Platform
Pricing
Company
Customers
Learn
Login
Start Free
Book a Demo
The born-left product security blog
Jit's blogs contains guides to implement the best product security tools, how to build security into your development culture, and best practices for understanding and mitigating product security risk.
All
Velocity
Security
DevOps
More
Featured
Announcing Context Engine: Focus on the alerts that matter
Today, I’m delighted to announce the release of Jit’s Context Engine, which uses the runtime context of vulnerabilities to automatically prioritize the top security risks in our cu
Security
Vulnerability Assessments vs. Penetration Testing: Key Differences
Vulnerability Assessments vs. Penetration Testing: Key Differences In the race for technological innovation, companies often sprint toward product launches but find themselves in a marathon when fixin
Security
Unzipping the XZ Backdoor and Its Lessons for Open Source
Originally posted on The New Stack. By now, you have probably heard about the recently discovered backdoor into versions 5.6.0 and 5.6.1 of the tarballs of the xz utilities, a popular compression/deco
Security
CVE 2023-2033: What is it, and how to fix it?
Zero-day vulnerabilities are the surprise no developer wants to get. Because these security flaws are unknown to developers, they have zero days to prepare or mitigate the vulnerability before an expl
DevOps
Enhance MongoDB Security for Atlas With Scalable Tenant Isolation
As a company building a SaaS security product, our inherent culture is not only focused on building best of breed security products for our users, but also ensuring that our systems, practices and wor
News
Jit Announces Open Source License Detection and Tracking
Earlier this year Jit announced Software Bill of Materials, which catalogs every open source component in your codebase – making it easy to understand if you are using an open source component that is
Security
GenAI-Powered Digital Threads Part 1 - A Novel Approach to AI Security
Engineering organizations today are becoming increasingly data-reliant. All of our tools and stacks accrue large amounts of data that are distributed among tools and platforms––from our code and our
Security
GenAI-Powered Digital Threads Part 2 - A Novel Approach to AI Security
In our previous blog post, we spoke about borrowing the concept of Digital Threads from the manufacturing world, in order to aggregate disparate company data into a single source––a knowledge graph.
Security
Angular Security – 8 Measures to Implement Today
There’s lots to love about JavaScript frameworks. From data binding to routing mechanisms, their capabilities push the boundaries of software development and enable dev teams to reduce precious develo
Cloud
Serverless Security Best Practices
Serverless architectures are the present (and future) of the cloud. Unlike traditional server-based models, serverless computing removes the infrastructure layer, enabling developers to focus solely o
Previous
1
2
3
4
5
6
7
Next