Blogs about Best Practices (2)
Content Type
Sign up for our newsletter

GitHub Security Best Practices Your Team Should Be Following
This article will explain why security and GitHub should go hand in hand and describes a few best practices we believe any organization using GitHub should employ to reduce GitHub security risks.
Read More
Forget about DevOps, It’s Time to Adopt the DevSecOps Mindset
Debunk common DevSecOps myths and discover why understanding the actual role of DevSecOps is essential for modern security and development practices.
Read More
What Are Immutable Tags And Can They Protect You From Supply Chain Attacks?
Some tags cannot be trusted to reference the same object all the time, and can be changed without the users’ knowledge, opening the door to a supply chain attack.
Read More
Vulnerable GitHub Actions Workflows Part 2: Actions That Open the Door to CI/CD Pipeline Attacks
We examine a bug we’ve found in a popular third-party GitHub action and how it could lead to your SDLC pipeline being attacked. Read more to improve GitHub security and secure your software supply chain.
Read More
Vulnerable GitHub Actions Workflows Part 1: Privilege Escalation Inside Your CI/CD Pipeline
Learn how Legit Security discovered a vulnerable GitHub actions workflow. Get details on the vulnerability and and what you can do to mitigate it.
Read MoreRequest a Demo
Request a demo including the option to analyze your own software supply chain.