{"id":48576,"date":"2022-09-23T17:29:53","date_gmt":"2022-09-23T17:29:53","guid":{"rendered":"http:\/\/7b714938-b5c1-4b54-b000-16e01237c256"},"modified":"2022-09-23T17:29:53","modified_gmt":"2022-09-23T17:29:53","slug":"jit-and-zap-improving-programming-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/","title":{"rendered":"Jit and ZAP: Improving programming security"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/0c84af47cc2fb4751204949aa9e14cb681f17762\/2019\/09\/18\/8f87cb8a-ed53-4a39-b4e9-65f49e70b0a7\/hacking-red-and-blue-digital-binary-code-matrix.jpg?auto=webp&amp;width=768\" alt=\"Abstract visualization of web data and hacking\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/7e40711210a0d0de5648d88c90a839c1ce90169a\/2019\/09\/18\/8f87cb8a-ed53-4a39-b4e9-65f49e70b0a7\/hacking-red-and-blue-digital-binary-code-matrix.jpg?auto=webp&amp;width=1024\" alt=\"Abstract visualization of web data and hacking\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/1ca6dbdf941313132532db7e302ee4488c6a8f1c\/2019\/09\/18\/8f87cb8a-ed53-4a39-b4e9-65f49e70b0a7\/hacking-red-and-blue-digital-binary-code-matrix.jpg?auto=webp&amp;width=1200\" alt=\"Abstract visualization of web data and hacking\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/1ca6dbdf941313132532db7e302ee4488c6a8f1c\/2019\/09\/18\/8f87cb8a-ed53-4a39-b4e9-65f49e70b0a7\/hacking-red-and-blue-digital-binary-code-matrix.jpg?auto=webp&amp;width=1200\" alt=\"Abstract visualization of web data and hacking\" height=\"632.7427356484762\" width=\"1200\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">iStockphoto\/Getty Images<\/span><\/figcaption><\/figure>\n<p><a href=\"https:\/\/www.jit.io\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Jit<\/a>, a startup programming security company, dreams of being a top security power. To help make those dreams a reality, Jit recently hired Simon Bennetts, the founder of the world&#8217;s most popular web app security scanner, <a href=\"https:\/\/owasp.org\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Open Web Application Security Project (OWASP<\/a>) <a href=\"https:\/\/owasp.org\/www-project-zap\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Zed Attack Proxy (ZAP)<\/a>. <\/p>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-small c-shortcodeImage-pullRight\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/jit-and-zap-improving-programming-security\/\" alt=\"Simon Bennetts, ZAP founder\" height=\"768\" width=\"768\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Simon Bennetts<\/span><\/figcaption><\/figure>\n<p>At Jit, Bennetts will continue to develop the open-source Zap. A <a href=\"https:\/\/www.microfocus.com\/en-us\/what-is\/dast\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">dynamic application security testing (DAST)<\/a> penetration testing tool, ZAP takes a pragmatic approach to finding security problems.&nbsp;<\/p>\n<p>It runs simulated attacks on an application from the user side to find vulnerabilities. It works as a &#8220;man-in-the-middle proxy,&#8221; so it intercepts and inspects messages sent between the browser and web application. When results appear that aren&#8217;t expected, these can be used to narrow down and identify security vulnerabilities. ZAP was already being used as one of the underlying Jit scanning programs. <\/p>\n<p>Now don&#8217;t think for one moment that Jit plans on turning Zap into a commercial program per se. Jit&#8217;s plan, as it has been from the start, is to deliver &#8220;Just-In-Time Security&#8221; for developers. It does this by providing an orchestration framework, plug-in architecture that unifies the best, open-source security tools such as <a href=\"https:\/\/owasp.org\/www-project-dependency-check\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">OWASP Dependency-Check<\/a>, <a href=\"https:\/\/docs.npmjs.com\/cli\/audit\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">npm-audit<\/a>, <a href=\"https:\/\/github.com\/securego\/gosec\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">GoSec<\/a>, <a href=\"https:\/\/github.com\/zricethezav\/gitleaks\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Gitleaks<\/a>, <a href=\"https:\/\/github.com\/aquasecurity\/trivy\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Trivy<\/a>, and, of course, Zap into a simple and consistent developer workflow. <\/p>\n<p><strong>Also:<\/strong>&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/programming-languages-its-time-to-stop-using-c-and-c-for-new-projects-says-microsoft-azure-cto\/\" rel=\"follow\"><strong>It&#8217;s time to stop using C and C++ for new projects, says Microsoft Azure CTO<\/strong><\/a><\/p>\n<p>The point, said David Melamed, Jit&#8217;s CTO, is that, &#8220;Security leaders adding more tools, faster than their teams can implement, tune and configure them where risk and spend efficiency becomes out of alignment.