Welcome to the JFrog Blog

FILTER BY

All
Products
Solutions
Other
JFrog Xray Integration with AWS Security Hub

JFrog Xray Integration with AWS Security Hub

SecOps demands vigilance, but it requires visibility, too. With JFrog’s latest integration for Xray with AWS Security Hub, you can help make sure that discovered vulnerabilities are not just seen, but quickly acted on. AWS Security Hub is the cloud security posture management service available to AWS users. It provides central security administration across AWS…
Self-Hosted or SaaS, JFrog Has You Covered

Self-Hosted or SaaS, JFrog Has You Covered

Freedom of choice can make choosing harder. Since a JFrog cloud (SaaS) account provides the same features as a self-hosted JFrog DevOps Platform how will you decide which is right for you?  Choice without tradeoffs is one of the key ways JFrog enables you to be cloud nimble, and run the mission-critical heart of your…
7 Ways to Accelerate Cloud Native Development

7 Ways to Accelerate Cloud Native Development

Modern enterprises understand the need to move away from developing monolithic applications to ones that make best use of the cloud to enable business acceleration at scale and speed. That means transforming development to more resilient cloud native architectures that can be readily deployed to cloud, multi-cloud, and hybrid environments. What does it mean to…
How To Put Cloud Nimble to Work to Shift Left Security

How To Put Cloud Nimble to Work to Shift Left Security

Shifting security left means preventing developers from using unacceptably vulnerable software supply chain components as early as possible: before their first build. By helping assure that no build is ever created using packages with known vulnerabilities, this saves substantial remediation costs in advance. Some JFrog customers restrict the use of open source software (OSS) packages…
Continuous Training and Deployment for Machine Learning (ML) at the Edge

Continuous Training and Deployment for Machine Learning (ML) at the Edge

Running machine learning (ML) inference in Edge devices close to where the data is generated offers several important advantages over running inference remotely in the cloud. These include real-time processing, lower cost, the ability to work without connectivity and with increased privacy. However, today, implementing an end-to-end ML system for edge inference and continuous deployment…
Testing resiliency against malicious package attacks: a double-edged sword?

Testing resiliency against malicious package attacks: a double-edged sword?

The JFrog Security research team continuously monitors popular open-source software (OSS) repositories with our automated tooling to avert potential software supply chain security threats, and reports any vulnerabilities or malicious packages discovered to repository maintainers and the wider community. At times, we notice trends that are worth analyzing and learning from. Recently, we’ve noticed a…
Team Up on DevSecOps with JFrog Platform App for Microsoft Teams

Team Up on DevSecOps with JFrog Platform App for Microsoft Teams

The JFrog DevOps Platform is your mission-critical tool for your software development pipelines. The results of key binary management events in Artifactory, Xray, and Distribution can reveal whether or not your software pipelines are on-track to deliver production-quality releases.  The new JFrog Platform app for Microsoft Teams brings real-time visibility and awareness of what’s happening…
Creating your first Pub project with JFrog Artifactory

Creating your first Pub project with JFrog Artifactory

Developers today need to build software from many platforms in order to reach their users. All while maintaining quality and achieving the best user experience possible. This can be a challenging task when you need to meet the growing needs of software development. This is where the Dart and Flutter come into the picture. A…
Part I: A Journey of a Thousand Binaries – Types of Software Dependencies

Part I: A Journey of a Thousand Binaries – Types of Software Dependencies

TL;DR We use software dependencies as part of our ongoing daily work. In part one of this series, we’ll take a look into what dependencies are, why we use them and the tools we can use to manage them and gain trust in our software supply chain. Software Dependencies Dependencies are artifacts that enable applications…