Category List

Celebrating our 2024 open-source contributions

While Trail of Bits is known for developing security tools like Slither, Medusa, and Fickling, our engineering efforts extend far beyond our own projects. Throughout 2024, our team has been deeply engaged ...
Announcing the 2025 State of Application Risk Report

Announcing the 2025 State of Application Risk Report

Use the data and analysis in this report to prioritize your 2025 AppSec efforts ...
Bluesky AT Protocol: Building a Decentralized TikTok

Bluesky AT Protocol: Building a Decentralized TikTok

The Bluesky AT Protocol aims to decentralize social media, empowering users with control over their data and interactions. By shifting power away from centralized platforms like TikTok, it paves the way for ...
Biden data brokers

The Good, the Bad, and the Politics of Biden’s Cybersecurity Order

President Biden in the last few days of his administration issued an expansive cybersecurity EO that touched on issues like software supply chain, AI, and foreign adversaries. Many approved of the effort, ...
Security Boulevard
How to Prevent Risk From Unknown Build Assets

How to Prevent Risk From Unknown Build Assets

| | AppSec, CISO, DEVOPS, Legit
Find out why unknown build assets is a growing problem and how Legit can help ...
encryption vs tokenization

Tokenization vs Encryption: How to Choose the Best Data Security Approach

As digital systems and data continue to expand in complexity, protecting sensitive information has become crucial—not only to prevent costly breaches but also to meet strict privacy regulations. Two popular methods for ...
Legit Scans for Secrets in ServiceNow ITSM Tickets

Legit Scans for Secrets in ServiceNow ITSM Tickets

| | AppSec, CISO, DEVOPS, Legit
Get details on Legit's ability to scan for secrets in ServiceNow tickets ...