecycle Management (RLM) capabilities reduced manual intervention, allowing teams to focus on innovation.

  10. National Energy Operator’s Journey to DevSecOps Excellence with JFrog

    This energy operator and facilitator oversees key national electricity and gas markets. By adopting the JFrog Platform, they transformed their software development operations and security practices, achieving significant operational efficiencies, enhanced security, and millions in cost savings.

  11. Docker Container Logs: How to View & Manage

    Easy access to Docker container logs is essential for effective development and debugging. This guide explores how to view and manage Docker logs using the docker logs command, Docker Compose, and Docker Desktop. It also covers where logs are stored, how to clear them, and best practices for centralized logging, log rotation, and structured output. Whether you're just starting with Docker or optimizing a production setup, this article will help you tailor container observability to your needs.

  12. Achieving Sovereign AI with the JFrog Platform and NVIDIA Enterprise AI Factory

    Unlock Sovereign AI! Discover how the powerful collaboration between JFrog and NVIDIA delivers secure, scalable, and compliant AI. Learn how they enable enterprises to build, manage, and deploy AI models from development to edge, ensuring full control over data, models, and infrastructure.

Items 13 to 24 of 268 total

Show per page