The State of the Software Supply Chain 2025

Managing and securing the software supply chain is crucial for trusted releases, but as any tech organization knows, it also presents significant challenges. With over 15 years of experience and a dedicated security research team, we at JFrog understand these threats. In a rapidly evolving post-AI world, DevSecOps teams are struggling to keep pace with โ€ฆ

Ensuring-Release-Integrity-Seamlessly_V3_Blog_Thumbnail.png

The Power of Evidence Collection and Release Lifecycle Management

The speed of todayโ€™s software development lifecycle is only getting faster. However, the complexity of todayโ€™s pipelines make it hard to track and manage the processes software releases must go through. With increasing regulatory pressures, ensuring and proving your software has gone through the necessary quality controls is no longer nice to have โ€“ it โ€ฆ

Embracing Complexity in DevOps: Software Supply Chain State of the Union 2024

As we delve deeper into the era of software reliance, the 2024 JFrog Software Supply Chain report emerges as required reading for developers and DevOps professionals who are at the frontline of todayโ€™s technological innovations. DevOps and development themes from the 2024 report The report combines Artifactory data, analysis from the JFrog Security Research team, โ€ฆ

JFrog4JFrog: DevSecOps Made Simple

Developers simply want to write code without interruption, while operations wish to build as fast as possible and deploy without restrictions. On the other hand, security professionals want to protect every step of the software supply chain from any potential security threats and vulnerabilities. In software development, every piece of code can potentially introduce vulnerabilities โ€ฆ

The State of Software Supply Chain Security in 2024

In todayโ€™s fast-paced software development landscape, managing and securing the software supply chain is crucial for delivering reliable and trusted software releases. With that in mind, itโ€™s important to assess whether your organization is set up to handle the continuous expansion of the open-source ecosystem and an ever-growing array of tools to incorporate into your โ€ฆ

2023 Best of JFrog Software Supply Chain Blogs

2023 was a big year. There were many interesting challenges and exciting developments within our industry, like the continued evolution of AI/ML, the discovery and remediation of widespread CVEs, and major leaps forward in the realm of end-to-end software supply chain security. In that spirit, we want to recap the news and articles that you โ€ฆ

Announcing JFrog Curation: Defend Your Software Supply Chain by Curating Open-Source Packages Entering Your Organization

UPDATE: Following the announcement at swampUP 2023, JFrog Curation now features a web user interface for its Catalog database service. This enables JFrog customers to search and explore over 4 million open-source packages for their up-to-date metadata including its versions, install command, dependencies, vulnerabilities (including any transitive ones), license types, OpenSSF aggregate score, and any โ€ฆ

devops infinity loop

Understanding a release-first approach to software supply chain management

For anyone involved in software development, the โ€œinfinity loopโ€ is synonymous with DevOps โ€” and rightfully so. We know that software is rarely in a static state for very long. Continuous updates are required to meet the demands of users and to deliver more value, faster than the competition. You might be wondering: Out of โ€ฆ

From zero to breach in seconds: Why you need to focus on software supply chain security now

From zero to breach in seconds: Why you need to focus on software supply chain security now

The RSA Conference 2023 addressed several key issues and trends in the cybersecurity industry. Generative AI was a key topic of discussion, with attendees, executives and policymakers seeing its potential in both offense and defense in the cybersecurity arms race. The White Houseโ€™s National Cybersecurity Strategy was also a topic of conversation across panels and โ€ฆ

Analyzing Impala Stealer โ€“ Payload of the first NuGet attack campaign

Analyzing Impala Stealer โ€“ Payload of the first NuGet attack campaign In this blog post, weโ€™ll provide a detailed analysis of a malicious payload weโ€™ve dubbed โ€œImpala Stealerโ€, a custom crypto stealer which was used as the payload for the NuGet malicious packages campaign weโ€™ve exposed in our previous post. The sophisticated campaign targeted .NET โ€ฆ