Snyk in 30: Developer-first security democast |
Jim Armstrong |
Mar. 02, 2023 |
1538 |
- |
Announcing the 2022 State of Open Source Security report from Snyk and the Linux Foundation |
Megan Moore |
Jun. 21, 2022 |
558 |
- |
New OpenSSL critical vulnerability: What you need to know |
Vandana Verma Sehgal |
Oct. 31, 2022 |
1282 |
2 |
Welcoming Samantha Wessels: Snyk’s New Vice President, EMEA Sales |
Dino DiMarino |
Jan. 10, 2022 |
409 |
- |
Modern VS Code extension development: The basics |
Mdu Sibisi |
Sep. 14, 2023 |
2775 |
- |
What kind of (security) dog are you? |
Belyn Lai |
Aug. 25, 2023 |
756 |
- |
Mitigating DOM clobbering attacks in JavaScript |
Keshav Malik |
Aug. 07, 2023 |
1806 |
- |
Improving coverage of cloud resources to reduce infrastructure drift |
Stephane Jourdan |
Mar. 23, 2022 |
2878 |
- |
CodeSecDays conference and more complete security coverage with GitGuardian |
Sarah Conway |
Aug. 10, 2023 |
989 |
- |
Snyk users don't have to worry about NVD delays |
Hadas Bloom |
Mar. 13, 2024 |
734 |
- |
Best practices for creating a modern npm package with security in mind |
Brian Clark |
Sep. 12, 2022 |
4985 |
2 |
Automate cloud compliance with Snyk IaC |
Lauren Place |
Feb. 07, 2023 |
591 |
- |
Discussions on improving security through chaos engineering |
Mariah Gresham |
Aug. 03, 2023 |
966 |
- |
How to strengthen security in your CI/CD pipeline |
James Konik |
Jul. 12, 2023 |
1800 |
- |
Snyk welcomes Helios, accelerating our ASPM vision with runtime insights |
Manoj Nair |
Jan. 16, 2024 |
874 |
- |
Introducing Snyk’s new Risk Score for risk-based prioritization |
Gur Shafriri, Benji Catabi-Kalman |
Aug. 17, 2023 |
1514 |
- |
Four easy ways to analyze your Java and Kotlin code |
Brian Vermeer |
Aug. 13, 2024 |
1982 |
- |
5 ways to improve security during digital transformation |
Erin Cullen |
Apr. 10, 2023 |
1007 |
- |
How to use AI for software development and cybersecurity |
Simon Maple |
Aug. 30, 2023 |
1755 |
- |
SnakeYaml 2.0: Solving the unsafe deserialization vulnerability |
Brian Vermeer |
Jun. 21, 2023 |
1205 |
- |
Finding YAML Deserialization with Snyk Code |
Calum Hutton |
Feb. 23, 2023 |
799 |
- |
Announcing customized role-based access controls for Snyk |
Daniel Berman |
Jun. 29, 2022 |
1237 |
- |
Snyk announces new Slack integration |
Sarah Conway |
May. 30, 2023 |
610 |
- |
Best practices for using AI in the SDLC |
Frank Fischer |
Jul. 19, 2023 |
749 |
- |
DevOpsDays Singapore 2024: Unmasking the security pitfalls in AI-generated code |
Hiroko Nakano |
Apr. 23, 2024 |
562 |
- |
Announcing the 2022 State of Cloud Security report from Snyk |
Megan Moore |
Sep. 13, 2022 |
757 |
- |
Engineering culture at Snyk: The values that support and drive our teams |
Sergey Vasilkov |
May. 08, 2023 |
2259 |
- |
SnykCon recap: Building a developer-focused AppSec program |
Mariah Gresham |
Jan. 27, 2022 |
1051 |
- |
"Dirty Pipe" Linux vulnerability and your containerized applications (CVE-2022-0847) |
Eric Smalling |
Mar. 09, 2022 |
1180 |
- |
Security lessons with a Snyk Ambassador |
Andres Haro |
Oct. 11, 2022 |
941 |
- |
3 tips from Snyk and Dynatrace’s AI security experts |
Sarah Conway |
Jan. 22, 2024 |
905 |
- |
Snyk Code, the only security tool chosen by developers in Stack Overflow's 2024 AI Search and Developer Tools survey |
Liqian Lim (林利蒨) |
Aug. 27, 2024 |
901 |
- |
Snyk Voices: Returning from maternity leave |
Tali Wahrhaft |
May. 06, 2022 |
2557 |
- |
How to prevent NullPointerExceptions in Java |
Lucien Chemaly |
Sep. 21, 2023 |
2669 |
- |
The ultimate guide to creating a secure Python package |
Gourav Singh Bais |
May. 08, 2024 |
3482 |
- |
Why you need a security companion for AI-generated code |
Liqian Lim (林利蒨) |
Oct. 25, 2023 |
1834 |
- |
Building Docker images in Kubernetes |
Vitalis Ogbonna |
May. 03, 2022 |
1557 |
- |
Snyk takes over Boston for SnykWeek |
Megan Moore |
May. 19, 2022 |
663 |
- |
Reduce risk to your supply chain with a software bill of materials (SBOM) |
Ryan Searle |
Jun. 07, 2023 |
881 |
- |
Cybersecurity Venture’s 2023 Software Supply Chain Attack Report |
Sydney Milligan |
Oct. 10, 2023 |
816 |
- |
Maximizing IAM security with AWS permissions boundaries and Snyk |
Wayne Crissman |
Jun. 26, 2023 |
1019 |
- |
Fun with ciphers in copycat Wordles |
Micah Silverman |
Feb. 02, 2022 |
903 |
- |
Data leak in the Netherlands: What developers should learn from this |
Brian Vermeer |
Mar. 31, 2023 |
753 |
- |
Identify vulnerabilities in your container images with Snyk’s enhanced Docker Desktop Extension |
LaToya Muff |
Apr. 11, 2023 |
363 |
- |
Learning from cloud transformation as we move to AI |
David Lugo |
May. 21, 2024 |
976 |
- |
Enabling policy as code (PaC) with OPA and Rego |
Eric Smalling |
Jan. 19, 2022 |
1522 |
- |
How to secure an S3 bucket on AWS? |
Liran Tal |
Jul. 12, 2024 |
3393 |
- |
Using Pulumi to automate the Snyk Kubernetes integration for containers |
Pas Apicella |
Feb. 09, 2022 |
2064 |
- |
How Axel Springer National Media and Tech achieved continuous security with Snyk |
Nina McClure |
Sep. 03, 2024 |
952 |
- |
You should be using HTTP Strict Transport Security (HSTS) headers in your Node.js server |
Raphael Mun |
Dec. 29, 2022 |
1729 |
- |
Secure Java URL encoding and decoding |
Jura Gorohovsky |
Aug. 14, 2023 |
3090 |
- |
Snyk named a Leader, placed highest in Strategy category in The Forrester Wave: Software Composition Analysis (SCA), Q2 2023 report |
Manoj Nair |
Jun. 13, 2023 |
770 |
- |
Nightfall AI and Snyk unite to deliver AI-powered secrets scanning for developers |
LaToya Muff |
Nov. 29, 2023 |
547 |
- |
SnykCon recap: Automation for better compliance and faster feedback loops |
Megan Moore |
Apr. 13, 2022 |
1189 |
- |
Krampus delivers an end-of-year Struts vulnerability |
Micah Silverman |
Jan. 02, 2024 |
1667 |
- |
3 tips for rebuilding a Docker image faster (and save CI seconds!) |
Liran Tal |
Dec. 28, 2023 |
2564 |
- |
Does AI lead to AppSec hell or nirvana? |
Erin Cullen |
Oct. 03, 2023 |
1040 |
- |
Node.js multithreading with worker threads series: worker_threads tutorial |
James Walker |
Oct. 25, 2022 |
2310 |
- |
PHP security in Snyk Code now GA |
DeveloperSteve Coochin |
Jan. 26, 2022 |
760 |
- |
Announcing Snyk AppRisk: Elevate your AppSec game with ASPM |
Daniel Berman |
Dec. 12, 2023 |
1464 |
- |
3 ways AppSec modernization is a game-changer for financial services |
Katie DeMatteis |
Sep. 03, 2024 |
782 |
- |
SnykLaunch April '23: C/C++ expansion, cloud and IaC updates, custom container security, new integrations, and more |
Jim Armstrong |
Apr. 04, 2023 |
1462 |
- |
New SEC cybersecurity rules put more onus on the CISO, not so much on directors |
Myke Lyons |
Aug. 03, 2023 |
1578 |
- |
Enhancing code to cloud security with the Common Configuration Scoring System |
Wayne Crissman |
Dec. 14, 2023 |
998 |
- |
Snyk welcomes Enso: Enabling security leaders to scale their AppSec program with ASPM |
Manoj Nair |
Jun. 07, 2023 |
972 |
- |
Leaky Vessels: Docker and runc container breakout vulnerabilities (January 2024) |
Jamie Smith |
Jan. 31, 2024 |
1729 |
41 |
Introducing Snyk’s partnership with Gemini Code Assist |
David Lugo |
Apr. 09, 2024 |
682 |
- |
Snyk is named a Strong Performer as a first-time entrant in the Forrester Wave™: Static Application Security Testing (SAST) Q3 2023 |
Peter McKay |
Sep. 20, 2023 |
696 |
- |
Day in the life of a food giant CISO |
Vandana Verma Sehgal |
Apr. 18, 2024 |
668 |
- |
Join "The Big Fix" to secure your projects with Snyk and earn cool swag |
Liran Tal |
Feb. 09, 2022 |
1029 |
- |
Snyk & Atlassian: How to embed security in AI-assisted software development |
LaToya Muff |
Feb. 14, 2024 |
1030 |
- |
Integrating Snyk Code SAST results in your ServiceNow workflows |
Sarah Conway |
May. 07, 2024 |
514 |
- |
Three reasons to invest in an ASPM solution in 2024 |
Julia Kraut |
Dec. 12, 2023 |
610 |
- |
With Love, Your Applications |
Krysta Williams-Timm |
Feb. 14, 2024 |
373 |
- |
Snyk named a 2022 Gartner Peer Insights Customers’ Choice for Application Security Testing |
Tony Sleva |
