Legit Security Blog

Explainers

The Top 8 Cloud Application Threats in 2023

In this blog post, we'll discuss 8 of the top threats targeting cloud applications in 2023. Taking steps to protect your cloud applications against...

Read More

What is a Secure SDLC?

SDLC (Software Development Life Cycle) is a breakdown of all the stages involved in software creation. There are distinct SDLC stages and many...

Read More

What are the Five Elements of the NIST Cybersecurity Framework?

A cybersecurity framework is a group of documents outlining guidelines, security-related standards, and best practices to help organizations manage...

Read More

A DevOps Security Tutorial for Digital Business Leaders

DevOps is a great approach to improve the speed and efficiency of software development, but there are practices that your team can implement to...

Read More

What Are Immutable Tags And Can They Protect You From Supply Chain Attacks?

Artifacts, such as container images, are referenced during the development lifecycle using tags – a readable short name (usually a version like...

Read More

Latest GitHub OAuth Tokens Attack Explained and How to Protect Yourself

On Friday April 15, GitHub Security announced it had detected the compromise of OAuth access tokens issued to Heroku and Travis-CI integrations to...

Read More

What is an SBOM? SBOM explained in 5 minutes

SBOM stands for Software Bill Of Materials: a nested description of software artifact components and metadata. This information can also include...

Read More

Detecting Secrets in Your Source Code

Exposed secrets in source code pose a risk to you, your team and your entire organization. But what are secrets exactly? How do they become exposed?...

Read More

What Is SLSA? SLSA Explained In 5 Minutes

You’ve probably heard that software supply chain attacks are increasing rapidly and that the damage can be devastating. Both business and security...

Read More

Stay Connected

 Please join our mailing list for future updates and announcements.