Security | News, how-tos, features, reviews, and videos
Did our focus on IaaS security come at the expense of SaaS security? Know what to guard against, especially excessive user permissions and misconfigured UIs, APIs, and integrations.
JFrog’s new Xray Secrets Detection uncovered active access tokens in popular open-source software registries including Docker, npm, and PyPI. Here are our findings and takeaways.
Attempted breaches are on the rise and cloud security professionals are forced to play 'Whac-A-Mole' with attacks. Are you ready to rethink your cloud security strategy yet?
Developer-first security is the future in the cloud. Because the responsibility for cloud security rests with developers and devops teams, not IT security.
Hybrid work would not be possible without cloud computing. However, enterprises should address these mistakes before they kill productivity.
The good, the bad, and the ugly of a decade of cloud computing: Security and agility are definite wins, but cost and complexity are serious drawbacks.
Beginning with a security audit and threat modeling exercises, the Rust language security initiative draws on staff and support from the OpenSSF and JFrog.
Go’s new support for vulnerability management pairs the Go vulnerability database with tooling that analyzes a codebase and surfaces known vulnerabilities.
Designing and deploying a single cloud architecture may not prepare you to take on a multicloud, especially where security and cost optimization are concerned.
Blockchains are evolving, and consensus mechanisms are at the heart of it. Here's a quick look at the range of decentralized validation and authentication mechanisms in use today.