InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

GitHub Actions Exposed: Securing Critical Code Automation that Runs Your Software Factory

Presented by

Noam Dotan, Security Researcher & AI Lead and Nick Hayes, Director of Product Marketing

About this talk

GitHub Actions can quickly hand attackers the keys to your company’s most critical code infrastructure — without the right controls and protections in place, the implications are more severe than you may know. The Legit research team recently analyzed more than 2.5 million GitHub Actions workflow files belonging to over 553,000 organizations and personal users. The team found that most GitHub Actions workflows are insecure in some way; they’re overly privileged, contain risky dependencies and misconfigurations, etc. Join this webinar to understand: - Key findings and consequences of our research into GitHub Actions security - How GitHub Actions workflows are exploited in the wild - Practical steps to harden your CI/CD pipelines and workflows and mitigate the risks lurking in your GitHub Actions activity
Legit Security

Legit Security

1317 subscribers13 talks
Know Your Application Security Posture Is Legit - and Prove It.
Legit is a new way to manage your application security posture for security, product and compliance teams. With Legit, enterprises get a cleaner, easier way to manage and scale application security and address risks from code to cloud. Built for the modern SDLC, Legit tackles the toughest problems facing security teams, including GenAI usage, proliferation of secrets and an uncontrolled dev environment. Fast to implement and easy to use, Legit lets security teams protect their software factory from end to end, gives developers guardrails that let them do their best work safely, and proves the success of the security program. This new approach means teams can control risk across the business – and prove it.
Related topics