Blog
Contact Us
Sign In
Platform
Application Security Posture Management (ASPM)
Secrets Detection & Prevention
Continuous Compliance and SBOM
Software Supply Chain Security (SSCS)
AI Security Posture Management (AI-SPM)
AppSec Vulnerability Management
Integrations
Why Legit
Customers
Resources
Blog
Resource Library
Open Source w/ Legitify
Events
ASPM Knowledge Base
Company
Partners
About Legit
Press Releases
In the News
Careers
Start A Free Trial
Book A Demo
Platform
Application Security Posture Management (ASPM)
Secrets Detection & Prevention
Continuous Compliance and SBOM
Software Supply Chain Security (SSCS)
AI Security Posture Management (AI-SPM)
AppSec Vulnerability Management
Integrations
Why Legit
Customers
Resources
Resources
Blog
Resource Library
Open Source w/ Legitify
Events
ASPM Knowledge Base
Company
Partners
About Legit
Press Releases
In the News
Careers
Request a Demo
The ASPM Knowledge Base
Search The ASPM Knowledge Base
(By title, tag, category)
Posts about Application Vulnerabilities
View All
What Are Insecure Direct Object References (IDOR)? Types and Prevention
What Is an LDAP Injection? Types and Prevention
Threat Modeling Frameworks: When and How to Use Them
10 Application Security Threats and Mitigation Strategies
What Is Reflected XSS? Prevent Cross-Site Scripting Attacks
What Is Password Spraying? How to Protect Against It
Application Security Metrics and KPIs for Security Posture
What DOM-Based XSS Is and How to Prevent It
8 Cloud Vulnerabilities That Could Disrupt Your Operations
What Is an Application Vulnerability? 8 Common Types
Request a Demo
Request a demo including the option to analyze your own software supply chain.
Request a Demo