Snyk in 30: Developer-first security democast |
Jim Armstrong |
Mar 02, 2023 |
1538 |
- |
Modern VS Code extension development: The basics |
Mdu Sibisi |
Sep 14, 2023 |
2775 |
- |
What kind of (security) dog are you? |
Belyn Lai |
Aug 25, 2023 |
756 |
- |
Mitigating DOM clobbering attacks in JavaScript |
Keshav Malik |
Aug 07, 2023 |
1806 |
- |
CodeSecDays conference and more complete security coverage with GitGuardian |
Sarah Conway |
Aug 10, 2023 |
989 |
- |
Snyk users don't have to worry about NVD delays |
Hadas Bloom |
Mar 13, 2024 |
734 |
- |
Automate cloud compliance with Snyk IaC |
Lauren Place |
Feb 07, 2023 |
591 |
- |
Discussions on improving security through chaos engineering |
Mariah Gresham |
Aug 03, 2023 |
966 |
- |
How to strengthen security in your CI/CD pipeline |
James Konik |
Jul 12, 2023 |
1800 |
- |
Snyk welcomes Helios, accelerating our ASPM vision with runtime insights |
Manoj Nair |
Jan 16, 2024 |
874 |
- |
Introducing Snyk’s new Risk Score for risk-based prioritization |
Gur Shafriri, Benji Catabi-Kalman |
Aug 17, 2023 |
1514 |
- |
Four easy ways to analyze your Java and Kotlin code |
Brian Vermeer |
Aug 13, 2024 |
1982 |
- |
5 ways to improve security during digital transformation |
Erin Cullen |
Apr 10, 2023 |
1007 |
- |
How to use AI for software development and cybersecurity |
Simon Maple |
Aug 30, 2023 |
1755 |
- |
SnakeYaml 2.0: Solving the unsafe deserialization vulnerability |
Brian Vermeer |
Jun 21, 2023 |
1205 |
- |
Finding YAML Deserialization with Snyk Code |
Calum Hutton |
Feb 23, 2023 |
799 |
- |
Snyk announces new Slack integration |
Sarah Conway |
May 30, 2023 |
610 |
- |
Best practices for using AI in the SDLC |
Frank Fischer |
Jul 19, 2023 |
749 |
- |
DevOpsDays Singapore 2024: Unmasking the security pitfalls in AI-generated code |
Hiroko Nakano |
Apr 23, 2024 |
562 |
- |
Engineering culture at Snyk: The values that support and drive our teams |
Sergey Vasilkov |
May 08, 2023 |
2259 |
- |
3 tips from Snyk and Dynatrace’s AI security experts |
Sarah Conway |
Jan 22, 2024 |
905 |
- |
Snyk Code, the only security tool chosen by developers in Stack Overflow's 2024 AI Search and Developer Tools survey |
Liqian Lim (林利蒨) |
Aug 27, 2024 |
901 |
- |
How to prevent NullPointerExceptions in Java |
Lucien Chemaly |
Sep 21, 2023 |
2669 |
- |
The ultimate guide to creating a secure Python package |
Gourav Singh Bais |
May 08, 2024 |
3482 |
- |
Why you need a security companion for AI-generated code |
Liqian Lim (林利蒨) |
Oct 25, 2023 |
1834 |
- |
Reduce risk to your supply chain with a software bill of materials (SBOM) |
Ryan Searle |
Jun 07, 2023 |
881 |
- |
Cybersecurity Venture’s 2023 Software Supply Chain Attack Report |
Sydney Milligan |
Oct 10, 2023 |
816 |
- |
Maximizing IAM security with AWS permissions boundaries and Snyk |
Wayne Crissman |
Jun 26, 2023 |
1019 |
- |
Data leak in the Netherlands: What developers should learn from this |
Brian Vermeer |
Mar 31, 2023 |
753 |
- |
Identify vulnerabilities in your container images with Snyk’s enhanced Docker Desktop Extension |
LaToya Muff |
Apr 11, 2023 |
363 |
- |
Learning from cloud transformation as we move to AI |
David Lugo |
May 21, 2024 |
976 |
- |
How to secure an S3 bucket on AWS? |
Liran Tal |
Jul 12, 2024 |
3393 |
- |
How Axel Springer National Media and Tech achieved continuous security with Snyk |
Nina McClure |
Sep 03, 2024 |
952 |
- |
Secure Java URL encoding and decoding |