Oct. 04, 2022 |
382 |
- |
Three trends shaping software supply chain security today |
Erin Cullen |
Aug. 22, 2024 |
923 |
- |
How to add Playwright tests to your pull request CI with GitHub Actions |
Liran Tal |
Oct. 14, 2022 |
2546 |
- |
Using insecure npm package manager defaults to steal your macOS keyboard shortcuts |
Yagiz Nizipli |
Jun. 28, 2023 |
1102 |
- |
Protestware is trending in open source: 4 different types and their impact |
Benji Catabi-Kalman |
Mar. 22, 2022 |
1185 |
- |
Fetch the Flag CTF 2022 writeup: Roadrunner |
Giovanni Funchal |
Nov. 10, 2022 |
1138 |
- |
AI quality: Garbage in, garbage out |
Michael Biocchi |
Jun. 11, 2024 |
730 |
- |
How to secure JavaScript applications right from the CLI |
Gideon Idoko |
Oct. 24, 2023 |
2412 |
- |
Happy 1st Birthday, Snyk Code! |
Frank Fischer |
May. 06, 2022 |
1368 |
- |
10 best practices for securely developing with AI |
Simon Maple |
Sep. 27, 2023 |
3204 |
- |
Snyk top 10 code vulnerabilities report |
Mariah Gresham |
May. 18, 2023 |
424 |
1 |
Analyzing the PwnKit local privilege escalation exploit |
Kyle Suero |
Jan. 29, 2022 |
726 |
- |
Setting up the Docker image scan GitHub Action |
Mohammad-Ali A'râbi |
May. 19, 2023 |
1076 |
- |
Getting started with PHP static analysis in 2024 |
Liran Tal |
Mar. 21, 2024 |
2431 |
- |
Introducing the Snyk App for Compass: A complete view of software component risk |
LaToya Muff |
Oct. 05, 2023 |
662 |
- |
How to prevent XPath injection attacks |
Marcelo Oliveira |
May. 10, 2023 |
2175 |
- |
Securing your SBOM on Google Cloud |
David Lugo |
Mar. 28, 2024 |
983 |
- |
More accurate than GPT-4: How Snyk’s CodeReduce improved the performance of other LLMs |
Eric Fernandez |
May. 07, 2024 |
1245 |
- |
These aren’t the npm packages you’re looking for |
DeveloperSteve Coochin |
May. 04, 2022 |
1141 |
- |
Snyk’s guide to disclosing pronouns |
Mariah Gresham, Alex Fallon |
Jun. 09, 2022 |
774 |
- |
Can AI write secure code? |
Frank Fischer |
May. 03, 2023 |
2244 |
- |
Snyk finds 200+ malicious npm packages, including Cobalt Strike dependency confusion attacks |
Kirill Efimov |
May. 24, 2022 |
2807 |
3 |
Introducing parlay, a tool for enriching SBOMs |
Gareth Rushgrove |
Jun. 07, 2023 |
773 |
- |
360 degrees of application security with Snyk |
Soumen Mukherjee |
Apr. 24, 2024 |
1273 |
- |
How to keep an HTTP connection alive for 9 hours |
Micah Silverman |
Oct. 23, 2023 |
2391 |
3 |
Congratulations to Snyk’s 2022 CRN Women of the Channel |
Carey Stanton |
May. 09, 2022 |
740 |
- |
How to build a secure API gateway in Node.js |
Florian Rappl |
Dec. 28, 2022 |
2647 |
- |
Response to the Enduring Security Framework (ESF) Guide for Developers |
Gareth Rushgrove |
Sep. 03, 2022 |
602 |
- |
Creating SBOMs with the Snyk CLI |
Brian Vermeer |
Feb. 08, 2024 |
1348 |
- |
Vulnerability: runc process.cwd and leaked fds container breakout (CVE-2024-21626) |
Rory McNamara |
Jan. 31, 2024 |
1114 |
3 |
Ethical hacking techniques |
Vandana Verma Sehgal |
Jun. 05, 2023 |
1713 |
- |
Alert: LaughTilYouCry ransomware sabotages npm package (with puns) |
Mariah Gresham |
Apr. 01, 2022 |
529 |
- |
Snykers share wellness tips for mental health awareness month |
Belyn Lai |
May. 30, 2023 |
706 |
- |
Snyk Partner Speaks series: True DevSecOps with Snyk and Dynatrace |
Sarah Conway |
Jun. 08, 2023 |
177 |
- |
Snyk enhances ServiceNow with comprehensive insights into vulnerabilities in open source software |
Marco Morales |
Jan. 24, 2023 |
633 |
- |
The security course missing from higher education |
Michael Biocchi |
Jul. 12, 2022 |
955 |
- |
Snyk ranked #20 on 2022 Forbes Cloud 100 list |
Jeff Yoshimura |
Aug. 09, 2022 |
341 |
- |
Container images simplified with Ko |
Eric Smalling |
Oct. 10, 2022 |
3025 |
1 |
Snyk Ranked #19 on 2023 Forbes Cloud 100 List |
Peter McKay |
Aug. 08, 2023 |
430 |
- |
Going beyond “shift left” to extend AppSec in all directions |
Ben Desjardins |
Jul. 09, 2024 |
968 |
- |
Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub |
Vandana Verma Sehgal |
Jun. 22, 2023 |
399 |
- |
Snyk Partner Speak Video Series Puts Spotlight on New Integrations |
Sarah Conway |
Apr. 12, 2023 |
181 |
- |
How to build a modern DevSecOps culture: Lessons from Jaguar Land Rover and Asda |
Brian Piper |
Feb. 21, 2024 |
1209 |
- |
Panel recap: Breaking Bad Security Habits with Corey Quinn |
Erin Cullen |
Dec. 20, 2022 |
985 |
- |
Amplifying AAPI Voices to Honor Asian American Pacific Islander Heritage Month |
Belyn Lai, Yos Pang |
May. 25, 2023 |
1495 |
- |
NPM security: preventing supply chain attacks |
Liran Tal |
Nov. 08, 2022 |
3307 |
1 |
Integrating the Snyk Language Server with IntelliJ IDEs |
Arvyd Paeglit |
Jun. 17, 2024 |
344 |
- |
Black Hat Asia customer panel recap: How to lead DevSecOps adoption |
Brian Piper |
Sep. 18, 2023 |
821 |
- |
Recap: Stress-Free Security for Devs and Ops on AWS |
David Lugo |
Apr. 03, 2023 |
1341 |
- |
Polyfill supply chain attack embeds malware in JavaScript CDN assets |
Liran Tal |
Jun. 26, 2024 |
1892 |
- |
The npm faker package and the unexpected demise of open source libraries |
Liran Tal |
Sep. 02, 2022 |
2339 |
- |
Snyk Fetch the Flag CTF 2023 writeup: Audiopolis |
John Hammond |
Nov. 30, 2023 |
278 |
- |
Securing the digital future: Reviewing the Biden-Harris administration's National Cybersecurity Strategy |
Vandana Verma Sehgal |
Mar. 20, 2023 |
713 |
- |
A security expert’s view on Gartner’s generative AI insights |
Liqian Lim (林利蒨) |
Aug. 07, 2024 |
1729 |
- |
Snyk CLI: Introducing Semantic Versioning and release channels |
Chintan B. |
Apr. 30, 2024 |
930 |
- |
Cheat sheet: Meeting security compliance standards |
Mariah Gresham |
Sep. 15, 2022 |
784 |
- |
How to make a mock API server in JavaScript |
David Ekete |
Oct. 20, 2022 |
2038 |
1 |
Call for action: Exploring vulnerabilities in Github Actions |
Elliot Ward, Rory McNamara, Raul Onitza-Klugman |
Jun. 06, 2024 |
3977 |
- |
How Snyk can help secure supply chains per Executive Order M-21-30 |
Vandana Verma Sehgal |
Sep. 29, 2022 |
1767 |
1 |
Session management security: Best practices for protecting user sessions |
Okoth Pius |
Jul. 11, 2023 |
2703 |
1 |
Data loss prevention for developers |
Annabel Gauci |
May. 24, 2023 |
2103 |
2 |
Snyk brings infrastructure as code security to HashiCorp Terraform Cloud |
Marco Morales |
May. 04, 2022 |
762 |
- |
Top 5 scary AWS misconfigurations |
Shilpi Bhattacharjee |
Oct. 31, 2022 |
816 |
- |
Snyk and Atlassian deepen partnership with Snyk security in Jira Software |
Jill Wilkins |
Feb. 08, 2023 |
412 |
- |
10 modern Node.js runtime features to start using in 2024 |
Liran Tal |
May. 29, 2024 |
5030 |
2 |
Snyk and AWS announce native Amazon EKS support directly from the AWS Management Console |
David Lugo |
Jun. 12, 2024 |
418 |
- |
5 Node.js security code snippets every backend developer should know |
Liran Tal |
Feb. 28, 2024 |
3106 |
- |
Introducing the ASPM Masterclass |
Erin Cullen |
Mar. 12, 2024 |
504 |
- |
Dependency injection in Python |
Lucien Chemaly |
Oct. 31, 2023 |
2919 |
- |
Snyk Apps now GA: An easy, standardized, and secure framework for building custom integrations |
Sarah Conway |
Nov. 20, 2023 |
1108 |
- |
Manage security issues in Jira with Snyk Security in Jira Cloud |
LaToya Muff |
Aug. 09, 2023 |
330 |
- |
Securing symmetric encryption algorithms in Java |
Brian Vermeer |
Oct. 18, 2023 |
1489 |
- |
Preventing insecure deserialization in Node.js |
Benson Kuria Macharia |
Apr. 17, 2023 |
1890 |
- |
Building a security-conscious CI/CD pipeline |
Peter De Tender |
Jun. 29, 2023 |
1529 |
- |
Interview with an engineer: Diving into modern SAST |
Snyk Team |
May. 18, 2022 |
1355 |
- |
Controlling your server with a reverse shell attack |
Brian Vermeer |
Aug. 10, 2022 |
1544 |
- |
Is your team on the *security* naughty or nice list? |
Mariah Gresham |
Dec. 20, 2023 |
873 |
- |
Secure your application from Argo CD to Kubernetes |
JJ Ng |
Oct. 12, 2022 |
1253 |
- |
How to find and fix XML entity vulnerabilities |
Michael Sherman |
Sep. 07, 2022 |
2223 |
- |
