News
CISOs are on the look out for novel attack vectors or future breaches of the upstream assets partners use to deliver their ...
When bad code makes it into the software supply chain, the consequences can be deeply unpleasant – as was the case in several recent high-profile cases name-checked in the paper’s title: "Closing the ...
This is a key theme in Amazon Business’s 2025 State of Procurement Data report, which finds that supply chain disruption is ...
Malicious campaigns targeting code used by developers of AI applications underscore the need to develop comprehensive risk-based programs around software dependencies and components. Widespread ...
Overall, two fifths (41 percent) of all global thefts occurred in-transit, 21 percent from warehouses, four percent at ...
A new report out today from software supply chain company JFrog Ltd. warns that an expansion of artificial intelligence ...
According to RL data, open-source software remained a key element of supply chain risk in 2024. For example, incidents of exposed development secrets via publicly accessible, open-source packages ...
Threat actors are continuously evolving their tactics to exploit vulnerabilities and gain unauthorized access. That increasingly involves attacks targeting the software supply chain. The post The ...
JFrog Ltd (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, today ...
The General Services Administration designed this blanket purchase agreement for other agencies to acquire tools that can ...
Morningstar brands and products Company Portfolio ...
Share this on X (a.k.a. Twitter): @JFrog shares research findings in their Software Supply Chain State of the Union 2025 report. Discover the emerging #DevSecOps trends, risks & best practices to ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results