channel company logo

Legit Security

Know Your Application Security Posture Is Legit - and Prove It.

Legit is a new way to manage your application security posture for security, product and compliance teams. With Legit, enterprises get a cleaner, easier way
to manage and scale application security and address risks from code to cloud. Built for the modern SDLC, Legit tackles the toughest problems facing
  • 1,266 Subscribers
  • 13 talks

Know Your Application Security Posture Is Legit - and Prove It.

Legit is a new way to manage your application security posture for security, product and compliance teams. With Legit, enterprises get a cleaner, easier way
to manage and scale application security and address risks from code to cloud. Built for the modern SDLC, Legit tackles the toughest problems facing
  • 1,266 Subscribers
  • 13 talks

On-demand talks

Demo: Finding Secrets Beyond Source Code

Demo: Finding Secrets Beyond Source Code

Secrets are a serious and prevalent security risk, but most secrets scanning tools don’t get the job done. Instead of making life easier for security, most tools
dump piles of false positives or fail to address secrets beyond source code. Watch this demo with Liam McCamley, Senior Solutions Architect at Legit
Security. Get a first-hand look how Legit enables you to: - Find secrets exposure across your SDLC – from Git history to build logs and shared workspaces – …

The Top 6 Unknown SDLC Risks Legit Uncovers

The Top 6 Unknown SDLC Risks Legit Uncovers

What risks are new Legit customers surprised to find lurking in their SDLCs? In this webinar, we’ll share the top unknown SDLC risks we uncover, and offer
practical tips and advice on keeping them out of your SDLC. Legit Senior Technical Account Manager Amanda Alvarez, a former DevSecOps engineer will walk
attendees through the following common SDLC risks: - Exposed secrets - Unknown build assets - Misconfiguration of build assets - Developer permissions s…

The Open-Source Trap: How Legacy Secrets Scanners Fail Against Modern Threats

The Open-Source Trap: How Legacy Secrets Scanners Fail Against Modern Threats

Secrets are leaking everywhere from the developer environment today. Sensitive, business-critical secrets, cloud keys, API tokens, PII, and more are
routinely hardcoded into source code, stored in logs in plaintext, and reused and reshared across cloud services, productivity tools, and messaging apps. But
even as threat actors shift left to take advantage of sprawling secrets estates, the longstanding, open-source scanners that many security teams rely on to …

Innovating in Software Security: How to Take Back Control of Your SDLC with ASPM

Innovating in Software Security: How to Take Back Control of Your SDLC with ASPM

To deliver secure software development today, DevSecOps must be faster, more integrated, and more dynamic than ever before. But with increasing
environment complexity, the rise of generative AI, and a host of novel threats targeting developer pipelines and services, traditional AppSec strategies no
longer cut it. Watch this webinar with Joe Nicastro, Legit Security Field CTO, on “Innovating in AppSec: How to Take Back Control of Your SDLC with ASPM,” …

GitHub Actions Exposed: Securing Critical Code Automation that Runs Your Software Factory

GitHub Actions Exposed: Securing Critical Code Automation that Runs Your Software Factory

GitHub Actions can quickly hand attackers the keys to your company’s most critical code infrastructure — without the right controls and protections in place,
the implications are more severe than you may know. The Legit research team recently analyzed more than 2.5 million GitHub Actions workflow files
belonging to over 553,000 organizations and personal users. The team found that most GitHub Actions workflows are insecure in some way; they’re overly …

Proven Strategies to Safeguard Software Supply Chains from Catastrophe

Proven Strategies to Safeguard Software Supply Chains from Catastrophe

In today's rapidly evolving tech landscape, development environments have become increasingly intricate, presenting new challenges for application and
software security. As attackers shift their focus from traditional application targets to exploiting vulnerabilities within software supply chains, the stakes have
never been higher.   Join us for an insightful Fireside Chat on this topic at the 2024 Black Hat Summit, as Enterprise Strategy Group's Melinda Marks, Practic…

Securing Generative AI & Preventing Vulnerabilities with Legit Security

Securing Generative AI & Preventing Vulnerabilities with Legit Security

GenAI is revolutionizing industries by creating innovative solutions that transform how we interact with technology. However, as with any powerful tool, GenAI
introduces unique risks and vulnerabilities that need robust security measures. Join us for an insightful webinar where John Tierney, Field CTO at Legit
Security, will delve into the intricacies of securing Generative AI. This session will provide critical insights into the market importance of GenAI, practical use …

Application Security Posture Management: The New AppSec Revolution

Application Security Posture Management: The New AppSec Revolution

Application Security Posture Management (ASPM) is here to revolutionize AppSec for greater efficiency and effectiveness, and in its latest Innovation Insights
report, Gartner predicts that over 40% of organizations will adopt ASPM by 2026.  ASPM promises to solve issues organizations have been experiencing
first-hand – a lack of visibility into complex developer environments, siloed security responsibilities across multiple teams and lack of context into security is…