.png)
AWS Community & Jit


What's New in Our Latest Jit Version


Kubescape & Jit

![How to use AWS Secrets Manager in the CLI [With Examples]](https://assets.website-files.com/61ec6c60334fc97ddd2b6dda/6461c9c498f338eb3fabcb34_How%20to%20use%20%20AWS%20Secrets%20Manager%20%20in%20the%20CLI%20%5BWith%20Examples%5D.png)
How to use AWS Secrets Manager in the CLI [With Examples]


Top 20 Best VScode Extensions for 2023


What is a PyPi Server and How To Set It Up Securely


Pulumi vs. Terraform: The IaC Showdown


How to Setup Semgrep Rules for Optimal SAST Scanning

.png)
And The Award(s) Go To... Jit!


How to calculate cycle time in software development


What is MTTD, and how can you crush it


10 Essential Steps for Web Application Security Testing


7 Essential Steps to Correctly Calculate Change Failure Rate


The Developer's Guide to The DevSecOps Toolchain


5 Essentials Every DevSecOps Professional Needs

%2C%20and%20why%20should%20devs%20care%3F.png)
What the Heck is SSDLC (Secure Software Development Lifecycle), and why should devs care?

.png)
How to Run a SAST Test with Bandit and JIT


AssumeRoleWithWebIdentity WHAT?! Solving the Github to AWS OIDC InvalidIdentityToken Failure Loop


NPM Audit: 5 Ways to Use it to Protect Your Code


The Developer's Guide to Using Gitleaks to Detect Hardcoded Secrets


DORA Metrics: Delivery vs. Security


8 Best Practices When Using AWS Security Groups


The DevOps Guide to AWS Security Tools

.png)
The In-Depth Guide to OWASP's Top 10 Vulnerabilities


The Developer's Guide to Using NPM Audit to Create a Dependency Tree


Top 10 Continuous Security Monitoring (CSM) Tools for 2023


How to Run an API Scanner with OWASP ZAP

.png)
How to use OWASP ASVS to Protect Web Applications

.png)
How to Automate OWASP ZAP


How to Test Permissions Policy Header Configuration with ZAP


6 Essential Steps to Use OWASP ZAP for Penetration Testing

.png)
Simon Bennetts, Creator & Lead Maintainer of OWASP ZAP Joins Jit


Forget Mono Repo vs. Multi Repo - Building Centralized Git Workflows in Python

.png)
What is Minimum Viable Security (MVS) and how does it improve the life of developers?

.jpg)
Yippee! We've Raised $38.5M!


Dev-Native Product Security- Here’s Why Born-Left Security Is Taking Over Shift-Left

.png)
Launching our first open source collaboration with Gitleaks


Designing Secure Tenant Isolation in Python for Serverless Apps


Is Balancing Dev-Owned Security and Velocity Possible?


Guest Post: A CIO/CISO Perspective on Agile Security and the Modern DevOps in the Startup Era


Bootstrapping a Secure AWS as-Code Environment - Your MVS Checklist


Born left vs. shift left security and your 1st security developer/architect


5 Open source product-security tools for developers you should know of


Open Policy Agent as a Control Engine - DevSecOps Conf 2022 Recap

Instantly achieve continuous product security, from day 0