image of blog Tal Zacks

Tal Zacks

Showing all posts by Tal Zacks

Get details on this recent supply chain attack and how to avoid falling victim to similar attacks.

The Ultralytics Supply Chain Attack: How It Happened, How to Prevent

February 19, 2025

Get details on this recent supply chain attack and how to avoid falling victim to similar attacks.

Read More
Legit Security | What to Look for in a Secrets Scanner. Find out the key capabilities of secrets scanners and what to consider when searching for a solution. 

What to Look for in a Secrets Scanner

February 21, 2024

What to Look for in a Secrets Scanner. Find out the key capabilities of secrets scanners and what to consider when searching for a solution. 

Read More

Request a demo including the option to analyze your own software supply chain.