Menu

Insights from JFrog’s State of the Union Report

Insights from JFrog's State of the Union Report

The News: JFrog’s annual Software Supply Chain State of the Union report for 2024 reveals that most critical vulnerability scores are misleading, highlighting the need for a deeper understanding of software security risks. Read the full press release here.

Insights from JFrog’s State of the Union Report

Analyst Take: JFrog’s findings highlight the significant implications for developers in the current software development ecosystem. Developers are at the forefront of tackling these issues as security concerns rise in tandem with rapid innovation. The accuracy with which traditional vulnerability score metrics, such CVSS ratings, measure the true risk posed by exploits is falling short. When teams struggle to prioritize security fixes based on faulty severity assessments, the discrepancy frequently results in the misallocation of resources and delays in software development cycles.

Furthermore, JFrog’s analysis reveals an important finding: a sizable percentage of vulnerabilities that have been reported are not exploitable. This emphasizes how crucial it is for engineers to distinguish between theoretical vulnerabilities and those that pose real concerns. Making this distinction is essential to focusing attention on vulnerabilities that actually threaten user data and software integrity.

The increasing frequency of Denial of Service (DoS) attacks in contrast to Remote Code Execution (RCE) vulnerabilities highlights how security risks are changing. RCE vulnerabilities provide attackers with unauthorized access to critical backend systems, possibly jeopardizing sensitive data and system integrity, while DoS attacks have the ability to disrupt services. This change emphasizes how important it is for developers to mitigate RCE vulnerabilities first in order to prevent more severe breaches.

The constant struggle for developers is to strike a balance between security needs and productivity expectations. Development delays are caused in part by the lengthy approval processes for integrating new packages and libraries as well as the significant time required for vulnerability remediation. It is crucial to streamline security practices without compromising productivity, which calls for the development, security, and operations teams to work together to effectively integrate security into the software development lifecycle (SDLC).

Moreover, developers have both opportunities and challenges as a result of the widespread availability of security tools. Although these tools are useful for identifying and mitigating vulnerabilities, their widespread use may result in tool sprawl and higher levels of complexity. If developers want to improve productivity and optimize workflows, they should thoroughly assess and consolidate security solutions. Nonetheless, the industry’s hesitancy to fully adopt emerging technologies is evident in the cautious adoption of AI/ML-powered code generation tools. Developers navigating the changing software development landscape have to continue prioritizing finding a balance between utilizing AI/ML capabilities for increased security and limiting the potential risks associated with automated code production.

Developers are essential to tackling the challenges of enterprise software supply chain security in the face of rapid technological development. Through vigilant monitoring of emerging threats, the implementation of comprehensive security protocols, and the selective adoption of innovative techniques, developers can efficiently manage risks and foster innovation and productivity in software development initiatives.

Looking Ahead

The Software Supply Chain State of the Union report from JFrog provides insightful information about the opportunities and challenges that developers face in the fast-paced world of modern software development. Organizations need to take a sophisticated approach to risk assessment and mitigation as long as vulnerabilities prevail and security concerns persist. Developers should prioritize security measures while preserving innovation and productivity in their software development processes by utilizing the insights offered by the research.

Looking ahead, collaboration between the development and security teams will be critical to protecting software supply chains from new and emerging threats. Furthermore, implementing integrated security solutions and using AI/ML-powered technologies appropriately will be essential for improving resilience and reducing risks. Developers should expect an ongoing emphasis on comprehensive security protocols and the integration of innovative technologies in order to tackle the obstacles presented by emerging threats.

Developers can navigate these issues and ensure the integrity and security of their software assets in an increasingly interconnected world by being proactive and adaptable in the face of changing security landscapes.

Disclosure: The Futurum Group is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of The Futurum Group as a whole.

Other Insights from The Futurum Group:

Microsoft Announces New Demand Planning and Copilot Capabilities for Dynamics 365 Supply Chain Management – Futurum Tech Webcast – Interview Series

Ateliere Launches Media Supply Chain Analysis and Consulting Programs

o9 Solutions and AWS Advancing Collaboration for Efficiency

Author Information

With over 25 years of experience, Paul has a proven track record in implementing effective go-to-market strategies, including the identification of new market channels, the growth and cultivation of partner ecosystems, and the successful execution of strategic plans resulting in positive business outcomes for his clients.

Sam holds a Bachelor of Science degree in Management Information Systems and Business Analytics from Colorado State University and is passionate about leveraging her diverse skill set to drive growth and empower clients to succeed in today's rapidly evolving landscape.

Related Insights
Will Supermicro's Legal Crisis Shift Server Market Share to New Dell and HPE GPU Platforms?
March 27, 2026

Will Supermicro’s Legal Crisis Shift Server Market Share to New Dell and HPE GPU Platforms?

Brendan Burke, Research Director at Futurum, shares insights on how Supermicro's export crisis creates a GPU allocation opening for Dell and HPE, reshaping the AI server competitive landscape post-NVIDIA GTC...
Is Workflow AI Now Native After Microsoft Embeds Copilot in Power Platform?
March 27, 2026

Is Workflow AI Now Native After Microsoft Embeds Copilot in Power Platform?

Keith Kirkpatrick, Research Director at Futurum, examines Microsoft Copilot integration within Power Platform and how agentic workflows and process mining reshape enterprise application execution and decision-making....
Infosys Bets on P&C Insurance Depth With Stratus Acquisition
March 27, 2026

Infosys Bets on P&C Insurance Depth With Stratus Acquisition

Infosys agreed to acquire Stratus, a New Jersey tech firm specializing in property and casualty insurance, signaling a strategic shift toward domain-specific AI in regulated industries....
Can Palo Alto's Agentic NetOps Actually Kill the NOC Ticket?
March 27, 2026

Can Palo Alto’s Agentic NetOps Actually Kill the NOC Ticket?

Palo Alto Networks' agentic AI Troubleshooting Agent in Prisma SD-WAN enables autonomous network remediation, reducing resolution time from hours to minutes, marking AI-native networking's transition to production....
Infosys Bets on Anthropic to Survive the Automation Wave It Helped Build
March 27, 2026

Infosys Bets on Anthropic to Survive the Automation Wave It Helped Build

Infosys expands its Anthropic partnership to develop enterprise AI agents, signaling that its labor arbitrage model faces disruption and reflecting an urgent pivot toward AI-first service delivery....
Red Piranha's Global InfoSec Win: Can Smaller Vendors Break the Cybersecurity Stalemate?
March 26, 2026

Red Piranha’s Global InfoSec Win: Can Smaller Vendors Break the Cybersecurity Stalemate?

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.