Application Security | News, how-tos, features, reviews, and videos
Explore related topics
How can enterprises secure and manage the expanding ecosystem of AI applications that touch sensitive business data? Start with a governance framework.
OpenJDK proposals would provide Java implementations of a quantum-resistant module-latticed-based digital signature algorithm and key encapsulation mechanism.
Secure communications between web browsers and web servers depend on digital certificates backed by certificate authorities. What if the web browsers stop trusting your CA?
A recent survey by BlackBerry Limited finds tensions between innovation, project deadlines, and functional safety.
Automation should serve as a foundational principle for approaching every security challenge. Here’s how automation can help you secure software development processes.
The Open Regulatory Compliance Working Group will assist open source participants with adhering to global regulatory requirements such as the EU's Cyber Resilience Act.
Biometric authentication isn’t invulnerable, but it’s significantly more secure than traditional passwords. Here’s why.
JFrog Runtime Security integrates with JFrog Artifactory to identify the source and owner of vulnerable packages and prioritize remediation.
In the beginning, we identified two major types of software supply chain attacks and nine minor types. The world keeps insisting on a broader definition.
You can’t just fire up a web browser and explore all your APIs running in production. We need discovery tools built for APIs.