Application Security | News, how-tos, features, reviews, and videos
Explore related topics
JFrog used Xray Container Contextual Analysis to scan the 200 most popular community images in Docker Hub, then tallied the results for the 10 most common CVEs. 78% were not exploitable.
JFrog’s new Xray Secrets Detection uncovered active access tokens in popular open-source software registries including Docker, npm, and PyPI. Here are our findings and takeaways.
End-to-end open source security platform for Kubernetes has added vulnerability scanning for code repositories and container image registries.
ZKP has decades of history in computer science and cryptography. Now, it's evolving to support decentralized authentication for blockchains and web3.
The upstart internet security and edge infrastructure company has reinvented itself to challenge the hyperscale cloud providers. Can it succeed?
The people deploying multicloud will tell you that 'security is a nightmare.' Cross-cloud abstraction and automation of security services is the right solution.
Microsoft is making its internal, cross-platform, software bill of materials generation tool public and open source.
The most dangerous security holes are often the most basic. Start improving your Kubernetes security posture by fixing these simple mistakes.
Security teams need a standard set of processes for locking down roots of trust for software artifacts, and developers need a clear path to balance open source selection against security policies. Open source has answers.
The threats to your company’s data are many and varied, and so are the techniques for keeping that data safe and secure.