&#8221; The solution? &#8220;Implement <a href=\"https:\/\/www.zdnet.com\/article\/devsecops-what-it-is-and-how-it-can-help-you-innovate-in-cybersecurity\/\" rel=\"follow\">DevSecOps<\/a> where product security is delivered as a service into the <a href=\"https:\/\/practical-tech.com\/2018\/07\/10\/continuous-integration-and-delivery-tool-basics\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">CI\/CD pipeline<\/a>, with a product security plan that follows <a href=\"https:\/\/git-scm.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Git<\/a> principles.&#8221; <\/p>\n<p>Where Bennetts sees ZAP fitting in, he said in an interview Thursday, is, &#8220;The challenges around modern web applications is there is so much you need to understand to protect them. The code security tools have been too siloed, we need to combine these tools to give us the full picture of what needs to be done to secure them.&#8221;<\/p>\n<div class=\"c-shortcodePinbox-textList c-shortcodePinbox-textList_floating g-border-thin-light-bottom g-outer-spacing-top-medium g-outer-spacing-bottom-medium\">\n<h3 class=\"c-sectionHeading\">Open Source<\/h3>\n<\/p><\/div>\n<p>He continued, &#8220;Sure, developers can set all these things up themselves with open source. But the thing is, there are so many tools, and you must learn about them and configure them.&nbsp;<\/p>\n<p>&#8220;Or, with Jit, we provide an easy-to-use, combined solution that makes it much easier for companies to come on board and go OK, these are the things we need; get them, set them up, tune them, and run them, to get the results with everything in one place.&#8221; <\/p>\n<p>&#8220;Jit&#8217;s vision,&#8221; Melamed added, in short, &#8220;is to provide developers with contextually relevant and just-in-time access to the knowledge and tools they need to secure the apps they build across the entire application stack, all while accelerating the development process.&#8221; <\/p>\n<p><strong>Also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/chainguard-releases-wolfi-a-linux-undistribution\/\" rel=\"follow\"><strong>Chainguard releases Wolfi, a Linux &#8216;undistribution&#8217;<\/strong><\/a><\/p>\n<p>Bennetts could have gone elsewhere. He confided, &#8220;I considered working with many companies with proprietary products, but my heart belongs to open source. Fortunately, I found in Jit a brilliant team who are deeply committed to open source and to empowering developers to build secure applications.&#8221; <\/p>\n<p>As for ZAP itself, Bennets said he and the rest of the developer team are working hard on the next release. It will include a faster and improved networking stack that can work with modern protocols such as <a href=\"https:\/\/http2.github.io\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">HTTP\/2<\/a>. Its spiders, which are used for exploring applications, will also work better with more web programs and include the ability to work with application programming interfaces (API)s. This next version will be out later this year.&nbsp; <\/p>\n<p><strong>Related stories:<\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/jit-and-zap-improving-programming-security\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Simon Bennetts, the founder of the world&#8217;s famous web app security scanner, OWASP ZAP, has joined the Jit code security company. Both will be the better for it.