How REI built a DevSecOps culture and how Snyk helped |
Brian Piper |
Feb. 27, 2024 |
1154 |
- |
Snyk achieves Red Hat Vulnerability Scanner Certification |
Tomás González Blasini, David Lugo |
Apr. 03, 2023 |
391 |
- |
Why fuzzing tools should be part of your security toolkit |
Kuria Macharia |
Oct. 28, 2022 |
1763 |
- |
How to find and fix Critical WebP zero-day vulnerability CVE-2023-4863 |
Brian Clark, Eric Smalling, Tim Gowan |
Oct. 05, 2023 |
1282 |
- |
Weak Hash vulnerability discovered in crypto-js and crypto-es (CVE-2023-46233 & CVE-2023-46133) |
Jamie Smith |
Oct. 25, 2023 |
1509 |
- |
2022 Snyk Customer Value Study highlights: The impact of developer-first security |
Jeff Yoshimura |
Oct. 18, 2022 |
1061 |
- |
How to update cURL |
Brian Clark, Eric Smalling |
Oct. 11, 2023 |
1772 |
- |
AWS top 10 misconfigurations and how to fix them: A cheat sheet |
Erin Cullen |
Mar. 15, 2023 |
1546 |
- |
Snyk + International Dog Day: recap |
Megan Moore |
Oct. 05, 2022 |
374 |
- |
Handling security vulnerabilities in Spring Boot |
Brian Vermeer |
Nov. 29, 2023 |
1451 |
- |
Three considerations for building an effective security program |
Alex Bovee |
May. 04, 2023 |
920 |
- |
Top 8 penetration testing tools |
Benson Kuria Macharia |
May. 25, 2023 |
1172 |
- |
Snyk Learn and the NIST Cybersecurity Framework (CSF) |
Michael Biocchi |
Mar. 06, 2024 |
523 |
- |
Snyk Fetch the Flag CTF 2023 writeup: Protect The Environment |
John Hammond |
Nov. 30, 2023 |
243 |
- |
Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195) |
Liran Tal |
Jan. 18, 2024 |
1059 |
- |
Accelerate C/ C++ security with Snyk |
Marcie Cheung |
Dec. 05, 2023 |
614 |
- |
Scaling your security team without hiring |
Drew Wright |
Nov. 02, 2022 |
984 |
- |
Mastering Python virtual environments: A complete guide to venv, Docker, and securing your code |
Liran Tal |
Jan. 10, 2024 |
1589 |
- |
Snyk Fetch the Flag CTF 2023 writeup: I Do Math |
John Hammond |
Nov. 30, 2023 |
190 |
- |
8 tips for securing containers from source to runtime |
Sarah Conway |
Aug. 24, 2022 |
661 |
- |
How to verify and secure your Mastodon account |
Liran Tal |
Dec. 05, 2022 |
946 |
- |
How to protect Node.js apps from CSRF attacks |
Victor Ikechukwu |
Oct. 17, 2023 |
3146 |
- |
Snyk integrates with AWS Security Hub to automate security remediation workflows |
David Lugo |
Jun. 12, 2023 |
884 |
- |
Command injection vulnerability in Snyk CLI released prior to September 1, 2022 (older than v1.996.0) |
Gareth Rushgrove |
Oct. 03, 2022 |
501 |
- |
How to implement SSL/TLS pinning in Node.js |
Nwani Victory |
Aug. 29, 2023 |
2298 |
- |
Streamline dependency updates with Mergify and Snyk |
Liran Tal |
Aug. 23, 2023 |
1548 |
- |
The Cloud Security Podcast is now powered by Snyk! |
Ashish Rajan |
Jul. 26, 2022 |
562 |
- |
5 security best practices for adopting generative AI code assistants like GitHub Copilot |
Liqian Lim (林利蒨) |
Mar. 05, 2024 |
1368 |
- |
A denial of service Regex breaks FastAPI security |
Liran Tal |
Jul. 31, 2024 |
1878 |
- |
How secure is WebAssembly? 5 security concerns unique to WebAssembly |
Marcelo Oliveira |
Jul. 28, 2023 |
1448 |
2 |
The Docker project turns 10! Looking back at a decade of containers |
Eric Smalling |
Mar. 17, 2023 |
3058 |
- |
Update: OpenSSL high severity vulnerabilities |
Vandana Verma Sehgal |
Nov. 03, 2022 |
516 |
- |
Talk to us about Snyk CLI |
Chintan B., Neil Mackay |
Jun. 06, 2024 |
859 |
- |
How Mulesoft fosters a developer-first, shift-left culture with Snyk |
Gerald Crescione |
Apr. 30, 2024 |
798 |
- |
The art of conditional rendering: Tips and tricks for React and Next.js developers |
Kumar Harsh |
Oct. 30, 2023 |
2865 |
- |
Snyk's 2023 State of Open Source Security: Supply chain security, AI, and more |
Simon Maple |
Jul. 26, 2023 |
1184 |
- |
Snyk achieves AWS Security Competency |
David Lugo |
Nov. 15, 2023 |
514 |
- |
Preventing SQL injection attacks in Node.js |
Lucien Chemaly |
Feb. 20, 2024 |
2260 |
- |
Addressing cybersecurity challenges in open source software with the Linux Foundation |
Mariah Gresham |
Jul. 20, 2022 |
1033 |
- |
SnykLaunch June ‘23: Insights and DeepCode AI enable faster fixes and prioritization |
Jim Armstrong |
Jun. 07, 2023 |
1567 |
- |
Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk |
Chandler Mayo |
Jun. 25, 2024 |
902 |
- |
Breaking down the ’critical’ OpenSSL vulnerability |
Elliot Ward, Raul Onitza-Klugman |
Nov. 04, 2022 |
1657 |
- |
Does GitOps enhance application security? |
Vandana Verma Sehgal |
Aug. 21, 2023 |
1026 |
- |
What are AI hallucinations and why should developers care? |
Liran Tal |
Aug. 16, 2023 |
2376 |
1 |
Ruby gem installations can expose you to lockfile injection attacks |
Liran Tal |
Aug. 17, 2022 |
2317 |
- |
Infrastructure drift and drift detection explained |
Lauren Place |
Mar. 09, 2022 |
1362 |
- |
Welcoming Danny Allan and Brian Rogan: Snyk leadership team expands with key appointments to accelerate innovation |
Peter McKay |
Feb. 06, 2024 |
492 |
- |
Getting started with React Native security |
Kingsley Ubah |
Apr. 07, 2022 |
2306 |
- |
Fetch the Flag CTF 2022 writeup: Logster |
Sonya Moisset |
Nov. 10, 2022 |
1063 |
- |
Snyk welcomes Reviewpad: Code, commit, celebrate! |
Manoj Nair |
Oct. 30, 2023 |
606 |
- |
Our favorite 2023 Snyk Fetch the Flag CTF writeups from the community |
Danielle Bradford |
Nov. 21, 2023 |
183 |
- |
Top 3 security best practices for handling JWTs |
Liran Tal |
Dec. 18, 2023 |
2007 |
- |
A quick primer on LDAP injection |
Eric Kahuha |
Jun. 01, 2023 |
1379 |
- |
10 GitHub Security Best Practices |
Brian Vermeer |
Feb. 05, 2024 |
3532 |
3 |
Ruby on Rails Docker for local development environment |
Mikhail Tereschenko |
Nov. 02, 2022 |
1770 |
- |
.NET developers alert: Moq NuGET package exfiltrates user emails from git |
Liran Tal |
Aug. 09, 2023 |
831 |
2 |
Modern VS Code extension development tutorial: Building a secure extension |
Mdu Sibisi |
Oct. 02, 2023 |
3917 |
- |
Introducing SUS: Snyk Ultimate Security |
Megan Moore |
Apr. 01, 2022 |
592 |
- |
Control your role! Kubernetes RBAC explored |
James Walker |
Jul. 27, 2023 |
2123 |
- |
The importance of platform engineers in a security program |
Elliott Spira |
Apr. 13, 2023 |
962 |
- |
Snyk Partner Speak Video with ServiceNow: A complete view of application security |
Sarah Conway |
May. 02, 2023 |
196 |
- |
Reporting AppSec risk up to your CISO |
Kate Powers Burke, Ezra Tanzer |
Feb. 13, 2024 |
1945 |
- |
Securing next-gen development: Lessons from Trust Bank and TASConnect |
Gerald Crescione |
Jun. 05, 2024 |
1312 |
- |
Building a secure CI/CD pipeline with GitHub Actions for your Java Application |
Brian Vermeer |
Jun. 27, 2022 |
1456 |
- |
Snyk brings developer-first AppSec approach to C/C++ |
Roy Ram, Neha Shenoy |
Apr. 04, 2023 |
1094 |
- |
Snyk sponsors Atlassian Team ’22: Bringing developer security to the Atlassian ecosystem |
Sarah Conway |
Apr. 05, 2022 |
601 |
- |
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant |
Brian Vermeer |
Aug. 29, 2024 |
1000 |
- |
Writing unit tests in Java |
Lewis Gavin |
Nov. 18, 2022 |
1629 |
- |
How to do password hashing in Java applications the right way! |
Brian Vermeer |
Mar. 24, 2022 |
1911 |
- |
DevSecOps lifecycle coverage with new Snyk and Dynatrace app |
Sarah Conway |
May. 15, 2023 |
507 |
- |
2022 Collaboration Partner of the Year: Snyk |
Sarah Conway |
Oct. 05, 2022 |
417 |
- |
How Snyk ensures safe adoption of AI |
Akanchha Shrivastava |
Mar. 27, 2024 |
1534 |
- |
Signing container images: Comparing Sigstore, Notary, and Docker Content Trust |
Hrittik Roy |
Sep. 26, 2023 |
3098 |
- |
Real-time threat protection with Snyk and SentinelOne |
Shivam Jindal |
Nov. 09, 2023 |
679 |
- |
Secure JavaScript URL validation |
Mannan Tirmizi |
May. 09, 2023 |
1940 |
6 |
Using JLink to create smaller Docker images for your Spring Boot Java application |
Brian Vermeer |
Aug. 24, 2023 |
1499 |
- |
Adding Snyk security to Jira and Bitbucket Cloud |
LaToya Muff |
Oct. 25, 2023 |
647 |
- |
SDR Series: Meet our APJ team |
Snyk Team |
Apr. 26, 2022 |
1350 |
