Syndicated Blog

Legit Security Blog
Insights from Legit Security. Secure your organization’s software factory (code, pipelines, infrastructure and people) for fast and secure software releases.
The Risks Lurking in Publicly Exposed GenAI Development Services

The Risks Lurking in Publicly Exposed GenAI Development Services

Get our research team's analysis of the security of GenAI development services ...
ESG Survey Report Finds AI, Secrets, and Misconfigurations Plague AppSec Teams

ESG Survey Report Finds AI, Secrets, and Misconfigurations Plague AppSec Teams

Find out how your peers are managing application security challenges.  ...
Preview of State of GitHub Actions Security Report: Security of GH Workflows Building Blocks

Preview of State of GitHub Actions Security Report: Security of GH Workflows Building Blocks

| | AppSec, Best Practices
Understand the security status of GitHub Actions workflows and how to mitigate the risk ...
Security of Custom GitHub Actions

Security of Custom GitHub Actions

| | AppSec, Best Practices, CISO
Get details on Legit's research on the security of custom GitHub Actions ...
Announcing The State of GitHub Actions Security Report

Announcing The State of GitHub Actions Security Report

| | AppSec, Best Practices, CISO
Get details on Legit's research on the security of GitHub Actions ...
What You Need to Know About the EU Cyber Resilience Act

What You Need to Know About the EU Cyber Resilience Act

Understand what the CRA entails and how to comply.    ...
What Is Application Security Posture Management (ASPM): A Comprehensive Guide

What Is Application Security Posture Management (ASPM): A Comprehensive Guide

Get details on what ASPM is, the problems it solves, and what to look for.   ...
Security Challenges Introduced by Modern Software Development

Security Challenges Introduced by Modern Software Development

Understand how modern software development is changing security threats.   ...
Don’t Protect Your Software Supply Chain, Defend the Entire Software Factory

Don’t Protect Your Software Supply Chain, Defend the Entire Software Factory

Find out why a too-narrow definition of "supply chain" may be hindering software security efforts.  ...

Application Security Check Up