JFrog-and-Hugging-Face-join-forces_Thumbnail

JFrog and Hugging Face Join Forces to Expose Malicious ML Models

ML operations, data scientists, and developers currently face critical security challenges on multiple fronts. First, staying up to date with evolving attack techniques requires constant vigilance and security know-how, which can only be achieved by a dedicated security team. Second, existing ML model scanning engines suffer from a staggering rate of false positives. When a …

MLOps Your Way with the JFrog Platform

Just like in traditional software development, creating AI applications isn’t a one size fits all approach. However, many of the challenges and concerns facing AI/ML development teams share common threads – difficulties getting models to production, tangled infrastructure, data quality, security issues, and so on. Regardless of how you build it, to accelerate production-ready AI, …

FINMA-Compliance_V02b_Thumbnail

FINMA Compliance: DevSecOps Strategies for Securing the Swiss Financial Ecosystem

The Swiss Financial Market Supervisory Authority (FINMA) sets strict requirements to ensure that financial institutions operating in Switzerland maintain robust security and operational resilience. FINMA’s guidelines are crucial for protecting sensitive financial data, minimizing risks, and maintaining trust in the Swiss financial ecosystem. As part of that, software supply chain security plays an essential role …

Introducing Hex Package Support_Thumbnail

Introducing Support for Hex Packages

JFrog has always prioritized universality, ensuring software development teams have true freedom of choice. Core to the JFrog Platform, JFrog Artifactory is the world’s most versatile artifact manager, natively supporting nearly 40 package types. After taking in valuable feedback from the developer community, we’re thrilled to discuss how we’re further expanding our universe with the …

Building Cloud Excellence: How JFrog Supports the AWS Well-Architected Framework

In today’s hybrid infrastructure landscape, migrating applications to the cloud unlocks significant financial and technological benefits. Whether internal or external, these applications require robust, efficient infrastructure. Cloud providers like Amazon Web Services (AWS), Google Cloud, and Microsoft Azure offer frameworks to help organizations build better systems. AWS Well-Architected helps cloud architects design secure, high-performing, resilient, …

RLM vs Build Promotion Blog_Thumbnail

JFrog’s Release Lifecycle Promotion vs. Build Promotion

We here at JFrog have long advocated for promoting – never rebuilding – release candidates as they advance across the stages of your SDLC. For many JFrog customers, that meant using JFrog’s “Build Promotion” capabilities. Now you can level up your CI/CD game with promotions using Release Lifecycle Management (RLM)! In this article we’ll show …

CERT-In-Guidelines-Blog_Thumbnail

JFrog Simplifies Compliance with India’s new CERT SBOM Guidelines

Overview The Indian Computer Emergency Response Team (CERT-In) is the national agency responsible for addressing cybersecurity incidents in India. Established in 2004 and operating under the Ministry of Electronics and Information Technology (MeitY), CERT-In is dedicated to enhancing the security of India’s digital infrastructure. The organization plays a vital role in preventing, detecting, and responding …

Evil-Proxy-Thumbnail-203x148-1.png

Everything You Need to Know About Evil Proxy Attacks and MFA Bypass

Attackers use a malicious proxy server to intercept, monitor, and manipulate communication between a client and a legitimate server, often to steal credentials, session tokens, or other sensitive information. Some services provide “Phishing-as-a-Service” (PhaaS), offering attackers ready-made tools and infrastructure to conduct phishing campaigns. These services simplify the process of deceiving individuals into providing sensitive …

JFrog ISO-27001-Certification-Blog_Thumbnail

JFrog Achieves ISO/IEC 27001:2022

As part of JFrog’s mission to continuously develop and uphold the highest industry standards in cyber security, we are excited to announce that we have successfully upgraded our ISO certification to the latest version, ISO/IEC 27001:2022. This achievement reinforces our dedication to protecting your data with the high standards of cyber and information security. Understanding …