- |
Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code |
Brian Vermeer |
Apr. 25, 2023 |
1523 |
- |
SocketSleuth: Improving security testing for WebSocket applications |
Elliot Ward |
Sep. 06, 2023 |
843 |
- |
AI-generated security fixes in Snyk Code now available |
Jim Armstrong |
May. 09, 2023 |
823 |
- |
Snyk named to CNBC 2023 Disruptor 50 List |
Peter McKay |
May. 09, 2023 |
311 |
- |
Exploring 3 types of directory traversal vulnerabilities in C/C++ |
Kirill Efimov |
Apr. 04, 2022 |
2081 |
- |
Navigating the AI-powered development era in financial services |
Lawrence Crowther |
Aug. 26, 2024 |
826 |
- |
Fetch the Flag CTF 2022 writeup: Pay Attention |
Assaf Ben Josef |
Nov. 10, 2022 |
1058 |
- |
Cloud Security at Blackhat and Defcon 2022 |
Ashish Rajan |
Sep. 06, 2022 |
1896 |
- |
Achieving developer security adoption at Nylas with Snyk |
Erin Cullen |
Dec. 04, 2023 |
762 |
- |
WillowTree roundtable: security for hypergrowth organizations |
Mariah Gresham |
Apr. 22, 2022 |
1051 |
- |
Fetch the Flag CTF 2022 writeup: git-refs |
Iulia Manda |
Nov. 10, 2022 |
585 |
- |
Top 5 security concerns for infrastructure as code |
Raphael Mun |
Jul. 14, 2023 |
1565 |
- |
8 tips for securing your CI/CD pipeline with Snyk |
Eric Smalling |
Jul. 20, 2023 |
3928 |
- |
Timing out synchronous functions with regex |
Steve Shani |
Apr. 06, 2023 |
1071 |
- |
How Okta empowers devs to find & fix security issues with Snyk |
Mariah Gresham |
Aug. 25, 2023 |
958 |
- |
Make Snyk notifications work for you |
Michele Wiedemer |
Apr. 06, 2022 |
550 |
- |
7 tips to become a successful bug bounty hunter |
Ben Sadeghipour |
Jan. 25, 2024 |
1246 |
- |
Nine Docker pro tips for Node.js developers |
Liran Tal |
Apr. 11, 2024 |
1630 |
- |
Announcing IaC+ early access: Secure your infrastructure configurations across the SDLC |
Lauren Place |
Oct. 03, 2023 |
686 |
- |
How to generate an SBOM for JavaScript and Node.js applications |
Liran Tal |
May. 22, 2023 |
2795 |
- |
Build and deploy a Node.js security scanning API to Platformatic Cloud |
Liran Tal |
Jan. 05, 2024 |
2980 |
- |
Buildkit GRPC SecurityMode privilege check: Build-time container breakout (CVE-2024-23653) |
Rory McNamara |
Jan. 31, 2024 |
946 |
- |
What does Biden's Executive Order on AI safety measures mean for businesses? |
Liqian Lim (林利蒨) |
Nov. 02, 2023 |
2399 |
- |
Kroger’s approach to supply chain security |
Brian Piper |
Jan. 02, 2024 |
888 |
- |
AppSec spring cleaning checklist |
Mariah Gresham |
May. 13, 2024 |
783 |
- |
Enhancing PCI compliance security with SAST and SCA |
DeveloperSteve Coochin |
Feb. 08, 2022 |
1359 |
- |
Welcoming Diana Brunelle: Snyk’s New Chief People Officer |
Peter McKay |
Jul. 22, 2024 |
336 |
- |
Installing and managing Java on macOS |
Keshav Malik |
Oct. 12, 2023 |
1464 |
- |
The importance of verifying webhook signatures |
Marcelo Oliveira |
Jun. 29, 2023 |
1829 |
- |
Three ways Snyk made software supply chains more secure in 2022 |
Jamie Smith |
Jan. 12, 2023 |
1390 |
- |
Improving developer experience with security tools at Pinterest |
Megan Moore |
Jul. 14, 2022 |
1165 |
- |
Open source maintainer pulls the plug on npm packages colors and faker, now what? |
Liran Tal |
Jan. 09, 2022 |
1160 |
1 |
Best practices for container isolation |
Maryann Agofure |
Aug. 29, 2022 |
1562 |
- |
Rego 102: Combining queries with AND/OR and custom messages |
Jasper Van der Jeugt, Becki Lee |
Nov. 09, 2023 |
2514 |
- |
Best practices for building a production-ready Dockerfile for PHP applications |
James Walker |
Aug. 22, 2023 |
2507 |
- |
Azure Bicep security fundamentals |
Mark Johnson |
Dec. 13, 2022 |
1143 |
- |
A guide to input validation with Spring Boot |
Lucien Chemaly |
Sep. 12, 2023 |
2751 |
- |
Detect infrastructure drift and unmanaged resources with Snyk IaC |
Stephane Jourdan |
May. 09, 2022 |
1485 |
- |
What’s new in CVSS 4.0 |
Paul Lascar |
Nov. 08, 2023 |
1679 |
- |
GitHub “besieged” by malware repositories and repo confusion: Why you'll be ok |
Liran Tal |
Mar. 12, 2024 |
2102 |
- |
Safer together: Snyk and CISPA collaborate for the greater good |
Idan Digmi |
Jun. 06, 2022 |
853 |
- |
Snyk Code’s autofixing feature, DeepCode AI Fix, just got better |
Eric Fernandez, Berkay Berabi |
Apr. 23, 2024 |
2452 |
- |
How to build a secure WebSocket server in Python |
Kingsley Ubah |
Jul. 05, 2022 |
2728 |
- |
How Lunar shifted security left while building a cloud native bank |
Brian Piper |
Jan. 20, 2022 |
759 |
- |
How Snyk helps satisfy White House cybersecurity recommendations |
Vandana Verma Sehgal |
Mar. 23, 2022 |
1149 |
- |
Generating fake security data with Python and faker-security |
Michael Aquilina |
Apr. 26, 2022 |
859 |
- |
Rediscovering argument injection when using VCS tools — git and mercurial |
Alessio Della Libera |
Aug. 23, 2022 |
2111 |
3 |
Join the Snyk Developer Challenge |
Brittany Cannon |
Aug. 01, 2022 |
479 |
- |
5 tips for adopting AI code assistance securely |
Liqian Lim (林利蒨) |
May. 30, 2024 |
856 |
- |
Abusing Ubuntu 24.04 features for root privilege escalation |
Rory McNamara |
Sep. 09, 2024 |
5975 |
189 |
Snyk's AppSec dream team |
Krysta Williams-Timm |
Mar. 19, 2024 |
843 |
- |
Limitations of a single AI model |
Frank Fischer |
Aug. 07, 2023 |
1401 |
- |
Automate security controls from development to production on Google Cloud |
David Lugo |
Jun. 18, 2024 |
1073 |
- |
My internship journey at Snyk |
Caroline Gow |
Feb. 16, 2023 |
1329 |
- |
Copilot amplifies insecure codebases by replicating vulnerabilities in your projects |
Randall Degges |
Feb. 22, 2024 |
1578 |
- |
Snyk Partner Speak video series with HashiCorp |
Sarah Conway |
Oct. 04, 2023 |
180 |
- |
5 ways to secure Drupal 10 |
Sushnigdha Tripathy |
Aug. 23, 2022 |
1692 |
- |
A day in the life of a CISO: Chris Hughes of Aquia |
Vandana Verma Sehgal |
Nov. 04, 2022 |
851 |
- |
10 Dimensions of Python Static Analysis |
Liran Tal |
Jul. 17, 2024 |
4861 |
- |
A security expert’s view on Gartner’s generative AI insights - Part 2 |
Liqian Lim (林利蒨) |
Aug. 08, 2024 |
1231 |
- |
High severity vulnerability found in libcurl and curl (CVE-2023-38545) |
Hadas Bloom |
Oct. 04, 2023 |
1104 |
- |
Improved risk assessment with EPSS scores in Snyk |
Daniel Berman |
May. 22, 2023 |
1297 |
- |
Node.js vs. Deno vs. Bun: JavaScript runtime comparison |
James Konik |
Sep. 05, 2023 |
2966 |
- |
Looking back at Black Hat USA 2022 |
Vandana Verma Sehgal |
Sep. 21, 2022 |
903 |
- |
Rego 101: Introduction to Rego |
Becki Lee |
Nov. 02, 2023 |
2503 |
- |
How LiveRamp used Snyk to remediate Log4Shell |
Brian Piper |
May. 19, 2022 |
685 |
- |
Why ASPM is the future of AppSec: Key points from our newest whitepaper |
Sarah Conway |
Jun. 18, 2024 |
1177 |
- |
Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools |
Calum Hutton |
Nov. 27, 2023 |
1511 |
- |
Snyk IaC for Terraform Enterprise: Expanding Snyk compatibility with HashiCorp Terraform |
Sarah Conway |
Sep. 28, 2022 |
562 |
- |
7 AppSec tips from Snowflake’s Director of Product Security |
Brian Piper |
Aug. 31, 2023 |
850 |
- |
Breaking caches and bypassing Istio RBAC with HTTP response header injection |
Rory McNamara |
Jun. 20, 2024 |
2498 |
- |
How to choose a security tool for your AI-generated code |
Liqian Lim (林利蒨) |
Jan. 09, 2024 |
1774 |
- |
SnykWeek New York: In the cloud |
Megan Moore |
Oct. 10, 2022 |
731 |
- |
File encryption in Python: An in-depth exploration of symmetric and asymmetric techniques |
Keshav Malik |
Nov. 22, 2023 |
2132 |
- |
How to Dockerize a PHP application securely |
James Olaogun |
Aug. 02, 2023 |
2389 |
1 |
Building a secure GraphQL API with Node.js |
Lawrence Eagles |
Mar. 29, 2022 |
1901 |
- |
Avoiding SMTP Injection: A Whitebox primer |
Sam Sanoop |
Sep. 15, 2022 |
1579 |
1 |
Best practices for effective attack surface analysis |
Benson Kuria Macharia |
Jul. 18, 2023 |
1659 |
- |
Secure password hashing in Go |
Love Bhardwaj |
Dec. 05, 2023 |
3088 |
- |
How Spotify uses Snyk to secure the SDLC |
Brian Piper |
Sep. 13, 2022 |
919 |
- |
Announcing the open beta of Snyk's revamped security reporting |
