Archive: Blogs
Timeline
All shook up, IFS unlocks asset-based pricing for enterprise AI
We've often talked about the (perhaps fabled) future land where software is sold on outcomes-based pricing. A...
JFrog Artifactory: how to secure binaries in the AI era
The explosion of AI-generated code is creating a security crisis that traditional manual approaches simply ca...
IGEL breaks down the wall between IT and OT
OT machines too often run unchecked and unsecured on their own isolated islands. But if IGEL has its way, tho...
Securing AI agents: Okta’s approach to identity governance
As artificial intelligence agents are set to become more autonomous in enterprise environments, organizations...
HPE sees the network as a security sensor: what does that mean?
During the RSAC 2026 Conference in San Francisco, we talked to no fewer than three representatives from HPE. ...
Observability warehouses, the next structural evolution for telemetry
Observability has been a prevalent trend throughout the last decade’s worth of cloud computing development,...
Blind trust in hardware vendors is always a bad idea
Supply chain security now more important than ever
AI gives attackers superpowers, so defenders must use it too
As response window shrinks, AI becomes table stakes
Claude Code leak exposes many of Anthropic’s secrets
An Anthropic employee has (seemingly) inadvertently shared Claude Code’s source code publicly. Although the...