Operations | Monitoring | ITSM | DevOps | Cloud

JFrog

International Programmers Day 2021: Celebrating Those on the Front Lines of Digital Transformation

Happy International Day of the Programmer to the coders out there programming our digital world. It is your work and commitment that make the technical community thrive. You create the foundation for the innovations transforming the way we work and live.

Trusted SBOMs Delivered with the JFrog Platform and AWS

In this webinar, you’ll learn what an SBOM is, how it will benefit you, the misconceptions that exist around it and why it must be a key element of your software development life cycle's (SDLC) security and compliance. We’d also like to invite you to register for a joint JFrog-AWS webinar, where we’ll do a deep dive on SBOMs and share insights and best practices on SBOM creation and usage.

Critical Vulnerability in HAProxy (CVE-2021-40346): Integer Overflow Enables HTTP Smuggling

JFrog Security research teams are constantly looking for new and previously unknown vulnerabilities in popular open-source projects to help improve their security posture. As part of this effort, we recently discovered a potentially critical vulnerability in HAProxy, a widely used open-source load balancer proxy server that is particularly suited for very high traffic web sites and used by many leading companies.

Risk Mitigation Strategies for Tcp/IP Vulnerabilities in OT

JFrog in collaboration with Forescout Research Labs recently released the fourth study from Project Memoria - the industry’s most comprehensive study of TCP/IP vulnerabilities. INFRA:HALT covers 14 vulnerabilities affecting the popular closed source TCP/IP stack NicheStack. These vulnerabilities can cause Denial of Service or Remote Code Execution, allowing attackers to take targeted OT and ICS devices offline or take control of them.

The Fast & The Foolproof: Automation & Observability For DevOps

When software teams are charged with delivering higher quality software, faster - how do you effectively enable collaboration and observability while eliminating risk and manual processes? In this webinar, Ali Sardar from JFrog and Rob Jahn from Dynatrace will address how to overcome these challenges and unlock speed, observability, and automation across your DevOps lifecycle. In addition to best practices shared by our speakers, you will also see both products in action - meeting the critical needs of development and operations teams.

Scanning Dependencies in your sources using JFrog CLI and Xray

Security vulnerabilities and license violations should be found as early as possible and the earlier in the SDLC , the better. As part of the “ Shift Left ” vision, JFrog CLI and Xray now allow scanning dependencies directly from sources , on-demand, using a simple command line. This functionality allows benefiting from the same JFrog Xray vulnerability and license scanning capabilities, even before deployment to JFrog Artifactory.

The More the Merrier: Multi-Arch Docker Manifests with Buildx and Artifactory

The cloud native promise to be able to “build once, deploy anywhere” is nearly fulfilled. With containerization and Docker , we can build our applications and services for any environment, and set configuration at runtime. Well,… almost. Operating systems and apps still need to be compiled to execute on specific architecture types. Your software that’s been compiled for an AMD64 processor can’t run on an ARM-based machine, nor can one built for Linux run on Windows.

It's Time to Get Hip to the SBOM

The DevOps, IT security and IT governance communities will remember 2021 as the year when the Software Bill of Materials , or SBOM, graduated from a “nice to have” to a “must have.” Around for years, the SBOM has now become a critical DevSecOps piece, which everyone must thoroughly understand and incorporate into their SDLC (Software Development Lifecycle).

Monitoring Your Software Supply Chain On Kubernetes With Datadog And JFrog

You have mission-critical applications, JFrog and DataDog collaborated for a unified solution. Together, we ensure the dependable operation of your JFrog Platform by tracking usage data of Artifactory and Xray through Datadog’s modern SaaS-based log monitoring tool. We will show you how to boost efficiency of your DevOps pipeline to keep your software releases running seamlessly and securely.

A Year of Supply Chain Attacks: How to Protect Your SDLC

One of the most worrisome trends in cybersecurity today is the skyrocketing incidence of supply chain attacks, such as the ones that hit SolarWinds last year and Kaseya more recently. Because they focus on compromising software development and delivery, supply chain attacks have forced developers and DevOps teams to scramble for solutions. Unfortunately, supply chain attacks are particularly challenging to prevent, detect and remediate, and, because of their stealthy nature, are often devastating.