Daniel Berman |
Nov. 09, 2022 |
1354 |
- |
Webhook Security Best Practices |
Gints Dreimanis |
Jul. 06, 2022 |
1168 |
- |
New IaC security workshop from Snyk, HashiCorp, and AWS at KubeCon Europe 2023 and on-demand |
Sarah Conway |
Apr. 10, 2023 |
1035 |
- |
Snyk is your security companion for Amazon CodeWhisperer |
Liqian Lim (林利蒨) |
Nov. 29, 2023 |
1817 |
- |
6 steps for scaling risk-based AppSec programs |
Julia Kraut |
Oct. 13, 2023 |
938 |
- |
Best practices for API gateway security |
Kuria Macharia |
Sep. 07, 2022 |
1510 |
- |
Power up security collaboration with Snyk and Slack |
Sarah Conway |
Oct. 23, 2023 |
271 |
- |
Exploiting HTTP/2 CONTINUATION frames for DoS attacks |
Vandana Verma Sehgal |
Apr. 08, 2024 |
696 |
- |
Repo Jacking: The Great Source-code Swindle |
Elliot Ward |
Jul. 25, 2024 |
2516 |
- |
Safely handling containers |
Tales Casagrande |
Jun. 22, 2022 |
729 |
- |
Security implications of cross-origin resource sharing (CORS) in Node.js |
Victor Ikechukwu |
Sep. 13, 2023 |
2582 |
- |
Using Rego as a generic policy language |
Dickson Boateng |
Jun. 03, 2022 |
1323 |
- |
Fetch the Flag CTF 2022 writeup: Disposable Message |
Michael Aquilina |
Nov. 10, 2022 |
2421 |
- |
Fetch the Flag CTF 2022 writeup: Treasure Trove |
Luke Watts |
Nov. 10, 2022 |
572 |
- |
How to write your first unit test in JavaScript |
Raphael Mun |
Oct. 28, 2022 |
1600 |
2 |
Snyk highlights AWS re:Invent 2023 |
David Lugo |
Dec. 14, 2023 |
820 |
- |
The Snyk Perpetual Key Rotation Machine |
Megan Moore |
Apr. 01, 2023 |
1000 |
- |
Developer-centric DAST with Bright Security |
Vitaly Unic |
Apr. 14, 2023 |
1496 |
- |
Embrace your next cybersecurity career with The Big Fix |
Liran Tal |
Feb. 22, 2023 |
692 |
- |
The XZ backdoor CVE-2024-3094 |
Liran Tal |
Mar. 31, 2024 |
1800 |
- |
How Snyk can help secure supply chains per "A Guide to Implementing the Software Bill of Materials (SBOM) for Software Management"’ by Japan's METI |
Hiroko Nakano |
Aug. 01, 2023 |
566 |
- |
Patches of Pride: Love, inclusivity, & cute pets in celebration of Pride month |
Ashley Ladd |
Jun. 20, 2023 |
463 |
- |
Snyk’s new native integration with Bitbucket Cloud emphasizes dev-first security |
Sarah Conway |
Oct. 25, 2022 |
847 |
- |
Cloud security fundamentals part 3: Empower your developers |
Drew Wright |
Oct. 21, 2022 |
1044 |
- |
Snyk's AppSec journey in 2022 |
Jason Lane |
Jan. 11, 2023 |
1554 |
- |
Choosing the best Node.js Docker image |
Liran Tal, Adrian Mouat |
Sep. 30, 2022 |
3033 |
2 |
Introducing Snyk Training, our online learning platform |
Michele Wiedemer |
Aug. 11, 2022 |
424 |
- |
10 AWS security considerations when migrating |
Drew Wright |
Nov. 29, 2022 |
1455 |
- |
Bolstering Snyk's developer security platform in 2022 |
Daniel Berman |
Jan. 09, 2023 |
2059 |
- |
Teaming up with Sysdig to deliver developer and runtime Kubernetes security |
Jim Armstrong |
Feb. 16, 2022 |
679 |
- |
Kicking off 2022 by recognizing DevSecOps leaders |
Jeff Yoshimura |
Jan. 06, 2022 |
1146 |
- |
Snyk integrates with AWS CloudTrail Lake to simplify security audits |
David Lugo |
Feb. 01, 2023 |
551 |
- |
Fastify plugins as building blocks for a backend Node.js API |
Liran Tal |
May. 28, 2024 |
2479 |
- |
Snyk scanning capabilities are now embedded in Jira Software |
Sarah Conway |
Jun. 06, 2023 |
658 |
- |
InCyber Forum Europe recap: 4 tips from DevSecOps experts |
Nina McClure |
Aug. 14, 2024 |
1217 |
- |
Exploring the Spring Security authorization bypass (CVE-2022-31692) |
Brian Vermeer |
Dec. 16, 2022 |
1121 |
- |
Key points from Google and Accenture's ransomware white paper |
Vandana Verma Sehgal |
Nov. 07, 2022 |
1459 |
- |
Snyk Week of Impact 2023: A week of meaningful contributions and community engagement |
Bianca Matei |
Nov. 08, 2023 |
567 |
- |
SnykLaunch recap: Custom Base Image Recommendations |
Jamie Smith |
Apr. 04, 2023 |
1133 |
- |
Demystifying the AWS shared security responsibility model |
David Lugo |
Nov. 13, 2023 |
1004 |
- |
Mitigating path traversal vulns in Java with Snyk Code |
Brian Vermeer |
Mar. 06, 2023 |
1044 |
2 |
How to integrate ASPM with your application security program |
Vandana Verma Sehgal |
Nov. 28, 2023 |
1258 |
- |
Top considerations for addressing risks in the OWASP Top 10 for LLMs |
Simon Maple |
Sep. 07, 2023 |
3135 |
- |
Building an application security battle plan: Home Alone edition |
Brian Clark |
Dec. 20, 2022 |
898 |
- |
Swift deserialization security primer |
Sam Sanoop |
Jul. 18, 2023 |
1155 |
- |
Implementing TLS in Kubernetes |
Rubaiat Hossain |
Jul. 31, 2023 |
2063 |
- |
Ruby email rule removed from Snyk Code |
Frank Fischer |
Oct. 13, 2022 |
594 |
- |
Cloud security updates you need to know from re:Invent 2022 |
Ashish Rajan |
Dec. 21, 2022 |
2303 |
- |
How to secure a REST API? |
Liran Tal |
Jun. 27, 2024 |
2768 |
- |
Implementing TLS/SSL in Python |
Kingsley Ubah |
Oct. 16, 2022 |
1489 |
- |
2022 Container Security Trends Report: Exploring ownership, education, expertise, and more |
Megan Moore |
Apr. 27, 2022 |
737 |
- |
Getting started with query parameterization |
Mary Gathoni |
Oct. 24, 2023 |
2337 |
- |
Fetch the Flag CTF 2022 writeup: Not So Smart Fridge |
Antonio Gomes |
Nov. 10, 2022 |
1026 |
- |
How Atlassian used Snyk to solve Log4Shell |
Sarah Conway |
Nov. 16, 2022 |
813 |
- |
10 best practices to containerize Node.js web applications with Docker |
Liran Tal, Yoni Goldberg |
Sep. 15, 2022 |
6338 |
- |
Finding and fixing insecure direct object references in Python |
Keshav Malik |
Jul. 19, 2023 |
1509 |
- |
Preventing SQL injection in C# with Entity Framework |
Brian Vermeer |
Jul. 30, 2024 |
1273 |
- |
Snyk and StackHawk form strategic alliance to equip app teams with modern, developer-first security testing |
David Lugo |
May. 02, 2022 |
716 |
- |
Securing the web (forward) |
Daniel Appelquist |
Mar. 27, 2023 |
1233 |
- |
Lessons learned from the Argo CD zero-day vulnerability (CVE-2022-24348) |
Eric Smalling |
Feb. 10, 2022 |
1375 |
- |
Securing cloud infrastructure for PCI review |
DeveloperSteve Coochin |
Mar. 03, 2022 |
2080 |
- |
Snyk AppRisk Pro: A holistic approach to application risk management |
Daniel Berman |
May. 01, 2024 |
1597 |
- |
Securing container applications using the Snyk CLI |
Hadar Mutai |
Aug. 30, 2022 |
489 |
- |
Secure AI tool adoption: Perceptions and realities |
Alex Salkever |
Jun. 04, 2024 |
733 |
- |
Mental Health Awareness Month: How losing my father changed me |
Tim Leroy |
May. 31, 2022 |
957 |
- |
Building Vue 3 components with Tailwind CSS |
Mary Gathoni |
Feb. 21, 2023 |
2017 |
- |
Automatic source locations with Rego |
Jasper Van der Jeugt |
Feb. 12, 2024 |
2614 |
- |
New year ushers in new wave of Snyk Technology Alliance Partner Program members |
Sarah Conway |
Jan. 12, 2023 |
444 |
- |
Allyship and advocacy: Celebrating Disability Pride Month at Snyk |
Alex Fallon |
Jul. 27, 2022 |
1764 |
- |
4 AI coding risks and how to address them |
Liqian Lim (林利蒨) |
Jun. 13, 2024 |
1200 |
- |
Announcing the Snyk Business trial: Security across the SDLC |
Mariah Gresham |
Feb. 15, 2022 |
612 |
- |
Why “vulnerability management” falls short in modern application security |
Daniel Berman |
Jun. 13, 2024 |
988 |
- |
Leaky Vessels deep dive: Escaping from Docker one syscall at a time |
Rory McNamara |
Feb. 06, 2024 |
10279 |
4 |
Critical WebP 0-day security CVE-2023-4863 impacts wider software ecosystem |
Brian Clark, Eric Smalling, Jonathan Moses |
Sep. 28, 2023 |
1825 |
- |
OSPO security evolution: The Kübler-Ross Model of open source |
Dan Appelquist |
Jan. 12, 2023 |
783 |
- |
Snyk integrates with Amazon EventBridge to enable secure AppDev at scale |
David Lugo |
Jun. 12, 2023 |
735 |
- |
Proxy authentication in Snyk CLI for Windows |
Steve Winton |
Oct. 06, 2022 |
297 |
- |
Snyk Fetch the Flag CTF 2023 writeup: Silent Cartographer |
John Hammond |
Nov. 30, 2023 |
362 |
- |
Application vulnerability management best practices |
Mariah Gresham |
Aug. 06, 2024 |
1240 |
- |