Jura Gorohovsky |
Aug 14, 2023 |
3090 |
- |
Snyk named a Leader, placed highest in Strategy category in The Forrester Wave: Software Composition Analysis (SCA), Q2 2023 report |
Manoj Nair |
Jun 13, 2023 |
770 |
- |
Nightfall AI and Snyk unite to deliver AI-powered secrets scanning for developers |
LaToya Muff |
Nov 29, 2023 |
547 |
- |
Krampus delivers an end-of-year Struts vulnerability |
Micah Silverman |
Jan 02, 2024 |
1667 |
- |
3 tips for rebuilding a Docker image faster (and save CI seconds!) |
Liran Tal |
Dec 28, 2023 |
2564 |
- |
Does AI lead to AppSec hell or nirvana? |
Erin Cullen |
Oct 03, 2023 |
1040 |
- |
Announcing Snyk AppRisk: Elevate your AppSec game with ASPM |
Daniel Berman |
Dec 12, 2023 |
1464 |
- |
3 ways AppSec modernization is a game-changer for financial services |
Katie DeMatteis |
Sep 03, 2024 |
782 |
- |
SnykLaunch April '23: C/C++ expansion, cloud and IaC updates, custom container security, new integrations, and more |
Jim Armstrong |
Apr 04, 2023 |
1462 |
- |
New SEC cybersecurity rules put more onus on the CISO, not so much on directors |
Myke Lyons |
Aug 03, 2023 |
1578 |
- |
Enhancing code to cloud security with the Common Configuration Scoring System |
Wayne Crissman |
Dec 14, 2023 |
998 |
- |
Snyk welcomes Enso: Enabling security leaders to scale their AppSec program with ASPM |
Manoj Nair |
Jun 07, 2023 |
972 |
- |
Leaky Vessels: Docker and runc container breakout vulnerabilities (January 2024) |
Jamie Smith |
Jan 31, 2024 |
1729 |
41 |
Introducing Snyk’s partnership with Gemini Code Assist |
David Lugo |
Apr 09, 2024 |
682 |
- |
Snyk is named a Strong Performer as a first-time entrant in the Forrester Wave™: Static Application Security Testing (SAST) Q3 2023 |
Peter McKay |
Sep 20, 2023 |
696 |
- |
Day in the life of a food giant CISO |
Vandana Verma Sehgal |
Apr 18, 2024 |
668 |
- |
Snyk & Atlassian: How to embed security in AI-assisted software development |
LaToya Muff |
Feb 14, 2024 |
1030 |
- |
Integrating Snyk Code SAST results in your ServiceNow workflows |
Sarah Conway |
May 07, 2024 |
514 |
- |
Three reasons to invest in an ASPM solution in 2024 |
Julia Kraut |
Dec 12, 2023 |
610 |
- |
With Love, Your Applications |
Krysta Williams-Timm |
Feb 14, 2024 |
373 |
- |
Three trends shaping software supply chain security today |
Erin Cullen |
Aug 22, 2024 |
923 |
- |
Using insecure npm package manager defaults to steal your macOS keyboard shortcuts |
Yagiz Nizipli |
Jun 28, 2023 |
1102 |
- |
AI quality: Garbage in, garbage out |
Michael Biocchi |
Jun 11, 2024 |
730 |
- |
How to secure JavaScript applications right from the CLI |
Gideon Idoko |
Oct 24, 2023 |
2412 |
- |
10 best practices for securely developing with AI |
Simon Maple |
Sep 27, 2023 |
3204 |
- |
Snyk top 10 code vulnerabilities report |
Mariah Gresham |
May 18, 2023 |
424 |
1 |
Setting up the Docker image scan GitHub Action |
Mohammad-Ali A'râbi |
May 19, 2023 |
1076 |
- |
Getting started with PHP static analysis in 2024 |
Liran Tal |
Mar 21, 2024 |
2431 |
- |
Introducing the Snyk App for Compass: A complete view of software component risk |
LaToya Muff |
Oct 05, 2023 |
662 |
- |
How to prevent XPath injection attacks |
Marcelo Oliveira |
May 10, 2023 |
2175 |
- |
Securing your SBOM on Google Cloud |
David Lugo |
Mar 28, 2024 |
983 |
- |
More accurate than GPT-4: How Snyk’s CodeReduce improved the performance of other LLMs |
Eric Fernandez |
May 07, 2024 |
1245 |
- |
Can AI write secure code? |
