Kat Cosgrove of Minimus discusses retiring Ingress NGINX, maintainer burnout, security risks, Kubernetes governance, and what migration to Gateway API means for platform teams.
Lens Control Central allows enterprises to centralize and manage their security needs for large deployments.
Learn how Mirantis combines GitOps, chaos engineering, and automated remediation to build self-healing Kubernetes platforms that scale safely and reliably.
Learn all about Mirantis Rockoon, the open-source VMWare alternative that brings OpenStack and Kubernetes together.
Mitigant's Nils Karn and Thomas Fricke explore cloud attack emulation—real attacks in safe environments—to test resilience and improve security with high accuracy.
Mitsubishi UFJ e-Smart Securities has historically faced challenges around optimizing deployment and package management. By adopting the JFrog Software Supply Chain Platform, the company has transformed its approach to DevOps and realized significant improvements in security, efficiency, and speed.
Modern API security explained: why APIs are prime targets, common OWASP risks, runtime protection, AI anomaly detection, and secure-by-default cloud-native design.
Moore Threads stuns markets with a 400 percent surge on its Shanghai IPO debut, highlighting China’s accelerating push toward AI chip self-reliance and tech innovation.
Download the whitepaper now to take the first step towards a more collaborative, efficient software development lifecycle.
Meta's AI-powered auto-healing framework for Kubernetes improves reliability, reduces downtime, and enhances scalability.
Discover how Mysten Labs, pioneers of the Sui blockchain, transformed their AppSec by ditching an unreliable tool for Endor Labs. Learn how they achieved trusted findings, minimal developer friction, and faster remediation, enabling them to build the world's most secure blockchain.
This energy operator and facilitator oversees key national electricity and gas markets. By adopting the JFrog Platform, they transformed their software development operations and security practices, achieving significant operational efficiencies, enhanced security, and millions in cost savings.