Snyk recognized as an Emerging Segment Leader in Application Security in Snowflake's Next Generation of Cybersecurity Applications report |
LaToya Muff |
Dec. 11, 2023 |
658 |
- |
Gitpod remote code execution 0-day vulnerability via WebSockets |
Elliot Ward |
Feb. 27, 2023 |
2121 |
1 |
A day in the life of an ethical hacker |
Sonya Moisset |
Jun. 05, 2023 |
2679 |
- |
How to prevent open redirect vulnerabilities in Laravel |
Kevin Kimani |
Dec. 27, 2023 |
1696 |
- |
Bringing cloud native application security full circle |
Erin Cullen |
Jun. 08, 2022 |
845 |
- |
Find and fix HTTP/2 rapid reset zero-day vulnerability CVE-2023-44487 |
Jamie Smith, Kriti Dogra, Anthony Larkin |
Oct. 11, 2023 |
1225 |
- |
Six takeaways from our ASPM masterclass series |
Erin Cullen |
Apr. 10, 2024 |
1110 |
- |
Snyk increases investment in partners with new Snyk Technology Alliance Partner Program |
Cara Sampson |
Apr. 27, 2022 |
1502 |
- |
3 tips for effective developer security training |
Mariah Gresham |
Dec. 01, 2022 |
1127 |
- |
Snyk transformed cloud security in 2022 with developer-first solution |
Lauren Place |
Jan. 11, 2023 |
1211 |
- |
Snyk Fetch the Flag CTF 2023 writeup: Off the SETUID |
Carlos Polop |
Nov. 30, 2023 |
1710 |
- |
Three expert tips for cultivating secure software development practices |
Simon Maple |
Mar. 01, 2023 |
896 |
- |
Spring4Shell: The zero-day RCE in the Spring Framework explained |
Brian Vermeer |
Apr. 01, 2022 |
927 |
- |
Node.js multithreading with worker threads: pros and cons |
James Walker |
Feb. 27, 2023 |
2120 |
2 |
Announcing Snyk’s new Global Service Provider program |
Cyndi Doyle |
Feb. 23, 2022 |
696 |
- |
Code injection in Python: examples and prevention |
Lucien Chemaly |
Dec. 06, 2023 |
1807 |
- |
Improving GraphQL security with static analysis and Snyk Code |
Sam Sanoop |
Apr. 12, 2022 |
1528 |
- |
SnykHer celebrates International Women’s Day 2022 |
Jess Katz |
Mar. 07, 2022 |
697 |
- |
Visibly invisible malicious Node.js packages: When configuration niche meets invisible characters |
Aviad Hahami |
Feb. 28, 2022 |
1240 |
- |
PulseMeter Report: Software supply chains |
Erin Cullen |
Mar. 21, 2023 |
708 |
- |
4 best practices for cultivating developer security adoption |
Erin Cullen |
Apr. 20, 2023 |
897 |
- |
Applying the principle of least privilege to Kubernetes using RBAC |
Jekayin-Oluwa Olabemiwo |
Aug. 29, 2022 |
1734 |
- |
Cloud Security Podcast awarded SANS Podcast of the Year |
Jeff Yoshimura |
Dec. 19, 2022 |
830 |
- |
A stepping stone towards holistic application risk and compliance management of the Digital Operational Resiliency Act (DORA) |
Ben Desjardins |
Jul. 11, 2024 |
1834 |
- |
Top 5 VS Code extensions for security |
Brian Clark |
Aug. 24, 2023 |
1654 |
- |
Celebrating Juneteenth at Snyk |
Sherica Bryan |
Jun. 16, 2023 |
858 |
- |
Vulnerabilities in NodeJS C/C++ add-on extensions |
Alessio Della Libera |
Aug. 14, 2024 |
2808 |
- |
Code injection vulnerabilities (CVSSv3 5.8) found in Snyk CLI and IDE plugins |
Carm Janneteau |
Nov. 30, 2022 |
585 |
- |
5 "no experience needed" tips for building secure applications |
Liran Tal |
Dec. 27, 2022 |
997 |
- |
How to install Ruby in a macOS for local development |
Liran Tal |
Sep. 27, 2022 |
1579 |
- |
Fix cloud security issues faster and at the source with Snyk IaC |
Anthony Larkin |
Apr. 04, 2023 |
632 |
- |
Improving the UI/UX of the Snyk VS Code extension |
Andy Gongea |
Nov. 21, 2023 |
702 |
- |
Best practices for Kubernetes Secrets management |
Eric Kahuha |
Nov. 16, 2022 |
1777 |
- |
Snyk Learn now aligns with the NIST NICE Workforce Framework |
Michael Biocchi |
Jun. 07, 2023 |
471 |
- |
Common SAML vulnerabilities and how to remediate them |
Sam Sanoop |
Dec. 19, 2023 |
966 |
- |
The Secure Developer: Security champions recap |
Sam Hepburn |
Jun. 14, 2023 |
1365 |
- |
How community participation can enhance your development career |
Randall Degges |
Nov. 15, 2022 |
1117 |
- |
Introducing the new Snyk UI |
Steve Winton |
Sep. 29, 2022 |
383 |
- |
What can you do with an enriched SBOM? A parlay quickstart guide |
Gareth Rushgrove |
Jun. 07, 2023 |
1077 |
- |
Snyk named a Leader in 2023 Gartner® Magic Quadrant™ for Application Security Testing |
Manoj Nair |
May. 23, 2023 |
949 |
- |
An unintimidating introduction to the dark arts of C/C++ vulnerabilities |
Aviad Hahami |
Apr. 15, 2022 |
1513 |
- |
Preventing server-side request forgery in Node.js applications |
David Ekete |
Feb. 20, 2024 |
1759 |
- |
Symmetric vs. asymmetric encryption: Practical Python examples |
Josh Amata |
May. 15, 2024 |
4010 |
- |
Improving code quality with linting in Python |
Keshav Malik |
Oct. 12, 2022 |
1767 |
2 |
Keeping Docker secrets secure (even if you’re not using Kubernetes) |
Marcelo Oliveira |
Aug. 24, 2022 |
1484 |
- |
dompdf security alert: RCE vulnerability found in popular PHP PDF library |
DeveloperSteve Coochin |
Mar. 18, 2022 |
1185 |
- |
5 best practices for React with TypeScript security |
Marcelo Oliveira |
Dec. 08, 2022 |
1755 |
- |
Snyk named a 2023 Gartner Peer Insights™ Customers’ Choice for Application Security Testing |
Ciana Abdollahian |
Dec. 04, 2023 |
622 |
- |
How to use GitHub Actions environment variables |
Lewis Gavin |
Nov. 22, 2022 |
1877 |
- |
Preventing broken access control in express Node.js applications |
Ben Smitthimedhin |
May. 22, 2024 |
2923 |
- |
The SecurityManager is getting removed in Java: What that means for you |
Mdu Sibisi |
Jun. 15, 2023 |
2238 |
- |
Welcoming Karyn Smith: Snyk’s new Chief Legal Officer |
Peter McKay |
Feb. 07, 2022 |
539 |
- |
Building an npm package compatible with ESM and CJS in 2024 |
Liran Tal |
Apr. 18, 2024 |
1082 |
- |
Investing in our planet: One tree planted for each new Snyker |
Tori Hay Lindahl |
Apr. 22, 2022 |
444 |
- |
Extend the power of your AppSec data with the new Snyk and Snowflake integration |
Guy Plotnik |
Aug. 06, 2024 |
1095 |
- |
Meet (and join) our newest Snyk Ambassadors – Fall 2022 edition! |
Gerald Crescione |
Sep. 19, 2022 |
861 |
- |
Vulnerability disclosure: Which comes first, the security bug in PHP or the CVE? |
Liran Tal |
Dec. 19, 2023 |
841 |
- |
Snyk sponsors Snowflake Summit |
LaToya Muff |
Jun. 04, 2024 |
569 |
- |
An investigation into code injection vulnerabilities caused by generative AI |
Jack Hair |
Apr. 16, 2024 |
983 |
- |
Lessons from OpenSSL vulnerabilities part 1: Preparing your supply chain for the next critical vulnerability |
Jamie Smith |
Apr. 19, 2023 |
1133 |
- |
Manage security issues in Jira with Snyk Security in Jira Cloud |
LaToya Muff |
Aug. 09, 2023 |
330 |
- |
Lessons from OpenSSL vulnerabilities part 2: Finding and fixing supply chain vulnerabilities |
Jamie Smith |
Apr. 26, 2023 |
1977 |
- |
5 tips to supercharge app security from code to cloud |
Sonya Moisset |
Aug. 08, 2023 |
2759 |
- |
The dangers of setattr: Avoiding Mass Assignment vulnerabilities in Python |
Jack Hair |
Feb. 15, 2023 |
1334 |
- |
Understanding DNS attacks: Identifying and patching vulnerabilities |
Nihad Hassan |
Oct. 26, 2022 |
2002 |
- |
Build a software bill of materials (SBOM) for open source supply chain security |
Liran Tal |
Mar. 14, 2022 |
2599 |
- |
Enterprise security: Digital transformation and risk management with Anheuser-Busch Inbev and Manulife |
Brian Piper |
Feb. 03, 2022 |
875 |
- |
Buildkit mount cache race: Build-time race condition container breakout (CVE-2024-23651) |
Rory McNamara |
Jan. 31, 2024 |
1022 |
- |
AWS re:Inforce 2022 recap |
Shilpi Bhattacharjee |
Aug. 08, 2022 |
2487 |
- |
Snyk and Bitbucket best practices cheat sheet |
Marco Morales |
Mar. 03, 2022 |
915 |
- |
XS leaks: What they are and how to avoid them |
Gino Diño |
Jul. 17, 2023 |
2287 |
1 |
SAS and Snyk discuss the future of AI for development and security teams |
Brian Piper |
Oct. 09, 2023 |
848 |
- |
Snyk Open Source adds C/C++ security scanning for unmanaged dependencies |
Michal Brutvan |
Apr. 05, 2022 |
768 |
- |
How Onna Technologies uses Snyk & Sysdig to secure the SDLC while saving time and money |
Brian Piper |
Sep. 12, 2022 |
1297 |
- |
Suspicious Maintainer Unveils Threads of npm Supply Chain Attack |
