Welcome to the JFrog Blog

All Blogs

Get to Know JFrog ML

Get to Know JFrog ML

AI/ML development is getting a lot of attention as organizations rush to bring AI services into their business applications. While emerging MLOps practices are designed to make developing AI applications easier, the complexity and fragmentation of available MLOps tools often complicates the work of Data Scientists and ML Engineers, and lessens trust in what’s being…
Accelerating Enterprise AI Development: A Guide to the JFrog-NVIDIA NIM Integration

Accelerating Enterprise AI Development: A Guide to the JFrog-NVIDIA NIM Integration

Enterprises are racing to integrate AI into applications, yet transitioning from prototype to production remains challenging. Managing ML models efficiently while ensuring security and governance is a critical challenge. JFrog’s integration with NVIDIA NIM addresses these issues by applying enterprise-grade DevSecOps practices to AI development. Before exploring this solution further, let's examine the core MLOps…
JFrog and Hugging Face Join Forces to Expose Malicious ML Models

JFrog and Hugging Face Join Forces to Expose Malicious ML Models

ML operations, data scientists, and developers currently face critical security challenges on multiple fronts. First, staying up to date with evolving attack techniques requires constant vigilance and security know-how, which can only be achieved by a dedicated security team. Second, existing ML model scanning engines suffer from a staggering rate of false positives. When a…
FINMA Compliance: DevSecOps Strategies for Securing the Swiss Financial Ecosystem

FINMA Compliance: DevSecOps Strategies for Securing the Swiss Financial Ecosystem

The Swiss Financial Market Supervisory Authority (FINMA) sets strict requirements to ensure that financial institutions operating in Switzerland maintain robust security and operational resilience. FINMA’s guidelines are crucial for protecting sensitive financial data, minimizing risks, and maintaining trust in the Swiss financial ecosystem. As part of that, software supply chain security plays an essential role…
Introducing Support for Hex Packages

Introducing Support for Hex Packages

JFrog has always prioritized universality, ensuring software development teams have true freedom of choice. Core to the JFrog Platform, JFrog Artifactory is the world’s most versatile artifact manager, natively supporting nearly 40 package types. After taking in valuable feedback from the developer community, we’re thrilled to discuss how we’re further expanding our universe with the…
Building Cloud Excellence: How JFrog Supports the AWS Well-Architected Framework

Building Cloud Excellence: How JFrog Supports the AWS Well-Architected Framework

In today’s hybrid infrastructure landscape, migrating applications to the cloud unlocks significant financial and technological benefits. Whether internal or external, these applications require robust, efficient infrastructure. Cloud providers like Amazon Web Services (AWS), Google Cloud, and Microsoft Azure offer frameworks to help organizations build better systems. AWS Well-Architected helps cloud architects design secure, high-performing, resilient,…
JFrog’s Release Lifecycle Promotion vs. Build Promotion

JFrog’s Release Lifecycle Promotion vs. Build Promotion

We here at JFrog have long advocated for promoting - never rebuilding - release candidates as they advance across the stages of your SDLC. For many JFrog customers, that meant using JFrog’s “Build Promotion” capabilities. Now you can level up your CI/CD game with promotions using Release Lifecycle Management (RLM)! In this article we’ll show…
JFrog Simplifies Compliance with India’s new CERT SBOM Guidelines

JFrog Simplifies Compliance with India’s new CERT SBOM Guidelines

Overview The Indian Computer Emergency Response Team (CERT-In) is the national agency responsible for addressing cybersecurity incidents in India. Established in 2004 and operating under the Ministry of Electronics and Information Technology (MeitY), CERT-In is dedicated to enhancing the security of India's digital infrastructure. The organization plays a vital role in preventing, detecting, and responding…
Everything You Need to Know About Evil Proxy Attacks and MFA Bypass

Everything You Need to Know About Evil Proxy Attacks and MFA Bypass

Attackers use a malicious proxy server to intercept, monitor, and manipulate communication between a client and a legitimate server, often to steal credentials, session tokens, or other sensitive information. Some services provide "Phishing-as-a-Service" (PhaaS), offering attackers ready-made tools and infrastructure to conduct phishing campaigns. These services simplify the process of deceiving individuals into providing sensitive…
JFrog Achieves ISO/IEC 27001:2022

JFrog Achieves ISO/IEC 27001:2022

As part of JFrog's mission to continuously develop and uphold the highest industry standards in cyber security, we are excited to announce that we have successfully upgraded our ISO certification to the latest version, ISO/IEC 27001:2022. This achievement reinforces our dedication to protecting your data with the high standards of cyber and information security. Understanding…