Frank Fischer |
May 03, 2023 |
2244 |
- |
Introducing parlay, a tool for enriching SBOMs |
Gareth Rushgrove |
Jun 07, 2023 |
773 |
- |
360 degrees of application security with Snyk |
Soumen Mukherjee |
Apr 24, 2024 |
1273 |
- |
How to keep an HTTP connection alive for 9 hours |
Micah Silverman |
Oct 23, 2023 |
2391 |
3 |
Creating SBOMs with the Snyk CLI |
Brian Vermeer |
Feb 08, 2024 |
1348 |
- |
Vulnerability: runc process.cwd and leaked fds container breakout (CVE-2024-21626) |
Rory McNamara |
Jan 31, 2024 |
1114 |
3 |
Ethical hacking techniques |
Vandana Verma Sehgal |
Jun 05, 2023 |
1713 |
- |
Snykers share wellness tips for mental health awareness month |
Belyn Lai |
May 30, 2023 |
706 |
- |
Snyk Partner Speaks series: True DevSecOps with Snyk and Dynatrace |
Sarah Conway |
Jun 08, 2023 |
177 |
- |
Snyk enhances ServiceNow with comprehensive insights into vulnerabilities in open source software |
Marco Morales |
Jan 24, 2023 |
633 |
- |
Snyk Ranked #19 on 2023 Forbes Cloud 100 List |
Peter McKay |
Aug 08, 2023 |
430 |
- |
Going beyond “shift left” to extend AppSec in all directions |
Ben Desjardins |
Jul 09, 2024 |
968 |
- |
Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub |
Vandana Verma Sehgal |
Jun 22, 2023 |
399 |
- |
Snyk Partner Speak Video Series Puts Spotlight on New Integrations |
Sarah Conway |
Apr 12, 2023 |
181 |
- |
How to build a modern DevSecOps culture: Lessons from Jaguar Land Rover and Asda |
Brian Piper |
Feb 21, 2024 |
1209 |
- |
Amplifying AAPI Voices to Honor Asian American Pacific Islander Heritage Month |
Belyn Lai, Yos Pang |
May 25, 2023 |
1495 |
- |
Integrating the Snyk Language Server with IntelliJ IDEs |
Arvyd Paeglit |
Jun 17, 2024 |
344 |
- |
Black Hat Asia customer panel recap: How to lead DevSecOps adoption |
Brian Piper |
Sep 18, 2023 |
821 |
- |
Recap: Stress-Free Security for Devs and Ops on AWS |
David Lugo |
Apr 03, 2023 |
1341 |
- |
Polyfill supply chain attack embeds malware in JavaScript CDN assets |
Liran Tal |
Jun 26, 2024 |
1892 |
- |
Snyk Fetch the Flag CTF 2023 writeup: Audiopolis |
John Hammond |
Nov 30, 2023 |
278 |
- |
Securing the digital future: Reviewing the Biden-Harris administration's National Cybersecurity Strategy |
Vandana Verma Sehgal |
Mar 20, 2023 |
713 |
- |
A security expert’s view on Gartner’s generative AI insights |
Liqian Lim (林利蒨) |
Aug 07, 2024 |
1729 |
- |
Snyk CLI: Introducing Semantic Versioning and release channels |
Chintan B. |
Apr 30, 2024 |
930 |
- |
Call for action: Exploring vulnerabilities in Github Actions |
Elliot Ward, Rory McNamara, Raul Onitza-Klugman |
Jun 06, 2024 |
3977 |
- |
Session management security: Best practices for protecting user sessions |
Okoth Pius |
Jul 11, 2023 |
2703 |
1 |
Data loss prevention for developers |
Annabel Gauci |
May 24, 2023 |
2103 |
2 |
Snyk and Atlassian deepen partnership with Snyk security in Jira Software |
Jill Wilkins |
Feb 08, 2023 |
412 |
- |
10 modern Node.js runtime features to start using in 2024 |
Liran Tal |
May 29, 2024 |
5030 |
2 |
Snyk and AWS announce native Amazon EKS support directly from the AWS Management Console |
David Lugo |
Jun 12, 2024 |
418 |
- |
5 Node.js security code snippets every backend developer should know |
Liran Tal |
Feb 28, 2024 |
3106 |
- |
Introducing the ASPM Masterclass |
Erin Cullen |
Mar 12, 2024 |
504 |
- |
Dependency injection in Python |
Lucien Chemaly |
Oct 31, 2023 |
2919 |
- |
