Filter & Sort
  1. Effortless SBOM Analysis: How Anchore Enterprise Simplifies Integration

    As software supply chain security becomes a top priority, organizations are turning to Software Bill of Materials (SBOM) generation and analysis to gain visibility into the composition of their software and supply chain dependencies in order to reduce risk.

  2. Enterprise Open Source AI: Navigating Risk, Securing Innovation, and Owning Your Destiny

    As AI adoption surges across industries, organizations face critical decisions about how to manage innovation, risk, and control. Open source AI offers enterprises the ability to “own their destiny” — providing transparency, flexibility, and customization that proprietary models often lack. However, with these benefits come challenges: security vulnerabilities, model drift, and cultural shifts in AI literacy. To succeed, businesses must build secure infrastructure, foster cross-functional collaboration, and establish governance pathways that empower safe innovation. The future belongs to cybernetic businesses — and those that proactively shape their AI strategies today will lead tomorrow.

  3. Evolution of IoT Architectures from Simple Device-Cloud Models to Edge-Based Systems

    Discover how IoT architectures evolved from cloud-only models to edge-based systems that boost speed, scalability, and real-time decision-making.

  4. Explore what’s important when running data workloads on Kubernetes

    Not long ago, Kubernetes aimed primarily to serve stateless workloads. Explore what’s important when running data workloads on Kubernetes.

  5. Expressions in Terraform

    Expressions are one of the most powerful features of any programming language and Terraform is no expection. Version 0.12 added more powerful features.

  6. FinOps in 2025: The 6 Phases of FinOps Evolution

    Explore the six evolving phases of FinOps, from the initial "Observational" data collection to "Automated" and the future of "Integrated FinOps," revealing how organizations learn to manage cloud spend and optimize infrastructure efficiently over time.

  7. Fintech Company Streamlines Software Supply Chain Management for Enhanced Security

    This leading financial services technology company has significantly improved auditability and traceability, streamlined its security technology tool stack, and strengthened its end-to-end software supply chain security by adopting JFrog Advanced Security.

  8. Fintech Developer Streamlines Software Production with JFrog’s Release Lifecycle Management

    A multinational financial technology firm improved security and compliance by adopting the JFrog Platform for software releases. Using immutable release bundles and controlled promotion, they minimized risks while maintaining strict regulatory standards. JFrog’s Release Lifecycle Management (RLM) capabilities reduced manual intervention, allowing teams to focus on innovation.

  9. Fitness App Breach Exposes French Nuclear Submarine Secrets

    Read to know how Strava’s fitness tracking app showcased the loopholes in their data privacy capabilities.

  10. Five Reasons Standalone Vulnerability Scanning Isn’t Enough in 2025

    Vulnerability scanning alone doesn’t cut it anymore. While it’s long been a core security practice, scanning tools can’t tell you which vulnerabilities are exploitable, how attackers would target them, or which ones pose real risk. This article explores the limitations of vulnerability scanning, the shortfalls of traditional vulnerability management, and why organizations must adopt a risk-based, context-driven approach to application security. Learn how to prioritize based on exploitability, integrate security across the SDLC, and move toward continuous, intelligent threat detection.

  11. Flywheel Accelerates Deployments and Provides Agile, Compliant Support for Biomedical Researchers using Teleport

    Flywheel Accelerates Deployments and Provides Agile, Compliant Support for Biomedical Researchers using Teleport.

  12. From Alerts to Actions: Turning AppSec Data into Business Value

    Modern AppSec teams are overwhelmed with alerts but still struggle to answer the one question that matters: What should we fix first? This article explores how shifting from raw data to contextual insights helps prioritize the most impactful vulnerabilities, align security efforts with business goals, and move application security from a cost center to a strategic enabler.

Items 121 to 132 of 331 total

Show per page