Platform
Pricing
Company
Customers
Learn
Login
Start Free
Book a Demo
The born-left product security blog
Jit's blogs contains guides to implement the best product security tools, how to build security into your development culture, and best practices for understanding and mitigating product security risk.
All
Velocity
Security
DevOps
More
Featured
Open Policy Agent as a Control Engine - DevSecOps Conf 2022 Recap
About This content is brought to you by Jit - a platform that simplifies continuous security for developers, enabling dev teams to adopt a ‘minimal viable security’ mindset, and bu
News
Announcing GitLab support: Empower developers to secure everything they code in GitLab
Today, I’m thrilled to announce Jit’s full support for GitLab, which will significantly expand our ability to execute our mission to empower every developer to secure everything they code. This new in
Cloud
A Primer on Idempotence for AWS Serverless Architecture
In programming, the term idempotence may sound like a complex and arcane concept reserved for mathematical discussions or computer science lectures. However, its relevance stretches far beyond academi
Security
Playing Around with AWS-Vault for Fun & Profit
Introduction AWS-Vault is an excellent open-source tool by 99Designs that enables developers to store AWS credentials in their machine keystore securely. After using it for a while at Jit, I decided t
App Sec Best Practices
A Step-by-Step Guide to Preventing Javascript Injections
If over 40 major banks can be the target of JavaScript injection attacks, let’s be honest – so can you. In 2023, a malware campaign using this attack method affected 50,000 user sessions across more t
DevOps
How to Add Log4J Dependencies to Maven Projects
Logging was once just a best practice to help you understand what's happening inside your applications. Now, any security expert worth their salt will tell you that you can’t build a security plan wit
Development
12 Pros and Cons of Microsoft (Azure) Sentinel
Let’s keep it real: security compliance often makes your DevOps team feel strained. This burden spans multiple security sub-domains, such as information, network, and endpoint security, and specific s
Development
7 Essential Steps to Correctly Calculate Change Failure Rate
Let’s be honest: some software development changes are bound to fail. The increasing reliance on software systems means that the frequency and complexity of changes are constantly increasing. While yo
Velocity
20 Best VS Code Themes in 2024
With nearly 14 million monthly VS Code users and new features like remote development, collaboration, and developer personas, the VS Code editor—one of coders' IDE sweethearts—remains as strong as eve
Security
Announcing Context Engine: Focus on the alerts that matter
Today, I’m delighted to announce the release of Jit’s Context Engine, which uses the runtime context of vulnerabilities to automatically prioritize the top security risks in our customers’ cloud appli
Previous
1
2
3
4
5
6
7
Next