
AssumeRoleWithWebIdentity WHAT?! Solving the Github to AWS OIDC InvalidIdentityToken Failure Loop


NPM Audit: 5 Ways to Use it to Protect Your Code


The Developer's Guide to Using Gitleaks to Detect Hardcoded Secrets


DORA Metrics: Delivery vs. Security


8 Best Practices When Using AWS Security Groups


The DevOps Guide to AWS Security Tools

.png)
The In-Depth Guide to OWASP's Top 10 Vulnerabilities


The Developer's Guide to Using NPM Audit to Create a Dependency Tree


Top 10 Continuous Security Monitoring (CSM) Tools for 2023


How to Run an API Scanner with OWASP ZAP

.png)
How to use OWASP ASVS to Protect Web Applications

.png)
How to Automate OWASP ZAP


How to Test Permissions Policy Header Configuration with ZAP


6 Essential Steps to Use OWASP ZAP for Penetration Testing

.png)
Simon Bennetts, Creator & Lead Maintainer of OWASP ZAP Joins Jit


Forget Mono Repo vs. Multi Repo - Building Centralized Git Workflows in Python

.png)
What is Minimum Viable Security (MVS) and how does it improve the life of developers?

.jpg)
Yippee! We've Raised $38.5M!


Dev-Native Product Security- Here’s Why Born-Left Security Is Taking Over Shift-Left

.png)
Launching our first open source collaboration with Gitleaks


Designing Secure Tenant Isolation in Python for Serverless Apps


Is Balancing Dev-Owned Security and Velocity Possible?


Guest Post: A CIO/CISO Perspective on Agile Security and the Modern DevOps in the Startup Era


Bootstrapping a Secure AWS as-Code Environment - Your MVS Checklist


Born left vs. shift left security and your 1st security developer/architect


5 Open source product-security tools for developers you should know of


Open Policy Agent as a Control Engine - DevSecOps Conf 2022 Recap

Instantly achieve continuous product security, from day 0