Meet Sunny Rao, JFrog’s New SVP of Asia Pacific

With APAC economies rapidly going digital, businesses are hyper-focused on becoming more efficient, agile, and customer-focused. Software is playing an increasingly critical role in their success. At the same time, today’s software development landscape is more complex than ever, driven by cybersecurity concerns, emerging and constantly evolving regulatory requirements, plus AI-assisted coding trends that have …

Self-Service Cloud Development Environment__Thumbnail

How JFrog Delivers Self-Service Cloud Environments for our Developers

The internal DevOps team at JFrog needed to provision cloud resources, create environments, and manage infrastructure for our developers.  Unfortunately, it involved wasting a significant amount of time on repetitive tasks, that was slowing down the pace of innovation and taking away our developers’ focus from building new features and industry leading products. Here is …

JFrog’s SPOF Framework for SaaS Ecosystems

As Software as a Service (SaaS) solutions evolve, organizations face increasing pressure to ensure uninterrupted service delivery. One of the most significant threats to SaaS Service delivery and operational continuity is the presence of known and unknown Single Points of Failure (SPOFs). As a SaaS organization, the team at JFrog deeply understands the risks of …

RSAC 2025 Recap: Software Supply Chain Security Takes Center Stage

The RSA Conference 2025 at the Moscone Center in San Francisco on April 28 – May 1, brought together over 44,000 cybersecurity professionals from around the world. This year’s event, marking the 34th annual flagship conference, placed significant emphasis on software supply chain security and secure software development lifecycle (SDLC) practices. From the keynotes, speaking …

Scaling Docker Usage with JFrog

Earlier last month the development industry was preparing for rate limit changes at Docker Hub. Ultimately, any rate limit changes were put on hold. Many JFrog customers have asked us, “How would Docker Hub rate limit changes impact us?” In this post we’ll discuss what you can do to ensure uninterrupted usage of Docker, now …

MITRE CVE Program - Thumbnail

A Vulnerable Future: MITRE’s Close Call in CVE Management

Last week, one of the biggest concerns in the cybersecurity industry created a crisis that was avoided at the last minute. On April 16th, 2025, the MITRE Corporation announced:  “The current contracting pathway for MITRE to develop, operate, and modernize CVE and several other related programs, such as CWE, will expire.” Official letter from MITRE …

JFrog’s Journey with AWS Graviton

Every business strives to optimize operational costs and efficiency. In the DevOps world, where cloud-scale operations are the norm, this becomes even more critical. At JFrog, while delivering a robust and highly scalable SaaS solution to our customers, we are equally focused on optimizing operational costs and maximizing infrastructure efficiency. Our recent transition to AWS …

Now Available: Smart Archiving with the JFrog Platform

Every day development teams around the world release new software. But what happens to prior releases that are no longer in production? Most organizations save them, typically due to internal policies, external regulations, or simply the fear of losing data. Organizations typically take varied approaches to retaining their prior releases. Some use a dedicated repository …

Introducing Support for Chocolatey and PowerShell Packages

In February, we announced our support for Hex packages, which further solidified the JFrog Platform as the most universal package management solution. We’re excited to announce we’re continuing to build on our universality with our new official support of Chocolatey and PowerShell, which allows both technologies to be used with our NuGet repositories in JFrog …

Malicious Pypi_863x300

Malicious PyPI Package Hijacks MEXC Orders, Steals Crypto Tokens

The JFrog Security Research team regularly monitors open source software repositories using advanced automated tools, in order to detect malicious packages. In cases of potential supply chain security threats, our research team reports any malicious packages that were discovered to the repository’s maintainers in order to have them removed. This blog provides an analysis of …