Liran Tal |
Jul. 16, 2024 |
1524 |
- |
Cloud security fundamentals part 1: Know your environment |
Drew Wright |
Oct. 07, 2022 |
1098 |
- |
New Year's security resolutions for 2024 from Snyk DevRel, SecRel, and friends |
Micah Silverman |
Jan. 18, 2024 |
1188 |
- |
Buildkit build-time container teardown arbitrary delete (CVE-2024-23652) |
Rory McNamara |
Jan. 31, 2024 |
879 |
- |
What you should know about PHP code security |
Liran Tal |
Sep. 04, 2024 |
1773 |
- |
Secure your software supply chain with the new Snyk Vulnerability Intelligence for SBOM ServiceNow integration |
Sarah Conway |
Nov. 07, 2023 |
531 |
- |
Snyk documentation: Our journey so far |
David Bailey |
Feb. 29, 2024 |
978 |
- |
Snyk and ServiceNow collaborate on new SBOM solution |
Sarah Conway |
May. 16, 2023 |
470 |
- |
Celebrating Father’s Day at Snyk |
Snyk Team |
Jun. 17, 2022 |
93 |
- |
CTF secrets revealed: TopLang challenge from SnykCon 2021 explained |
Michael Aquilina |
Jan. 06, 2022 |
2987 |
- |
Agent hijacking: The true impact of prompt injection attacks |
Elliot Ward, Rory McNamara, Mateo Rojas-Carulla, Sam Watts, Eric Allen |
Aug. 28, 2024 |
2758 |
- |
Mimic your mental model with Project Collections |
Waleed Arshad |
Jun. 27, 2023 |
745 |
- |
Rego 103: Types of values and rules |
Jasper Van der Jeugt, Becki Lee |
Nov. 16, 2023 |
3425 |
- |
Introducing new Snyk AppRisk integrations: Enhancing application risk management with development context |
Daniel Berman |
Aug. 01, 2024 |
890 |
- |
A developer-centric approach to software |
Mariah Gresham |
Feb. 18, 2022 |
1108 |
- |
Understanding Kubernetes Pod Security Standards |
Gino Diño |
Jun. 20, 2023 |
1389 |
- |
Avoiding mass assignment vulnerabilities in Node.js |
Benson Kuria Macharia |
Mar. 28, 2023 |
2321 |
- |
Snyk Fetch the Flag CTF 2023 writeup: Honey Baked Messages |
John Hammond |
Nov. 30, 2023 |
298 |
- |
Snyk is now also hosted in the EU providing regional data residency |
Daniel Berman |
Jun. 28, 2022 |
633 |
- |
Essential Node.js backend examples for developers in 2024 |
Liran Tal |
Jun. 12, 2024 |
2643 |
- |
Celebrating Asian American and Pacific Islander Heritage Month |
Snyk Team |
May. 27, 2022 |
1141 |
- |
A developer’s best friend: Lessons learned from our canine companions about AI code security |
Krysta Williams-Timm |
Aug. 26, 2024 |
803 |
- |
10 React security best practices |
Liran Tal |
Jul. 18, 2022 |
1130 |
2 |
Preventing XSS in Django |
Liran Tal |
Mar. 13, 2023 |
1932 |
- |
Snyk Code now secures AI builds with support for LLM sources |
Liqian Lim (林利蒨), Ranko Cupovic |
Jun. 25, 2024 |
571 |
- |
Spring4Shell extends to Glassfish and Payara: same vulnerability, new exploit |
Brian Vermeer |
Apr. 08, 2022 |
1015 |
- |
Announcing Insights: Helping you focus on top risks for your organization |
Daniel Berman |
Jun. 07, 2023 |
1737 |
- |
Priorities from the OpenSSF Secure Open Source Software Summit 2023 |
Dan Appelquist |
Oct. 04, 2023 |
381 |
- |
Under the C: A glance at C/C++ vulnerabilities in Python land |
Aviad Hahami |
Apr. 28, 2022 |
1289 |
- |
How open source C++ code can introduce security risks |
Snyk Security Research Team |
Aug. 22, 2022 |
1353 |
- |
Introducing the Snyk Partner Solutions Directory for discovering Snyk technology integrations |
Cara Sampson |
Apr. 03, 2023 |
996 |
- |
Snyk’s Evolution: A Message From CEO Peter McKay |
Peter McKay |
Apr. 13, 2023 |
549 |
- |
How to install Java on macOS |
Liran Tal |
Apr. 17, 2024 |
2820 |
- |
CISO playbook: 3 things to consider when establishing a security culture |
Simon Maple |
Mar. 09, 2023 |
1249 |
- |
GitHub Copilot code security: XSS in React |
Liran Tal |
Oct. 19, 2023 |
2044 |
- |
Setting up SSL/TLS for Kubernetes Ingress |
Peter De Tender |
Nov. 17, 2022 |
2245 |
- |
Security success in the Bay Area with Slack |
Mariah Gresham |
May. 17, 2023 |
878 |
- |
Snyk expands in Asia-Pacific (APAC) with new datacenter in Sydney, Australia |
Daniel Berman |
Nov. 30, 2022 |
715 |
- |
How to setup Deno Dev Container on GitHub Codespaces? |
Liran Tal |
Jul. 18, 2024 |
2097 |
- |
Welcoming Kathleen Murphy and Zach Nelson to the Snyk Board of Directors |
Peter McKay |
Jan. 24, 2022 |
448 |
- |
Magento security requires additional patch to fix sanitization vulnerability |
DeveloperSteve Coochin |
Feb. 24, 2022 |
711 |
- |
Modernizing SAST rules maintenance to catch vulnerabilities faster |
Frank Fischer |
Apr. 19, 2022 |
928 |
- |
Command injection in Python: examples and prevention |
Rubaiat Hossain |
Dec. 21, 2023 |
2558 |
- |
Meet (and join) our newest Snyk Ambassadors! |
Waleed Arshad |
Mar. 28, 2022 |
1783 |
- |
Best practices for managing Java dependencies |
Brian Vermeer |
Aug. 26, 2022 |
1826 |
5 |
How to avoid web cache poisoning attacks |
Najia Gul |
Sep. 11, 2023 |
2155 |
- |
How to secure Python Flask applications |
Gourav Singh Bais |
May. 21, 2024 |
4209 |
- |
Fetch the Flag CTF 2023 sneak peek |
Danielle Bradford |
Sep. 06, 2023 |
187 |
- |
A DevSecOps solution for your apps on AWS from Snyk |
David Lugo |
Nov. 28, 2023 |
900 |
- |
Ignoring vulnerabilities with Snyk |
Daniel Berman |
May. 03, 2022 |
1845 |
- |
Implementing TLS in Java |
Himanish Munjal |
Nov. 09, 2022 |
2166 |
- |
Best practices for containerizing Go applications with Docker |
Jekayin-Oluwa Olabemiwo |
Mar. 23, 2022 |
2117 |
- |
Snyk named as a top cybersecurity company in inaugural Fortune Cyber 60 2023 list |
Snyk Team |
Dec. 18, 2023 |
337 |
- |
New years resolution: Don’t show my security tokens when hacking my demo application on stage |
Brian Vermeer |
Jan. 12, 2022 |
721 |
- |
Snyk finds PyPi malware that steals Discord and Roblox credential and payment info |
Raul Onitza-Klugman |
Aug. 16, 2022 |
1689 |
- |
A definitive guide to Ruby gems dependency management |
Liran Tal |
Aug. 05, 2022 |
2618 |
1 |
Security vs. Development: A game of priorities |
Andrew MacKenzie |
Nov. 06, 2023 |
1009 |
- |
Identifying Insecure C Code with Valgrind and Fixing with Snyk Code |
Liran Tal |
Sep. 24, 2024 |
1373 |
- |
Meet the new host for The Secure Developer podcast |
Mariah Gresham |
May. 09, 2024 |
469 |
- |
How to mitigate security issues in GenAI code and LLM integrations |
Liran Tal |
Sep. 11, 2024 |
2394 |
- |
Announcing new Snyk AppRisk integration with Orca Security |
Daniel Berman |
Sep. 11, 2024 |
809 |
- |
Want to avoid a data breach? Employ secrets detection |
Liran Tal |
Sep. 16, 2024 |
2539 |
- |
Promise queues and batching concurrent tasks in Deno |
Liran Tal |
Sep. 25, 2024 |
3378 |
- |
AWS re:Invent 2022: How Neiman Marcus transitioned to developer-first security |
Megan Moore |
Dec. 12, 2022 |
1231 |
- |
5 reasons why developers at FinServ institutions are outpacing their security teammates |
Katie DeMatteis |
Sep. 09, 2024 |
822 |
- |
Dive into AI and LLM learning with the new Snyk Learn learning path |
Michael Biocchi |
Sep. 18, 2024 |
310 |
- |
Welcoming Gary Olson: Snyk’s new Chief Revenue Officer |
Peter McKay |
Mar. 04, 2024 |
444 |
- |
How SAS secures their AI-generated code |
Gerald Crescione |
Apr. 15, 2024 |
1874 |
- |
The journey to AppSec gold: Lessons we can learn from the Olympians |
Krysta Williams-Timm |
Aug. 15, 2024 |
714 |
- |
Tools for infrastructure drift detection |
William Beuil |
Mar. 15, 2022 |
2480 |
- |
3 best practices to make the most of Snyk AppRisk Essentials |
Daniel Berman |
Sep. 19, 2024 |
1801 |
- |
10 best practices to build a Java container with Docker |
Brian Vermeer |
Aug. 24, 2022 |
4147 |
- |
Infosec Europe session: 4 tips for safer AI adoption |
Gerald Crescione |
Aug. 01, 2024 |
1103 |
- |
How to prevent log injection vulnerability in JavaScript and Node.js applications |
Liran Tal |
Sep. 26, 2024 |
1504 |
- |
Securing a DevOps pipeline with Snyk, Bitbucket, and AWS |
Marco Morales |
Jan. 04, 2022 |
456 |
- |
SurveyMonkey talks with Snyk about developer security during hypergrowth |
Megan Moore |
May. 05, 2022 |
1381 |
- |
Meet Snyk for Government: Our developer security solution with FedRAMP ATO |
Danny Allan |
Sep. 17, 2024 |
502 |