Snyk Apps now GA: An easy, standardized, and secure framework for building custom integrations |
Sarah Conway |
Nov 20, 2023 |
1108 |
- |
Manage security issues in Jira with Snyk Security in Jira Cloud |
LaToya Muff |
Aug 09, 2023 |
330 |
- |
Securing symmetric encryption algorithms in Java |
Brian Vermeer |
Oct 18, 2023 |
1489 |
- |
Preventing insecure deserialization in Node.js |
Benson Kuria Macharia |
Apr 17, 2023 |
1890 |
- |
Building a security-conscious CI/CD pipeline |
Peter De Tender |
Jun 29, 2023 |
1529 |
- |
Is your team on the *security* naughty or nice list? |
Mariah Gresham |
Dec 20, 2023 |
873 |
- |
How REI built a DevSecOps culture and how Snyk helped |
Brian Piper |
Feb 27, 2024 |
1154 |
- |
Snyk achieves Red Hat Vulnerability Scanner Certification |
Tomás González Blasini, David Lugo |
Apr 03, 2023 |
391 |
- |
How to find and fix Critical WebP zero-day vulnerability CVE-2023-4863 |
Brian Clark, Eric Smalling, Tim Gowan |
Oct 05, 2023 |
1282 |
- |
Weak Hash vulnerability discovered in crypto-js and crypto-es (CVE-2023-46233 & CVE-2023-46133) |
Jamie Smith |
Oct 25, 2023 |
1509 |
- |
How to update cURL |
Brian Clark, Eric Smalling |
Oct 11, 2023 |
1772 |
- |
AWS top 10 misconfigurations and how to fix them: A cheat sheet |
Erin Cullen |
Mar 15, 2023 |
1546 |
- |
Handling security vulnerabilities in Spring Boot |
Brian Vermeer |
Nov 29, 2023 |
1451 |
- |
Three considerations for building an effective security program |
Alex Bovee |
May 04, 2023 |
920 |
- |
Top 8 penetration testing tools |
Benson Kuria Macharia |
May 25, 2023 |
1172 |
- |
Snyk Learn and the NIST Cybersecurity Framework (CSF) |
Michael Biocchi |
Mar 06, 2024 |
523 |
- |
Snyk Fetch the Flag CTF 2023 writeup: Protect The Environment |
John Hammond |
Nov 30, 2023 |
243 |
- |
Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195) |
Liran Tal |
Jan 18, 2024 |
1059 |
- |
Accelerate C/ C++ security with Snyk |
Marcie Cheung |
Dec 05, 2023 |
614 |
- |
Mastering Python virtual environments: A complete guide to venv, Docker, and securing your code |
Liran Tal |
Jan 10, 2024 |
1589 |
- |
Snyk Fetch the Flag CTF 2023 writeup: I Do Math |
John Hammond |
Nov 30, 2023 |
190 |
- |
How to protect Node.js apps from CSRF attacks |
Victor Ikechukwu |
Oct 17, 2023 |
3146 |
- |
Snyk integrates with AWS Security Hub to automate security remediation workflows |
David Lugo |
Jun 12, 2023 |
884 |
- |
How to implement SSL/TLS pinning in Node.js |
Nwani Victory |
Aug 29, 2023 |
2298 |
- |
Streamline dependency updates with Mergify and Snyk |
Liran Tal |
Aug 23, 2023 |
1548 |
- |
5 security best practices for adopting generative AI code assistants like GitHub Copilot |
Liqian Lim (林利蒨) |
Mar 05, 2024 |
1368 |
- |
A denial of service Regex breaks FastAPI security |
Liran Tal |
Jul 31, 2024 |
1878 |
- |
How secure is WebAssembly? 5 security concerns unique to WebAssembly |
Marcelo Oliveira |
Jul 28, 2023 |
1448 |
2 |
The Docker project turns 10! Looking back at a decade of containers |
Eric Smalling |
Mar 17, 2023 |
3058 |
- |
Talk to us about Snyk CLI |
Chintan B., Neil Mackay |
Jun 06, 2024 |
859 |
- |
How Mulesoft fosters a developer-first, shift-left culture with Snyk |
Gerald Crescione |
Apr 30, 2024 |
798 |
- |
The art of conditional rendering: Tips and tricks for React and Next.js developers |
Kumar Harsh |
Oct 30, 2023 |
2865 |
- |
Snyk's 2023 State of Open Source Security: Supply chain security, AI, and more |
Simon Maple |
