Syndicated Blog

Legit Security Blog
Insights from Legit Security. Secure your organization’s software factory (code, pipelines, infrastructure and people) for fast and secure software releases.
What You Need to Know About the XZ Utils Backdoor

What You Need to Know About the XZ Utils Backdoor

| | AppSec, Legit, threats
Understand how to respond to the announcement of the XZ Utils backdoor ...
How to Get the Most From Your Secrets Scanning

How to Get the Most From Your Secrets Scanning

Secret scanning is essential for unlocking next-level software supply chain security. Get tips & best practices for optimal secret scanning to secure your code ...
Microsoft Under Attack by Russian Cyberattackers

Microsoft Under Attack by Russian Cyberattackers

Understand how these attackers are operating and what their tactics mean for security strategies ...
Don't Miss These Emerging Trends in Cloud Application Security

Don’t Miss These Emerging Trends in Cloud Application Security

| | AppSec, Best Practices
Get details on trends and best practices in cloud application security ...
Using AI to Reduce False Positives in Secrets Scanners

Using AI to Reduce False Positives in Secrets Scanners

| | AppSec, Best Practices, Legit
Get an overview of how secrets scanners work, and how Legit is dramatically reducing secret-scanning false positives ...
Understanding the White House Report on Secure and Measurable Software

Understanding the White House Report on Secure and Measurable Software

Get details on the new White House ONCD report, how to address it, and how Legit can help ...
How to Address CISA Attestation

How to Address CISA Attestation

Get details on the CISA Attestation, how to address it, and how Legit can help ...
What to Look for in a Secrets Scanner

What to Look for in a Secrets Scanner

| | Best Practices
Find out the key capabilities of secret scanners and what to consider when searching for a solution.  ...
GenAI-Based Application Security 101

GenAI-Based Application Security 101

| | AppSec
Gain insights into GenAI applications and how they represent an innovative category of technology, leveraging Large Language Models (LLMs) at their core ...
Navigating the Shift: Unveiling the changes in PCI DSS version 4

Navigating the Shift: Unveiling the changes in PCI DSS version 4

| | AppSec, Compliance
Gain insights in the latest changes in PCI DSS version 4 with this quick overview, highlighting the primary changes and how to best prepare for them ...