Filter & Sort
  1. Recruit Wizard scaled and moved to daily deployments with Octopus Cloud

    Recruit Wizard transformed its software delivery by adopting Octopus Deploy for full deployment automation across Kubernetes and virtual machines. Moving from quarterly to daily deployments, the team now uses Config as Code and Runbooks to streamline releases, reduce errors, and empower non-engineering staff to run operational tasks independently. With Octopus Cloud, they’ve modernized and scaled their deployments while staying focused on growth and innovation in recruitment software.

  2. Beyond Traditional AppSec: Navigating the New Frontier of AI Security with Mend AI

    Bar-El Tayouri of Mend AI shares why securing AI-driven apps demands new strategie and how to build an effective, future-ready AppSec program.

  3. CloudBolt x StormForge: Why Automated FinOps Beats Human Effort

    CloudBolt CTO Kyle Campos discusses ending FinOps dashboard overload with action-driven orchestration and how StormForge enhances Kubernetes optimization through real-time automation and smarter remediation.

  4. Docker Container Logs: How to View & Manage

    Easy access to Docker container logs is essential for effective development and debugging. This guide explores how to view and manage Docker logs using the docker logs command, Docker Compose, and Docker Desktop. It also covers where logs are stored, how to clear them, and best practices for centralized logging, log rotation, and structured output. Whether you're just starting with Docker or optimizing a production setup, this article will help you tailor container observability to your needs.

  5. Achieving Sovereign AI with the JFrog Platform and NVIDIA Enterprise AI Factory

    Unlock Sovereign AI! Discover how the powerful collaboration between JFrog and NVIDIA delivers secure, scalable, and compliant AI. Learn how they enable enterprises to build, manage, and deploy AI models from development to edge, ensuring full control over data, models, and infrastructure.

  6. How JFrog Delivers Self-Service Cloud Environments for our Developers

    Increasing operational efficiency, automation, and scalability are critical for success In today’s cloud-native development environments

  7. Runtime is the real defense, not just posture

    Traditional cloud security tools focus on static scans and misconfiguration checks, but they can’t keep up with today’s fast-moving threats. This article explores why runtime security — real-time monitoring and automated response — is essential for protecting dynamic cloud-native environments. Learn how shifting to a runtime-first strategy enables faster detection, proactive defense, and true resilience in the cloud.

  8. Spotting Spear Phishing: A Business Cybersecurity Guide

    Don't get speared! Discover how targeted phishing attacks can devastate businesses and learn to spot subtle deceptions used by cybercriminals. This guide reveals how attackers gather info, craft convincing messages, and offers essential prevention tips, including how Netmaker boosts network protection.

  9. How to provision certificates for internal services with Teleport Workload Identity

    In today's security landscape, relying on firewalls alone is no longer enough. This article explores how Teleport Workload Identity enables secure, short-lived X.509 certificates for internal services using Mutual TLS (mTLS), eliminating long-lived secrets and enhancing workload trust. Learn how to configure and audit mTLS connections between services like NGINX and a client using SPIFFE-compliant certificates, all backed by fine-grained RBAC and detailed audit logging.

  10. Fintech Company Streamlines Software Supply Chain Management for Enhanced Security

    This leading financial services technology company has significantly improved auditability and traceability, streamlined its security technology tool stack, and strengthened its end-to-end software supply chain security by adopting JFrog Advanced Security.

  11. Security Benchmarking Authorization Policy Engines: Rego, Cedar, OpenFGA & Teleport ACD

    In collaboration with Teleport, Doyensec has developed the Security Policy Evaluation Framework (SPEF) — a dynamic testing and benchmarking tool for evaluating the security, performance, and reliability of popular authorization policy engines like Rego, Cedar, OpenFGA, and Teleport ACD. Built with modular architecture and containerized execution, SPEF allows researchers and engineers to validate policies under consistent, controlled conditions. This article walks through its architecture, supported engines, and key insights from early testing across 27 threat-driven test cases.

  12. Telecommunications Giant Sets the Stage for Scalable, Resilient, and Secure Software Development with JFrog

    Learn how this leading multinational telecommunications company transformed its entire development platform, and achieved scalability and optimal uptime by moving to the JFrog Software Supply Chain Platform in the cloud.

Items 25 to 36 of 325 total

Show per page