Jul 26, 2023 |
1184 |
- |
Snyk achieves AWS Security Competency |
David Lugo |
Nov 15, 2023 |
514 |
- |
Preventing SQL injection attacks in Node.js |
Lucien Chemaly |
Feb 20, 2024 |
2260 |
- |
SnykLaunch June ‘23: Insights and DeepCode AI enable faster fixes and prioritization |
Jim Armstrong |
Jun 07, 2023 |
1567 |
- |
Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk |
Chandler Mayo |
Jun 25, 2024 |
902 |
- |
Does GitOps enhance application security? |
Vandana Verma Sehgal |
Aug 21, 2023 |
1026 |
- |
What are AI hallucinations and why should developers care? |
Liran Tal |
Aug 16, 2023 |
2376 |
1 |
Welcoming Danny Allan and Brian Rogan: Snyk leadership team expands with key appointments to accelerate innovation |
Peter McKay |
Feb 06, 2024 |
492 |
- |
Snyk welcomes Reviewpad: Code, commit, celebrate! |
Manoj Nair |
Oct 30, 2023 |
606 |
- |
Our favorite 2023 Snyk Fetch the Flag CTF writeups from the community |
Danielle Bradford |
Nov 21, 2023 |
183 |
- |
Top 3 security best practices for handling JWTs |
Liran Tal |
Dec 18, 2023 |
2007 |
- |
A quick primer on LDAP injection |
Eric Kahuha |
Jun 01, 2023 |
1379 |
- |
10 GitHub Security Best Practices |
Brian Vermeer |
Feb 05, 2024 |
3532 |
3 |
.NET developers alert: Moq NuGET package exfiltrates user emails from git |
Liran Tal |
Aug 09, 2023 |
831 |
2 |
Modern VS Code extension development tutorial: Building a secure extension |
Mdu Sibisi |
Oct 02, 2023 |
3917 |
- |
Control your role! Kubernetes RBAC explored |
James Walker |
Jul 27, 2023 |
2123 |
- |
The importance of platform engineers in a security program |
Elliott Spira |
Apr 13, 2023 |
962 |
- |
Snyk Partner Speak Video with ServiceNow: A complete view of application security |
Sarah Conway |
May 02, 2023 |
196 |
- |
Reporting AppSec risk up to your CISO |
Kate Powers Burke, Ezra Tanzer |
Feb 13, 2024 |
1945 |
- |
Securing next-gen development: Lessons from Trust Bank and TASConnect |
Gerald Crescione |
Jun 05, 2024 |
1312 |
- |
Snyk brings developer-first AppSec approach to C/C++ |
Roy Ram, Neha Shenoy |
Apr 04, 2023 |
1094 |
- |
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant |
Brian Vermeer |
Aug 29, 2024 |
1000 |
- |
DevSecOps lifecycle coverage with new Snyk and Dynatrace app |
Sarah Conway |
May 15, 2023 |
507 |
- |
How Snyk ensures safe adoption of AI |
Akanchha Shrivastava |
Mar 27, 2024 |
1534 |
- |
Signing container images: Comparing Sigstore, Notary, and Docker Content Trust |
Hrittik Roy |
Sep 26, 2023 |
3098 |
- |
Real-time threat protection with Snyk and SentinelOne |
Shivam Jindal |
Nov 09, 2023 |
679 |
- |
Secure JavaScript URL validation |
Mannan Tirmizi |
May 09, 2023 |
1940 |
6 |
Using JLink to create smaller Docker images for your Spring Boot Java application |
Brian Vermeer |
Aug 24, 2023 |
1499 |
- |
Adding Snyk security to Jira and Bitbucket Cloud |
LaToya Muff |
Oct 25, 2023 |
647 |
- |
Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code |
Brian Vermeer |
Apr 25, 2023 |
1523 |
- |
SocketSleuth: Improving security testing for WebSocket applications |
Elliot Ward |
Sep 06, 2023 |
843 |
- |
AI-generated security fixes in Snyk Code now available |
Jim Armstrong |
May 09, 2023 |
823 |
- |
Snyk named to CNBC 2023 Disruptor 50 List |
Peter McKay |
May 09, 2023 |
311 |
- |
Navigating the AI-powered development era in financial services |
Lawrence Crowther |
Aug 26, 2024 |
826 |
- |
Achieving developer security adoption at Nylas with Snyk |
