image of blog Joe Nicastro

Joe Nicastro

Showing all posts by Joe Nicastro

Legit Security | Microsoft Under Attack by Russian Cyberattackers. Understand how these attackers are operating and what their tactics mean for security strategies.

Microsoft Under Attack by Russian Cyberattackers

March 15, 2024

Microsoft Under Attack by Russian Cyberattackers. Understand how these attackers are operating and what their tactics mean for security strategies.

Read More
Legit Security | Understanding the White House Report on Secure and Measurable Software. Get details on the report, how to address it, and how Legit can help.  

Understanding the White House Report on Secure and Measurable Software

March 08, 2024

Understanding the White House Report on Secure and Measurable Software. Get details on the report, how to address it, and how Legit can help.  

Read More
Legit Security | How to Address CISA Attestation. Get details on the CISA Attestation, how to address it, and how Legit can help.  

How to Address CISA Attestation

February 22, 2024

How to Address CISA Attestation. Get details on the CISA Attestation, how to address it, and how Legit can help.  

Read More
Legit Security | How ASPM helps AppSec and Developers reduce friction and shift security left using deep context from the Legit Security ASPM solution.

Rethinking shift left: How a lack of context creates unnecessary friction between AppSec and Developers

November 27, 2023

How ASPM helps AppSec and Developers reduce friction and shift security left using deep context from the Legit Security ASPM solution.

Read More

Request a demo including the option to analyze your own software supply chain.