Filter & Sort
  1. Where Large Language Models (LLMs) meet Infrastructure Identity

    As Large Language Models (LLMs) begin interfacing directly with real infrastructure, securing their access becomes critical. This article explores how the Model Context Protocol (MCP) enables LLMs to interact with databases and systems—and how Teleport’s Infrastructure Identity Platform ensures secure, auditable access. Learn how teams can enforce least-privilege policies, prevent over-permissioning, and maintain full audit trails even with AI in the loop.

  2. Mitsubishi UFJ e-Smart Securities Optimizes Package Management and Automates Deployment with JFrog

    Mitsubishi UFJ e-Smart Securities has historically faced challenges around optimizing deployment and package management. By adopting the JFrog Software Supply Chain Platform, the company has transformed its approach to DevOps and realized significant improvements in security, efficiency, and speed.

  3. Workload Identity Meets Supply Chain Security: Teleport's Sigstore Integration

    Modern software supply chains face increasing complexity and risk, especially from supply chain attacks like SUNBURST. This article explores how Sigstore and Teleport's Machine & Workload Identity can fortify your CI/CD pipeline. Learn how Sigstore enables keyless, verifiable artifact signing, and how Teleport integrates these signatures into workload attestation using SPIFFE-based SVIDs. Discover how to enforce policies that block compromised containers from accessing sensitive resources, and how cryptographic identity can replace static secrets for secure service-to-service communication. A must-read for DevSecOps teams aiming to embed security into the development lifecycle.

  4. Fintech Developer Streamlines Software Production with JFrog’s Release Lifecycle Management

    A multinational financial technology firm improved security and compliance by adopting the JFrog Platform for software releases. Using immutable release bundles and controlled promotion, they minimized risks while maintaining strict regulatory standards. JFrog’s Release Lifecycle Management (RLM) capabilities reduced manual intervention, allowing teams to focus on innovation.

  5. National Energy Operator’s Journey to DevSecOps Excellence with JFrog

    This energy operator and facilitator oversees key national electricity and gas markets. By adopting the JFrog Platform, they transformed their software development operations and security practices, achieving significant operational efficiencies, enhanced security, and millions in cost savings.

  6. How to provision certificates for internal services with Teleport Workload Identity

    In today's security landscape, relying on firewalls alone is no longer enough. This article explores how Teleport Workload Identity enables secure, short-lived X.509 certificates for internal services using Mutual TLS (mTLS), eliminating long-lived secrets and enhancing workload trust. Learn how to configure and audit mTLS connections between services like NGINX and a client using SPIFFE-compliant certificates, all backed by fine-grained RBAC and detailed audit logging.

  7. Fintech Company Streamlines Software Supply Chain Management for Enhanced Security

    This leading financial services technology company has significantly improved auditability and traceability, streamlined its security technology tool stack, and strengthened its end-to-end software supply chain security by adopting JFrog Advanced Security.

  8. Security Benchmarking Authorization Policy Engines: Rego, Cedar, OpenFGA & Teleport ACD

    In collaboration with Teleport, Doyensec has developed the Security Policy Evaluation Framework (SPEF) — a dynamic testing and benchmarking tool for evaluating the security, performance, and reliability of popular authorization policy engines like Rego, Cedar, OpenFGA, and Teleport ACD. Built with modular architecture and containerized execution, SPEF allows researchers and engineers to validate policies under consistent, controlled conditions. This article walks through its architecture, supported engines, and key insights from early testing across 27 threat-driven test cases.

  9. Telecommunications Giant Sets the Stage for Scalable, Resilient, and Secure Software Development with JFrog

    Learn how this leading multinational telecommunications company transformed its entire development platform, and achieved scalability and optimal uptime by moving to the JFrog Software Supply Chain Platform in the cloud.

  10. AWS VPN: Types, Benefits, and Troubleshooting Tips

    Unlock seamless, secure cloud connectivity! Explore AWS VPN types (Site-to-Site, Client VPN), their benefits, and essential setup tips. Learn how to troubleshoot common issues and discover how tools like Netmaker offer robust alternatives for building scalable, resilient networks.

  11. Docker Container Logs: How to View & Manage

    Easy access to Docker container logs is essential for effective development and debugging. This guide explores how to view and manage Docker logs using the docker logs command, Docker Compose, and Docker Desktop. It also covers where logs are stored, how to clear them, and best practices for centralized logging, log rotation, and structured output. Whether you're just starting with Docker or optimizing a production setup, this article will help you tailor container observability to your needs.

  12. Achieving Sovereign AI with the JFrog Platform and NVIDIA Enterprise AI Factory

    Unlock Sovereign AI! Discover how the powerful collaboration between JFrog and NVIDIA delivers secure, scalable, and compliant AI. Learn how they enable enterprises to build, manage, and deploy AI models from development to edge, ensuring full control over data, models, and infrastructure.

Items 1 to 12 of 291 total

Show per page