Erin Cullen |
Dec 04, 2023 |
762 |
- |
Top 5 security concerns for infrastructure as code |
Raphael Mun |
Jul 14, 2023 |
1565 |
- |
8 tips for securing your CI/CD pipeline with Snyk |
Eric Smalling |
Jul 20, 2023 |
3928 |
- |
Timing out synchronous functions with regex |
Steve Shani |
Apr 06, 2023 |
1071 |
- |
How Okta empowers devs to find & fix security issues with Snyk |
Mariah Gresham |
Aug 25, 2023 |
958 |
- |
7 tips to become a successful bug bounty hunter |
Ben Sadeghipour |
Jan 25, 2024 |
1246 |
- |
Nine Docker pro tips for Node.js developers |
Liran Tal |
Apr 11, 2024 |
1630 |
- |
Announcing IaC+ early access: Secure your infrastructure configurations across the SDLC |
Lauren Place |
Oct 03, 2023 |
686 |
- |
How to generate an SBOM for JavaScript and Node.js applications |
Liran Tal |
May 22, 2023 |
2795 |
- |
Build and deploy a Node.js security scanning API to Platformatic Cloud |
Liran Tal |
Jan 05, 2024 |
2980 |
- |
Buildkit GRPC SecurityMode privilege check: Build-time container breakout (CVE-2024-23653) |
Rory McNamara |
Jan 31, 2024 |
946 |
- |
What does Biden's Executive Order on AI safety measures mean for businesses? |
Liqian Lim (林利蒨) |
Nov 02, 2023 |
2399 |
- |
Kroger’s approach to supply chain security |
Brian Piper |
Jan 02, 2024 |
888 |
- |
AppSec spring cleaning checklist |
Mariah Gresham |
May 13, 2024 |
783 |
- |
Welcoming Diana Brunelle: Snyk’s New Chief People Officer |
Peter McKay |
Jul 22, 2024 |
336 |
- |
Installing and managing Java on macOS |
Keshav Malik |
Oct 12, 2023 |
1464 |
- |
The importance of verifying webhook signatures |
Marcelo Oliveira |
Jun 29, 2023 |
1829 |
- |
Three ways Snyk made software supply chains more secure in 2022 |
Jamie Smith |
Jan 12, 2023 |
1390 |
- |
Rego 102: Combining queries with AND/OR and custom messages |
Jasper Van der Jeugt, Becki Lee |
Nov 09, 2023 |
2514 |
- |
Best practices for building a production-ready Dockerfile for PHP applications |
James Walker |
Aug 22, 2023 |
2507 |
- |
A guide to input validation with Spring Boot |
Lucien Chemaly |
Sep 12, 2023 |
2751 |
- |
What’s new in CVSS 4.0 |
Paul Lascar |
Nov 08, 2023 |
1679 |
- |
GitHub “besieged” by malware repositories and repo confusion: Why you'll be ok |
Liran Tal |
Mar 12, 2024 |
2102 |
- |
Snyk Code’s autofixing feature, DeepCode AI Fix, just got better |
Eric Fernandez, Berkay Berabi |
Apr 23, 2024 |
2452 |
- |
5 tips for adopting AI code assistance securely |
Liqian Lim (林利蒨) |
May 30, 2024 |
856 |
- |
Abusing Ubuntu 24.04 features for root privilege escalation |
Rory McNamara |
Sep 09, 2024 |
5975 |
189 |
Snyk's AppSec dream team |
Krysta Williams-Timm |
Mar 19, 2024 |
843 |
- |
Limitations of a single AI model |
Frank Fischer |
Aug 07, 2023 |
1401 |
- |
Automate security controls from development to production on Google Cloud |
David Lugo |
Jun 18, 2024 |
1073 |
- |
My internship journey at Snyk |
Caroline Gow |
Feb 16, 2023 |
1329 |
- |
Copilot amplifies insecure codebases by replicating vulnerabilities in your projects |
Randall Degges |
Feb 22, 2024 |
1578 |
- |
Snyk Partner Speak video series with HashiCorp |
Sarah Conway |
Oct 04, 2023 |
180 |
- |
10 Dimensions of Python Static Analysis |
Liran Tal |
Jul 17, 2024 |
4861 |
- |
A security expert’s view on Gartner’s generative AI insights - Part 2 |
Liqian Lim (林利蒨) |
Aug 08, 2024 |
1231 |
- |
High severity vulnerability found in libcurl and curl (CVE-2023-38545) |
Hadas Bloom |
Oct 04, 2023 |
