Platform
Pricing
Company
Customers
Learn
Login
Start Free
Book a Demo
The born-left product security blog
Jit's blogs contains guides to implement the best product security tools, how to build security into your development culture, and best practices for understanding and mitigating product security risk.
All
Velocity
Security
DevOps
More
Featured
Announcing Context Engine: Focus on the alerts that matter
Today, I’m delighted to announce the release of Jit’s Context Engine, which uses the runtime context of vulnerabilities to automatically prioritize the top security risks in our cu
Security
Playing Around with AWS-Vault for Fun & Profit
Introduction AWS-Vault is an excellent open-source tool by 99Designs that enables developers to store AWS credentials in their machine keystore securely. After using it for a while at Jit, I decided t
Security
Lessons Learned About Secrets Protection After the Sisense Breach
Sisense is a popular monitoring tool that enables users to monitor business metrics from multiple third-party sources in a single dashboard. On April 10, the company informed customers that the sensit
Security
Vulnerability Assessments vs. Penetration Testing: Key Differences
Vulnerability Assessments vs. Penetration Testing: Key Differences In the race for technological innovation, companies often sprint toward product launches but find themselves in a marathon when fixin
Security
Unzipping the XZ Backdoor and Its Lessons for Open Source
Originally posted on The New Stack. By now, you have probably heard about the recently discovered backdoor into versions 5.6.0 and 5.6.1 of the tarballs of the xz utilities, a popular compression/deco
Security
CVE 2023-2033: What is it, and how to fix it?
Zero-day vulnerabilities are the surprise no developer wants to get. Because these security flaws are unknown to developers, they have zero days to prepare or mitigate the vulnerability before an expl
Security
GenAI-Powered Digital Threads Part 1 - A Novel Approach to AI Security
Engineering organizations today are becoming increasingly data-reliant. All of our tools and stacks accrue large amounts of data that are distributed among tools and platforms––from our code and our
Security
GenAI-Powered Digital Threads Part 2 - A Novel Approach to AI Security
In our previous blog post, we spoke about borrowing the concept of Digital Threads from the manufacturing world, in order to aggregate disparate company data into a single source––a knowledge graph.
Security
Angular Security – 8 Measures to Implement Today
There’s lots to love about JavaScript frameworks. From data binding to routing mechanisms, their capabilities push the boundaries of software development and enable dev teams to reduce precious develo
Security
Designing Secure Tenant Isolation in Python for Serverless Applications
About This content is brought to you by Jit - a platform that simplifies continuous security for developers, enabling dev teams to adopt a ‘minimal viable security’ mindset, and build secure cloud app
Previous
1
2
3
Next