- Blog
- Authors
- Joe Nicastro
Joe Nicastro
Showing all posts by Joe Nicastro
How to Reduce Risk From Misconfigured Build Assets
How to Reduce Risk From Misconfigured Build Assets. Get steps to prevent risky misconfigurations in your SDLC.
Read MoreSoftware Security Best Practices: Where to Focus First
Software Security Best Practices: Where to Focus First. Get our recommendations on where to focus your software security efforts.
Read MoreSecurity Challenges Introduced by Modern Software Development
Security Challenges Introduced by Modern Software Development. Understand how modern software development is changing security threats.
Read MoreSecuring the Gateway: Why Protecting Build Systems Is Crucial in Modern Software Development
Securing the Gateway: Why Protecting Build Systems Is Crucial in Modern Software Development. Understand why securing build systems is as important as securing production systems.
Read MoreMicrosoft Under Attack by Russian Cyberattackers
Microsoft Under Attack by Russian Cyberattackers. Understand how these attackers are operating and what their tactics mean for security strategies.
Read MoreUnderstanding the White House Report on Secure and Measurable Software
Understanding the White House Report on Secure and Measurable Software. Get details on the report, how to address it, and how Legit can help.
Read MoreHow to Address CISA Attestation
How to Address CISA Attestation. Get details on the CISA Attestation, how to address it, and how Legit can help.
Read MoreRethinking Shift Left: Overcoming Context Gaps to Reduce AppSec & Developer Friction
Discover how ASPM reduces friction and shifts security left for AppSec and developers with deep context. Optimize your security strategy effectively.
Read MoreRequest a Demo
Request a demo including the option to analyze your own software supply chain.