Blog

14 cybersecurity problems to solve in 30 days

14 cybersecurity problems to solve in 30 days

20 years ago when virtualization was starting, I asked this simple question to which I always got a complex answer: How many servers have you got? Fast-forward 20 years, and now I ask people “How many of these 8 asset classes do you have?” In fact, any new CxO asks me this question on their

Read More
Secure IDEs in the software supply chain

Secure IDEs in the software supply chain

At SwampUp, Iben explored Coder, a secure, managed IDE that integrates with JFrog for secure software supply chain. He discussed the importance of controlled developer environments, secure IDEs, and tools like SBOMs to mitigate risks from unmanaged code and “upstream bad actors” in the software supply chain.

Read More
Why an SBOM is an essential list of ingredients and not a four-letter word

Why an SBOM is an essential list of ingredients and not a four-letter word

Stay ahead of the game in software security with SBOMs and JFrog X-Ray. Learn how these tools can help you manage open-source components, ensure compliance, and protect your software supply chain.

Read More
Technical Report: Protecting your containers from themselves with AccuKnox

Technical Report: Protecting your containers from themselves with AccuKnox

SJULTRA’s exclusive technical report examines AccuKnox’s real-time security measures for containers and Kubernetes, distinguishing it from reactive alternatives. The report aims to educate readers on Cloud Native App Protection Platforms (CNAPP), highlighting the advantages of AccuKnox over competitors. Who is this Technical Report for? Technical and security practitioners who work with security tools will benefit

Read More