1104 |
- |
Improved risk assessment with EPSS scores in Snyk |
Daniel Berman |
May 22, 2023 |
1297 |
- |
Node.js vs. Deno vs. Bun: JavaScript runtime comparison |
James Konik |
Sep 05, 2023 |
2966 |
- |
Rego 101: Introduction to Rego |
Becki Lee |
Nov 02, 2023 |
2503 |
- |
Why ASPM is the future of AppSec: Key points from our newest whitepaper |
Sarah Conway |
Jun 18, 2024 |
1177 |
- |
Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools |
Calum Hutton |
Nov 27, 2023 |
1511 |
- |
7 AppSec tips from Snowflake’s Director of Product Security |
Brian Piper |
Aug 31, 2023 |
850 |
- |
Breaking caches and bypassing Istio RBAC with HTTP response header injection |
Rory McNamara |
Jun 20, 2024 |
2498 |
- |
How to choose a security tool for your AI-generated code |
Liqian Lim (林利蒨) |
Jan 09, 2024 |
1774 |
- |
File encryption in Python: An in-depth exploration of symmetric and asymmetric techniques |
Keshav Malik |
Nov 22, 2023 |
2132 |
- |
How to Dockerize a PHP application securely |
James Olaogun |
Aug 02, 2023 |
2389 |
1 |
Best practices for effective attack surface analysis |
Benson Kuria Macharia |
Jul 18, 2023 |
1659 |
- |
Secure password hashing in Go |
Love Bhardwaj |
Dec 05, 2023 |
3088 |
- |
New IaC security workshop from Snyk, HashiCorp, and AWS at KubeCon Europe 2023 and on-demand |
Sarah Conway |
Apr 10, 2023 |
1035 |
- |
Snyk is your security companion for Amazon CodeWhisperer |
Liqian Lim (林利蒨) |
Nov 29, 2023 |
1817 |
- |
6 steps for scaling risk-based AppSec programs |
Julia Kraut |
Oct 13, 2023 |
938 |
- |
Power up security collaboration with Snyk and Slack |
Sarah Conway |
Oct 23, 2023 |
271 |
- |
Exploiting HTTP/2 CONTINUATION frames for DoS attacks |
Vandana Verma Sehgal |
Apr 08, 2024 |
696 |
- |
Repo Jacking: The Great Source-code Swindle |
Elliot Ward |
Jul 25, 2024 |
2516 |
- |
Security implications of cross-origin resource sharing (CORS) in Node.js |
Victor Ikechukwu |
Sep 13, 2023 |
2582 |
- |
Snyk highlights AWS re:Invent 2023 |
David Lugo |
Dec 14, 2023 |
820 |
- |
The Snyk Perpetual Key Rotation Machine |
Megan Moore |
Apr 01, 2023 |
1000 |
- |
Developer-centric DAST with Bright Security |
Vitaly Unic |
Apr 14, 2023 |
1496 |
- |
Embrace your next cybersecurity career with The Big Fix |
Liran Tal |
Feb 22, 2023 |
692 |
- |
The XZ backdoor CVE-2024-3094 |
Liran Tal |
Mar 31, 2024 |
1800 |
- |
How Snyk can help secure supply chains per "A Guide to Implementing the Software Bill of Materials (SBOM) for Software Management"’ by Japan's METI |
Hiroko Nakano |
Aug 01, 2023 |
566 |
- |
Patches of Pride: Love, inclusivity, & cute pets in celebration of Pride month |
Ashley Ladd |
Jun 20, 2023 |
463 |
- |
Snyk's AppSec journey in 2022 |
Jason Lane |
Jan 11, 2023 |
1554 |
- |
Bolstering Snyk's developer security platform in 2022 |
Daniel Berman |
Jan 09, 2023 |
2059 |
- |
Snyk integrates with AWS CloudTrail Lake to simplify security audits |
David Lugo |
Feb 01, 2023 |
551 |
- |
Fastify plugins as building blocks for a backend Node.js API |
Liran Tal |
May 28, 2024 |
2479 |
- |
Snyk scanning capabilities are now embedded in Jira Software |
Sarah Conway |
Jun 06, 2023 |
658 |
- |
InCyber Forum Europe recap: 4 tips from DevSecOps experts |
Nina McClure |
Aug 14, 2024 |
1217 |
- |
Snyk Week of Impact 2023: A week of meaningful contributions and community engagement |
Bianca Matei |
Nov 08, 2023 |
567 |
- |
SnykLaunch recap: Custom Base Image Recommendations |