- |
Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System |
Jim Armstrong |
Sep. 27, 2024 |
1224 |
- |
Going beyond reachability to prioritize what matters most |
Jamie Smith |
Oct. 01, 2024 |
1149 |
- |
Proactive AppSec continuous vulnerability management for developers and security teams |
Liran Tal |
Oct. 02, 2024 |
1804 |
- |
Snyk named a 2024 Gartner Peer Insights™ Customers’ Choice for Application Security Testing for the 3rd consecutive year |
Nina McClure |
Oct. 02, 2024 |
723 |
- |
The mysterious supply chain concern of string-width-cjs npm package |
Liran Tal |
Oct. 03, 2024 |
1455 |
- |
SnykLaunch Oct 2024: Enhanced PR experience, extended visibility, AI-powered security, holistic risk management |
Anthony Larkin |
Oct. 08, 2024 |
1489 |
- |
A look into your engineering interview at Snyk |
Philip Beevers |
Oct. 09, 2024 |
750 |
- |
Foundations of trust: Securing the future of AI-generated code |
Danny Allan |
Oct. 10, 2024 |
888 |
- |
Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code |
Liran Tal |
Oct. 10, 2024 |
875 |
- |
Automatically fix code vulnerabilities with AI |
Micah Silverman |
Oct. 14, 2024 |
1132 |
- |
How Snyk is prioritizing developer experience |
Anthony Larkin |
Oct. 16, 2024 |
860 |
- |
Snyk announces commitment to Service for America, bringing security education access to all |
Michael Biocchi |
Oct. 17, 2024 |
394 |
- |
Ensuring comprehensive security testing in DevOps pipelines |
Jim Armstrong |
Oct. 17, 2024 |
1317 |
- |
Introducing: Extensive AppSec visibility with Snyk Analytics |
Nastasha Casale |
Oct. 17, 2024 |
952 |
- |
Elevating Views of Risk: Holistic Application Risk Management with Snyk |
Daniel Berman |
Oct. 22, 2024 |
1601 |
- |
Women - Kickstart your Application Security Career! |
Vandana Verma Sehgal |
Oct. 22, 2024 |
1020 |
- |
Find, auto-fix, and prioritize intelligently, with Snyk's AI-powered code security tools |
Liqian Lim (林利蒨) |
Oct. 24, 2024 |
2083 |
- |
Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV) |
Liran Tal |
Oct. 23, 2024 |
1469 |
- |
Best Practices for Continuous Vulnerability Management |
Liran Tal |
Oct. 29, 2024 |
1698 |
- |
Top 5 SAST Auto-fixing Tools and How They Compare |
Liqian Lim (林利蒨) |
Oct. 29, 2024 |
966 |
- |
Lottie Player npm package compromised for crypto wallet theft |
Liran Tal |
Oct. 31, 2024 |
825 |
2 |
If you don’t know about HTTP Archive’s Web Almanac yet, you should! |
Brian Clark |
Nov. 01, 2024 |
710 |
- |
Snyk Recharge days: Making time to take time |
Adriana Bokel Herde |
May. 17, 2023 |
710 |
- |
GitFlops: The Dangers of Terraform Automation Platforms |
Elliot Ward |
Nov. 07, 2024 |
1831 |
- |
Extending Developer Security with Dev-First Dynamic Testing |
Manoj Nair |
Nov. 12, 2024 |
1565 |
- |
How ASPM boosts visibility to manage application risk |
Daniel Berman |
Nov. 12, 2024 |
1144 |
- |
5 Disaster Recovery Testing Methodologies |
Liran Tal |
Sep. 23, 2022 |
610 |
- |
Understanding command injection vulnerabilities in Go |
Liran Tal |
Nov. 14, 2024 |
1891 |
1 |
5 Best Practices for Container security |
Liran Tal |
Jul. 19, 2022 |
985 |
- |
Snyk named a Customer Favorite in The Forrester Wave™: Software Composition Analysis Software, Q4 2024 Report |
Peter McKay |
Nov. 13, 2024 |
460 |
- |
Phony PyPi package imitates known developer |
Elliot Ward |
Oct. 05, 2022 |
1031 |
2 |
An Introduction to capture the flag |
Sonya Moisset |
Sep. 13, 2023 |
828 |
- |
6 Kubernetes Tools That Can Help Secure Containers at Runtime |
Liran Tal |
Jun. 08, 2022 |
481 |
- |
Women in security: Inspiring leaders of today and tomorrow |
Jonaki Egenolf |
Nov. 19, 2024 |
433 |
- |
How to prioritize vulnerabilities based on risk |
Daniel Berman |
Nov. 19, 2024 |
1153 |
- |
A commitment to future generations: Snyk’s 2024 Student Edition Capture The Flag Recap |
Michael Biocchi |
Nov. 21, 2024 |
332 |
- |
Why a solid DevOps foundation is vital for effective DevSecOps |
Ben Desjardins |
Nov. 27, 2024 |
1117 |
- |
Measuring AppSec success: Key KPIs that demonstrate value |
Daniel Berman |
Nov. 26, 2024 |
1479 |
- |
Seven steps to close coverage gaps with ASPM |
Daniel Berman |
Dec. 03, 2024 |
1023 |
- |
2024 Open Source Security Report: Slowing Progress and New Challenges for DevSecOps |
Jamie Smith |
Dec. 03, 2024 |
973 |
- |
Empowering women in security: The impact of mentorship |
Erin Cullen |
Nov. 27, 2024 |
696 |
- |
Snyk-generated SBOMs now include license details for the open source libraries in your projects |
Jamie Smith |
Dec. 09, 2024 |
906 |
- |
How to mitigate SSRF vulnerabilities in Go |
Liran Tal |
Dec. 10, 2024 |
910 |
- |
Snyk’s risk-based approach to prioritization |
Daniel Berman |
Dec. 11, 2024 |
1082 |
- |
Ultralytics AI Pwn Request Supply Chain Attack |
Stephen Thoemmes |
Dec. 11, 2024 |
1375 |
- |
10 SDLC best practices to implement today |
Jamie Smith |
Jan. 14, 2022 |
1304 |
- |
Microservices security: 6 best practice tips |
Jamie Smith |
Feb. 10, 2022 |
1226 |
- |
Vulnerability vs Weakness: Understanding Key Differences in AppSec |
Daniel Berman |
Nov. 17, 2023 |
1934 |
- |
7 Best practices for disaster recovery testing |
Liran Tal |
Sep. 23, 2022 |
805 |
- |
Ethical Hacking: Top Tools |
Vandana Verma Sehgal |
Jun. 01, 2023 |
1601 |
- |
Top 8 AWS Security Best Practices |
Liran Tal |
Oct. 18, 2022 |
1835 |
- |
Hiring a virtual CISO to help your security team |
Manoj Nair |
Mar. 09, 2022 |
1019 |
- |
The 4 best DevSecOps tools for a secure DevOps workflow |
Liran Tal |
Jan. 23, 2024 |
1583 |
- |
Essential AI Tools to Boost Developer Productivity and Security |
Liqian Lim (林利蒨) |
Mar. 01, 2024 |
1385 |
- |
4 Advantages of using AI code review |
Rory McNamara |
Nov. 29, 2023 |
1152 |
- |
Python Code Review Tools |
Liran Tal |
Aug. 12, 2022 |
1276 |
- |
Unlocking the power of multi-cloud security |
Vandana Verma Sehgal |
Apr. 25, 2023 |
1147 |
- |
Supply Chain Security Risks & Best Practice |
Liran Tal |
Apr. 04, 2023 |
1102 |
- |
Getting started at a new organization |
Manoj Nair |
Jan. 27, 2022 |
791 |
- |
OWASP API Security Top 10 Risks |
Liran Tal |
Sep. 23, 2022 |
1816 |
- |
8 proven code review best practices for developers |
Liran Tal |
Jan. 14, 2022 |
1316 |
- |
How to implement DevSecOps in 4 steps |
Jamie Smith |
Jun. 22, 2023 |
1316 |
- |
Software Supply Chain Security Tools: Types, Features & Considerations |
Jamie Smith |
Aug. 02, 2023 |
1306 |
- |
C++ in the wild: Which industries use C++? |
Liran Tal |
Apr. 29, 2022 |
1070 |
- |
Developer-first supply chain security |
Jamie Smith |
Sep. 19, 2023 |
1330 |
- |
Top 5 Docker Security Vulnerabilities |
Liran Tal |
Oct. 31, 2022 |
1036 |
- |
Asset-first application security: What is it and how can it help |
Daniel Berman |
Nov. 03, 2023 |
1156 |
- |
The Importance of Container Monitoring |
Jamie Smith |
Mar. 02, 2022 |
1013 |
- |
Cloud security challenges |
Rory McNamara |
May. 19, 2022 |
2423 |
- |
Defense in Depth |
Daniel Berman |
Feb. 29, 2024 |
1430 |
- |
Top AWS Security Risks & Prevention |
Rory McNamara |
Mar. 02, 2023 |
1256 |
- |
Top 8 DevSecOps Best Practices - Build Securely |
Liran Tal |
Sep. 26, 2022 |
1074 |
- |
Secrets Management: Tools & Best Practice |
Jamie Smith |
Jun. 26, 2023 |
1318 |
- |
Product Security vs. Application Security: What’s the Difference? |
Rory McNamara |
Jul. 21, 2023 |
1390 |
- |
6 tips for managing your open source components |
Liran Tal |
Apr. 26, 2022 |
1364 |
- |
4 Enterprise-level security best practices |
Manoj Nair |
Jul. 20, 2023 |
617 |
- |
7 best Java code review tools for developers |
Liran Tal |
Jan. 14, 2022 |
1375 |
- |
AppSec Maturity Models |
Rory McNamara |
Mar. 08, 2024 |
1120 |
- |
Cybersecurity Hygiene 101 |
Liran Tal |
Mar. 02, 2023 |
1594 |
- |
High profile AWS breaches & how to avoid them |
Jamie Smith |
Jun. 07, 2023 |
1197 |
- |
API Security Guide |
Liran Tal |
Apr. 25, 2023 |
1338 |
- |
Did you make the *security* naughty or nice list this year? |
Mariah Gresham |
Dec. 18, 2024 |
590 |
- |
4 tips for securing GenAI-assisted development |
Sarah Conway |
Dec. 18, 2024 |
859 |
- |