Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

Why You Need Continuous Monitoring in Microservices

The microservices architecture is a software development strategy in which applications are broken down into smaller components called microservices. Each microservice is responsible for a specific task or business function and communicates with other microservices through application programming interfaces (APIs). Effectively managing a microservices application requires monitoring, much like any other IT infrastructure.

Secure by Default: Integrating GitGuardian in Vermeer's Software Development Lifecycle

Discover how Vermeer Corporation transformed its software development lifecycle to prioritize security. Learn about their journey from open-source tools to adopting GitGuardian for seamless, integrated secret scanning, enhancing DevSecOps with a 'Secure by Default' approach.

Hot Takes Episode 1: Protect your infrastructure from yourself

This Month’s Hot Take: Five renowned experts from the Kubernetes community - Kat Cosgrove, Divya Mohan, Frederick Kautz, Chris Short, and Kunal Kushwaha - will be discussing how human-error is the most significant threat to the security of your infrastructure, NOT hackers and ransomware.

Rego 103: Types of values and rules

This blog post series offers a gentle introduction to Rego, the policy language from the creators of the Open Policy Agent (OPA) engine. If you’re a beginner and want to get started with writing Rego policy as code, you’re in the right place. In this three-part series, we’ll go over the following: As a reminder, Rego is a declarative query language from the makers of the Open Policy Agent (OPA) framework.

DevNext Workshop 2: Innovate More...Remediate Less with JFrog DevOps-Centric Security

Watch the recording of the second workshop in the JFrog DevNext series - JFrog Security. The live audience experienced a real-time, hands-on event to help them develop their skills with the JFrog platform and how to easily secure their software supply chain.

Is your software supply chain secure?

As you begin developing your application to get services in front of your customers, you will notice a lot of processes and contributors are involved—from development to production. All of these processes and people are part of the “software supply chain.” It goes without saying that your software supply chain plays a crucial role in ensuring your business’s success.