Welcome to the JFrog Blog

All Blogs

Building a Governed AI Model Supply Chain: Integrating AWS SageMaker and the JFrog Platform

Building a Governed AI Model Supply Chain: Integrating AWS SageMaker and the JFrog Platform

Amazon SageMaker accelerates the process of training and deploying machine learning models. However, as AI adoption scales from individual experiments to enterprise-wide production, the focus of leading Fortune 500 software development operations and security teams must shift from pure velocity to governance. The question is no longer just "Can we ship this model?" but "How…
Unlock the Power of Agents with JFrog’s Skills and MCP Tools

Unlock the Power of Agents with JFrog’s Skills and MCP Tools

Agents are writing code, suggesting dependencies, and reviewing PRs, without any knowledge about your trusted package sources, security posture, or governance policies. When agents operate without supply chain context, they introduce risk, create rework, and weaken the guardrails DevSecOps teams rely on to ship with confidence. JFrog is changing that. Today, we’re launching an official…
Automate NIST SSDF Compliance: A Technical Guide to Policy as Code in JFrog AppTrust

Automate NIST SSDF Compliance: A Technical Guide to Policy as Code in JFrog AppTrust

For many engineering and security teams, NIST SP 800-218 (Secure Software Development Framework, or SSDF) compliance feels like a hurdle that is too difficult to overcome. To meet these and other emerging regulations and be effective in today’s DevSecOps environment, organizations are moving toward codifying these standards into machine-readable rules, also known as Policy as…
You Can’t Trust What You Can’t Trace

You Can’t Trust What You Can’t Trace

Picture this: Your security team finishes an AI vendor evaluation. The offering looks ironclad, with content filtering, output guardrails, and a stellar red-teaming report. Everyone leaves the meeting satisfied, and another governance box is checked. Six months later, a production incident hits. An AI agent, powered by a model your team "vetted," starts executing unauthorized…
Recap: Women in DevSecOps Fireside Chat — Leveraging AI in Software Delivery

Recap: Women in DevSecOps Fireside Chat — Leveraging AI in Software Delivery

In celebration of International Women's Month and the 2026 theme #GiveToGain, JFrog hosted a virtual fireside chat on March 19, 2026: Women in DevSecOps: Leveraging AI in the Software Delivery Lifecycle. Moderated by Shubha Gururaja Rao, Director of Solution Engineering at JFrog, the panel brought together two trailblazing technical leaders — Christine Tran, Head of…
AzureML and JFrog: Securing the Model Lifecycle

AzureML and JFrog: Securing the Model Lifecycle

Azure Machine Learning (AzureML) is a powerhouse for model experimentation and high-scale compute. However, for most organizations, the challenge isn’t building models; it’s the complex journey from a notebook to a secure, governed, and production-ready application. When models and dependencies reside in unmanaged silos, you lose the traceability required for production. This fragmentation creates Shadow…
Navigating DORA Compliance: Software Development Requirements for Financial Services Companies

Navigating DORA Compliance: Software Development Requirements for Financial Services Companies

Note: This blog was originally published in July 2024 and updated on an annual basis. It was most recently updated in April 2026. Regulatory compliance is a common and critical part of today's rapidly evolving financial services landscape. One new regulation that EU financial institutions must adhere to is the Digital Operational Resilience Act (DORA),…
AI Models Won’t Pick Sides in the Security War. Governance and Policy Will.

AI Models Won’t Pick Sides in the Security War. Governance and Policy Will.

Two significant software supply chain cybersecurity attacks, seven days apart, with one hundred and eighty million weekly downloads between them. The chaos from development teams to the boardroom is real. And the pace is only going to get faster. Much, much faster... On March 24, the LiteLLM Python package, the proxy through which millions of…
Governance That Ships: Embedding Policy as Code Into Your System of Record

Governance That Ships: Embedding Policy as Code Into Your System of Record

Proving compliance is a necessity, but in a world of tightening regulations, the path to compliance is currently paved with spreadsheets, screenshots, and manual attestations. We call this the "Audit Tax", the millions of dollars and thousands of people hours spent not just integrating security, but on proving you are handling security. With the advent…