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-48576","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Jit and ZAP: Improving programming security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jit and ZAP: Improving programming security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-23T17:29:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/1ca6dbdf941313132532db7e302ee4488c6a8f1c\/2019\/09\/18\/8f87cb8a-ed53-4a39-b4e9-65f49e70b0a7\/hacking-red-and-blue-digital-binary-code-matrix.jpg?auto=webp&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jit-and-zap-improving-programming-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jit-and-zap-improving-programming-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Jit and ZAP: Improving programming security\",\"datePublished\":\"2022-09-23T17:29:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jit-and-zap-improving-programming-security\\\/\"},\"wordCount\":620,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jit-and-zap-improving-programming-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/1ca6dbdf941313132532db7e302ee4488c6a8f1c\\\/2019\\\/09\\\/18\\\/8f87cb8a-ed53-4a39-b4e9-65f49e70b0a7\\\/hacking-red-and-blue-digital-binary-code-matrix.jpg?auto=webp&amp;width=1200\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jit-and-zap-improving-programming-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jit-and-zap-improving-programming-security\\\/\",\"name\":\"Jit and ZAP: Improving programming security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jit-and-zap-improving-programming-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jit-and-zap-improving-programming-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/1ca6dbdf941313132532db7e302ee4488c6a8f1c\\\/2019\\\/09\\\/18\\\/8f87cb8a-ed53-4a39-b4e9-65f49e70b0a7\\\/hacking-red-and-blue-digital-binary-code-matrix.jpg?auto=webp&amp;width=1200\",\"datePublished\":\"2022-09-23T17:29:53+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jit-and-zap-improving-programming-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jit-and-zap-improving-programming-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jit-and-zap-improving-programming-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/1ca6dbdf941313132532db7e302ee4488c6a8f1c\\\/2019\\\/09\\\/18\\\/8f87cb8a-ed53-4a39-b4e9-65f49e70b0a7\\\/hacking-red-and-blue-digital-binary-code-matrix.jpg?auto=webp&amp;width=1200\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/1ca6dbdf941313132532db7e302ee4488c6a8f1c\\\/2019\\\/09\\\/18\\\/8f87cb8a-ed53-4a39-b4e9-65f49e70b0a7\\\/hacking-red-and-blue-digital-binary-code-matrix.jpg?auto=webp&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jit-and-zap-improving-programming-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Jit and ZAP: Improving programming security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Jit and ZAP: Improving programming security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/","og_locale":"en_US","og_type":"article","og_title":"Jit and ZAP: Improving programming security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-09-23T17:29:53+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/1ca6dbdf941313132532db7e302ee4488c6a8f1c\/2019\/09\/18\/8f87cb8a-ed53-4a39-b4e9-65f49e70b0a7\/hacking-red-and-blue-digital-binary-code-matrix.jpg?auto=webp&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Jit and ZAP: Improving programming security","datePublished":"2022-09-23T17:29:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/"},"wordCount":620,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/1ca6dbdf941313132532db7e302ee4488c6a8f1c\/2019\/09\/18\/8f87cb8a-ed53-4a39-b4e9-65f49e70b0a7\/hacking-red-and-blue-digital-binary-code-matrix.jpg?auto=webp&amp;width=1200","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/","url":"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/","name":"Jit and ZAP: Improving programming security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/1ca6dbdf941313132532db7e302ee4488c6a8f1c\/2019\/09\/18\/8f87cb8a-ed53-4a39-b4e9-65f49e70b0a7\/hacking-red-and-blue-digital-binary-code-matrix.jpg?auto=webp&amp;width=1200","datePublished":"2022-09-23T17:29:53+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/1ca6dbdf941313132532db7e302ee4488c6a8f1c\/2019\/09\/18\/8f87cb8a-ed53-4a39-b4e9-65f49e70b0a7\/hacking-red-and-blue-digital-binary-code-matrix.jpg?auto=webp&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/1ca6dbdf941313132532db7e302ee4488c6a8f1c\/2019\/09\/18\/8f87cb8a-ed53-4a39-b4e9-65f49e70b0a7\/hacking-red-and-blue-digital-binary-code-matrix.jpg?auto=webp&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/jit-and-zap-improving-programming-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Jit and ZAP: Improving programming security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48576"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48576\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}