Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Automating SOC 2 Application Security with Jit + Drata

Checking off application security requirements for SOC 2 compliance is often a burden for everyone involved. Security and GRC teams need to manually upload evidence to SOC2 compliance systems like Drata, while development teams suddenly need to use code security scanners that throw wrenches in the SDLC.

Introducing Workflows: Automate Security Alerting While Staying Focused on Real Risks

Security teams and developers are drowning in product security alerts. Every security scan generates a flood of issues, and manually reviewing, prioritizing, and assigning each one is time-consuming and inefficient. The result? Critical risks get buried in long backlogs, while developers waste time chasing issues that don’t actually introduce real risk.

Jit + Cyera: A Unified Approach to Protecting Your Most Sensitive Data

Today, Jit and Cyera are thrilled to announce an integration that will help address one of the most pressing challenges in cybersecurity: prioritizing code and cloud vulnerabilities according to the actual risk they introduce. Put simply, this integration will make it easy for security teams to pinpoint vulnerabilities (detected by Jit) that impact the security of your most sensitive data (monitored by Cyera). As a result, security teams.

Introducing Policies: Smarter Controls for Managing Security Findings

At Jit, we’re all about empowering developers to build secure software without compromising agility. But as teams scale, enforcing strong governance and compliance practices while enabling flexibility can be tricky. That’s why we’re thrilled to announce Policies, a new feature that lets you customize controls over who can ignore security findings in Jit. With Policies, you can ensure security findings are addressed appropriately based on risk, context, and compliance requirements.

Static Application Security Testing (SAST): What You Need to Know

Modern software applications operate within increasingly complex ecosystems, spanning multiple layers of the stack—from the user interface and application logic to APIs, databases, and third-party dependencies. Each layer introduces unique vulnerabilities, often requiring specialized domain expertise to identify and mitigate.

Announcing Opengrep: Continuing the Open-Source Mission for Static Code Analysis

At Jit, we are proud to announce our participation in a consortium of companies that have come together to launch Opengrep, a continuation of Semgrep’s groundbreaking OSS. Opengrep is born out of our shared commitment to keeping static code analysis open, accessible, and community-driven.

8 Best Practices When Using AWS Security Groups

Are you concerned about the security of your AWS environment? With over 73% of businesses having at least one critical security misconfiguration, it's essential to take proactive measures to protect your data and applications. While AWS is responsible for the security of the underlying infrastructure, you are responsible for securing your data and applications in the cloud.

Forget Mono Repo vs. Multi Repo - Building Centralized Git Workflows in Python

This blog article summarizes a talk given by David Melamed, Jit CTO, at Pycon DE & PyData 2022 in Berlin. In every software development project, before even writing the first line of code, you gotta pick an architecture for your repo. Picking an architecture is not easy. There are many tradeoffs that need to be considered and this choice will impact future development.

We Just Reduced our Security Scan Times by 80%

The success of any application or cloud security initiative depends on developer buy-in, so they can fix vulnerabilities before arriving in production. So why can it be challenging to empower developers to secure their code early? The answer is simple: security is usually slow. Developers are motivated to deliver innovative features faster than their competitors, so introducing new processes into the CI/CD pipeline that slow them down could understandably be met with resistance.

A Recap of the SF OWASP Meetup, Hosted by Semgrep and Jit

On February 15th, our friends at Semgrep hosted a meet up for the OWASP community at their beautiful office in San Francisco. Application security professionals and developers in the San Francisco tech community showed up to discuss what has been working for them, what isn’t working, and upcoming trends in the world of application security. In this short recap, we’ll explore some of the topics discussed by Semgrep’s Kyle Kelly and our very own Aviram Shmueli.