Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Rise of cloud agnosticism: challenges and myths

In the evolving landscape of technology, cloud agnosticism has seen increasing traction. This refers to the ability to design and deploy applications seamlessly on any cloud platform, whether that be AWS, GCP, Azure, or others. Cloud agnosticism is essentially a design principle that advocates for flexibility, portability, and interoperability, allowing organizations to use multiple cloud providers without being tied to the services or infrastructure of any single one.

Cloud Integrations: JFrog Achieves AWS PrivateLink Service Ready Validation

At JFrog, we talk about being universal and too integrated to fail. In addition to more than 30 technologies and package types supported natively, this also means supporting our customers in their hybrid and cloud infrastructure. One such key integration capability for customers leveraging Amazon Web Services (AWS) is AWS PrivateLink.

One Identity, AWS Directory Service Strengthen Partnership and Announce Active Roles Integration

One Identity announces significant expansion of their strategic partnership with the general availability of a seamless integration between One Identity Active Roles and AWS Directory Service. This collaboration strengthens security and enhances efficiency, and reinforces the principle of least privilege, offering customers best-in-class control over their Azure Active Directory and AWS Directory Service environments.

Is Traditional EDR a Risk to Your Cloud Estate?

Organizations are transitioning into the cloud at warp speed, but cloud security tooling and training is lagging behind for the already stretched security teams. In an effort to bridge the gap from endpoint to cloud, teams are sometimes repurposing their traditional endpoint detection and response (EDR) and extended detection and response (“XDR) on their servers in a “good enough” approach.

Why Traditional EDRs Fail at Server D&R in the Cloud

In the age of cloud computing, where more and more virtual hosts and servers are running some flavor of Linux distribution, attackers are continuously finding innovative ways to infiltrate cloud systems and exploit potential vulnerabilities. In fact, 91% of all malware infections were on Linux endpoints, according to a 2023 study by Elastic Security Labs.