Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hi My Name Is...the Not So Shady Side of Long-Term Memory in AI

In our last post, we explored how short-term memory enables agentic AI to hold a conversation that doesn’t reset after every message. That form of memory is all about flow—preserving context, user intent, and logic within a single session, even as interactions stretch across multiple turns. The longer the session, the more memory is required to maintain continuity. But not all memory needs to be verbose. Long-term memory serves a different purpose: persistence across sessions.

Inside CyberArk's Journey: What It Really Takes to Run RAG Agents in Production

As part of the DevSecNext AI series, Jit hosted Michael Balber—Principal Software Architect at CyberArk—for an in-depth session on how his team built and evaluated real Retrieval-Augmented Generation (RAG) agents in production. Unlike abstract discussions about LLMs and assistants, Michael shared a grounded view of what it takes to deploy agents that don’t just talk—they act.

From Python to Prompts: Becoming an AI-First Developer

As part of the DevSecNext AI series, Jit hosted Sahar Carmel—Principal AI Engineer at Flare—for an inside look into what it really takes to become an “AI-first” developer. With nearly a decade of experience in AI and machine learning, Sahar has been hands-on with copilots and agents long before they were mainstream. In this session, he walks through his radical shift in workflow: from writing code line-by-line to orchestrating prompts, tokens, and memory banks.

DevSec Next AI: AI-First Coding Workshop: Transforming Development Workflows

This workshop introduces experienced engineers to AI-first coding - a paradigm where AI tools generate most of the code while developers focus on direction and refinement. ​We'll explore how large language models work underneath the hood, revealing practical techniques to maximize their effectiveness in development workflows. ​Participants will learn the powerful "Plan-then-Act" methodology, discover how to leverage context windows effectively, and implement structured memory bank approaches to maintain project continuity.

Introducing the Jit + Upwind Integration: Real-Time Risk Context for Smarter Vulnerability Prioritization

In today’s fast-moving development environments, vulnerability backlogs are growing faster than AppSec teams can keep up. Scanners can surface thousands of issues, but which ones actually matter? With our new integration with Upwind, Jit’s AI Agents can incorporate runtime context detected by Upwind to help inform the continuous vulnerability triage process – enabling security teams to focus on the issues that matter most.

Announcing Jit's Integration with StackHawk: Runtime Visibility Meets Unified Vulnerability Management

We’re excited to announce a new integration with StackHawk—a developer-first DAST platform that brings runtime vulnerability testing directly into CI/CD workflows. With this integration, StackHawk findings are now ingested directly into Jit’s unified product security backlog—right alongside SAST, SCA, CSPM, secrets detection, and more.