Operations | Monitoring | ITSM | DevOps | Cloud

Shift-left And Scale Security With The Power Of JFrog And Google

What does it mean to “shift left”? How can you scale security effectively as you do? These are growing questions corporations and developers are facing in a distributed, global economy. In this webinar you will learn how the amazing combination of GCP and JFrog allows dynamic workflows and automated quarantine processes, continuous scanning of production artifacts, integration with the broader business, and how you can scale all of these solutions rapidly in your fast-paced environment.

Detecting DGA Activity in Network Data with Elastic ML - Oct 1, 2020 Elastic Stockholm Meetup

After infecting a target machine, many malicious programs need to communicate with a command & control server ( C & C) that is controlled by the malware author. In order to avoid detection and subvert defensive measures, malware authors employ domain generation algorithms (DGA), which enable the malware to generate hundreds or thousands of new domains, one of which is then registered by the malware author as the location of the C&C server.

Best Practices: Onboarding Jfrog Xray

JFrog Xray is a Software Composition Analysis tool (SCA) which is tightly integrated with JFrog Artifactory to ensure security and compliance governance for the organization binaries throughout the SDLC. This video provides best practices learned from customers for successfully deploying JFrog Xray into your organization and performing a real Shift-Left. It will focus on two keys to success, 1. involving R&D and 2. starting small and working in cycles.