-
Evolution of IoT Architectures from Simple Device-Cloud Models to Edge-Based Systems
Discover how IoT architectures evolved from cloud-only models to edge-based systems that boost speed, scalability, and real-time decision-making.
-
Explore what’s important when running data workloads on Kubernetes
Not long ago, Kubernetes aimed primarily to serve stateless workloads. Explore what’s important when running data workloads on Kubernetes.
-
Expressions in Terraform
Expressions are one of the most powerful features of any programming language and Terraform is no expection. Version 0.12 added more powerful features.
-
FinOps in 2025: The 6 Phases of FinOps Evolution
Explore the six evolving phases of FinOps, from the initial "Observational" data collection to "Automated" and the future of "Integrated FinOps," revealing how organizations learn to manage cloud spend and optimize infrastructure efficiently over time.
-
Fintech Company Streamlines Software Supply Chain Management for Enhanced Security
This leading financial services technology company has significantly improved auditability and traceability, streamlined its security technology tool stack, and strengthened its end-to-end software supply chain security by adopting JFrog Advanced Security.
-
Fintech Developer Streamlines Software Production with JFrog’s Release Lifecycle Management
A multinational financial technology firm improved security and compliance by adopting the JFrog Platform for software releases. Using immutable release bundles and controlled promotion, they minimized risks while maintaining strict regulatory standards. JFrog’s Release Lifecycle Management (RLM) capabilities reduced manual intervention, allowing teams to focus on innovation.
-
Fitness App Breach Exposes French Nuclear Submarine Secrets
Read to know how Strava’s fitness tracking app showcased the loopholes in their data privacy capabilities.
-
Flywheel Accelerates Deployments and Provides Agile, Compliant Support for Biomedical Researchers using Teleport
Flywheel Accelerates Deployments and Provides Agile, Compliant Support for Biomedical Researchers using Teleport.
-
From Alerts to Actions: Turning AppSec Data into Business Value
Modern AppSec teams are overwhelmed with alerts but still struggle to answer the one question that matters: What should we fix first? This article explores how shifting from raw data to contextual insights helps prioritize the most impactful vulnerabilities, align security efforts with business goals, and move application security from a cost center to a strategic enabler.
-
From Minecraft to Kubernetes Security: The Founding Story of Edera with Alex Zenla
Discover Alex Zenla’s journey from Minecraft and IoT to Kubernetes security. Learn how Edera is redefining container isolation for secure, efficient cloud-native infrastructure.
-
Generative Intelligence: How Gen AI Growth is Driving Business Intelligence Tools
Learn how generative AI advances will redefine how BI tools empower you for business decision-making.
-
Get the evil out – don’t run containers as root
When containers entered the stage, by default they ran as root. This poses a security risk. Get the evil out - don't run containers as root.