JFrog CloudFormation Modules Make Provisioning to AWS Easy and Secure

A routine cloud operations task should have a routine solution. Thatโ€™s why weโ€™ve just made it a lot easier to install and maintain self-hosted instances of the JFrog DevOps Platform on AWS, through AWS CloudFormation. To further simplify the effort of self-hosting Artifactory and Xray on AWS, weโ€™ve just published a set of AWS CloudFormation โ€ฆ

Best Practices for Migrating to Helm v3 for the Enterprise

At JFrog, we rely on Kubernetes and Helm to orchestrate our systems and keep our workloads running and up-to-date. Our JFrog Cloud services had initially been deployed with Helm v2 and Tillerless plugin for enhanced security, but we have now successfully migrated our many thousands of releases to Helm v3.  Like many SaaS service providers, โ€ฆ

5 Steps to Starting DevOps with a JFrog Free Subscription

Note: The below post showcases the JFrog Platform Free Tier, which is currently limited for new sign-ups. In the meantime, we invite you to explore a fully-functional free trial. The JFrog Free subscription is a SaaS cloud offering of the JFrog DevOps Platform that provides software developers, DevOps Engineers, System Administrators and students a sandbox โ€ฆ

SCIM Support in the JFrog Platform 203x148

Managing Users and Groups with SCIM in the JFrog Platform

When your organization becomes bigger, managing the users and groups lifecycle becomes a significant challenge. Your company grows rapidly, hiring new employees, and giving them access to more and more applications that your organization uses. This means that there are many employee-related actions that need to be taken when an employee changes their team, role, โ€ฆ

JFrog Artifactory Terraform Provider Gains Xray Functionality

A few months ago, I was asked if I wanted to develop an open-source Terraform provider. Eleanor Saitta, principal at Systems Structure Ltd, had a client who was setting up JFrog Xray across their Github repositories but didnโ€™t want to configure each repository by hand. As an SRE who enjoys working on projects that automate โ€ฆ

How to set up Software Security and Compliance for Your Artifacts

The simplest way to ensure the safety of all the open source (OSS) components used by your teams and sites, is with a software composition analysis (SCA) tool. You need an automated and reliable way to manage and keep track of your open source usage. With JFrog Xray, you can set up vulnerability and license โ€ฆ

My Build, My Way - JFrog Pipelines Extensions

My Build, My Way | JFrog Pipelines Extensions

TL;DR Once my new projects are almost ready to share with the team and I can build and test them locally, Iโ€™ll need a CI automation tool to test and deploy each release. As a Principal Consultant at Declarative Systems, Iโ€™ve been recommending JFrog Artifactory to clients looking to bullet-proof their deployments since 2016. After โ€ฆ

Automate DAST in DevSecOps With JFrog and NeuraLegion

NeuraLegionโ€™s VP Oliver Moradov takes us through how you can use JFrog and NeuraLegion to automate AppSec testing in your pipelines. The days of long release cycles are well and truly behind us โ€” it is simply not feasible in our agile development world, with developers delivering software and more features at an unprecedented scale โ€ฆ

Python Package Index (PyPi)

Python wheel-jacking in supply chain attacks

Recently, a novel supply chain attack was published by security researcher Alex Birsan, detailing how dependency confusion (or โ€œnamesquattingโ€œ) in package managers can be misused in order to execute malicious code on production and development systems. Background โ€“ dependency confusion & Birsanโ€™s attack In short, most package managers such as pip and npm do not โ€ฆ

Major Vulnerabilities Discovered and Patched in Realtek RTL8195A Wi-Fi Module

In a recent supply chain security assessment, the JFrog security research team (formerly Vdoo) analyzed multiple networking devices for security vulnerabilities and exposures. During the analysis we discovered and responsibly disclosed six major vulnerabilities in Realtekโ€™s RTL8195A Wi-Fi module that these devices were based on. An attacker that exploits the discovered vulnerabilities can gain remote โ€ฆ