Jamie Smith |
Apr 04, 2023 |
1133 |
- |
Demystifying the AWS shared security responsibility model |
David Lugo |
Nov 13, 2023 |
1004 |
- |
Mitigating path traversal vulns in Java with Snyk Code |
Brian Vermeer |
Mar 06, 2023 |
1044 |
2 |
How to integrate ASPM with your application security program |
Vandana Verma Sehgal |
Nov 28, 2023 |
1258 |
- |
Top considerations for addressing risks in the OWASP Top 10 for LLMs |
Simon Maple |
Sep 07, 2023 |
3135 |
- |
Swift deserialization security primer |
Sam Sanoop |
Jul 18, 2023 |
1155 |
- |
Implementing TLS in Kubernetes |
Rubaiat Hossain |
Jul 31, 2023 |
2063 |
- |
How to secure a REST API? |
Liran Tal |
Jun 27, 2024 |
2768 |
- |
Getting started with query parameterization |
Mary Gathoni |
Oct 24, 2023 |
2337 |
- |
Finding and fixing insecure direct object references in Python |
Keshav Malik |
Jul 19, 2023 |
1509 |
- |
Preventing SQL injection in C# with Entity Framework |
Brian Vermeer |
Jul 30, 2024 |
1273 |
- |
Securing the web (forward) |
Daniel Appelquist |
Mar 27, 2023 |
1233 |
- |
Snyk AppRisk Pro: A holistic approach to application risk management |
Daniel Berman |
May 01, 2024 |
1597 |
- |
Secure AI tool adoption: Perceptions and realities |
Alex Salkever |
Jun 04, 2024 |
733 |
- |
Building Vue 3 components with Tailwind CSS |
Mary Gathoni |
Feb 21, 2023 |
2017 |
- |
Automatic source locations with Rego |
Jasper Van der Jeugt |
Feb 12, 2024 |
2614 |
- |
New year ushers in new wave of Snyk Technology Alliance Partner Program members |
Sarah Conway |
Jan 12, 2023 |
444 |
- |
4 AI coding risks and how to address them |
Liqian Lim (林利蒨) |
Jun 13, 2024 |
1200 |
- |
Why “vulnerability management” falls short in modern application security |
Daniel Berman |
Jun 13, 2024 |
988 |
- |
Leaky Vessels deep dive: Escaping from Docker one syscall at a time |
Rory McNamara |
Feb 06, 2024 |
10279 |
4 |
Critical WebP 0-day security CVE-2023-4863 impacts wider software ecosystem |
Brian Clark, Eric Smalling, Jonathan Moses |
Sep 28, 2023 |
1825 |
- |
OSPO security evolution: The Kübler-Ross Model of open source |
Dan Appelquist |
Jan 12, 2023 |
783 |
- |
Snyk integrates with Amazon EventBridge to enable secure AppDev at scale |
David Lugo |
Jun 12, 2023 |
735 |
- |
Snyk Fetch the Flag CTF 2023 writeup: Silent Cartographer |
John Hammond |
Nov 30, 2023 |
362 |
- |
Application vulnerability management best practices |
Mariah Gresham |
Aug 06, 2024 |
1240 |
- |
Snyk recognized as an Emerging Segment Leader in Application Security in Snowflake's Next Generation of Cybersecurity Applications report |
LaToya Muff |
Dec 11, 2023 |
658 |
- |
Gitpod remote code execution 0-day vulnerability via WebSockets |
Elliot Ward |
Feb 27, 2023 |
2121 |
1 |
A day in the life of an ethical hacker |
Sonya Moisset |
Jun 05, 2023 |
2679 |
- |
How to prevent open redirect vulnerabilities in Laravel |
Kevin Kimani |
Dec 27, 2023 |
1696 |
- |
Find and fix HTTP/2 rapid reset zero-day vulnerability CVE-2023-44487 |
Jamie Smith, Kriti Dogra, Anthony Larkin |
Oct 11, 2023 |
1225 |
- |
Six takeaways from our ASPM masterclass series |
Erin Cullen |
Apr 10, 2024 |
1110 |
- |
Snyk transformed cloud security in 2022 with developer-first solution |
Lauren Place |
Jan 11, 2023 |
1211 |
- |
Snyk Fetch the Flag CTF 2023 writeup: Off the SETUID |
Carlos Polop |
Nov 30, 2023 |
1710 |
- |
Three expert tips for cultivating secure software development practices |
Simon Maple |
Mar 01, 2023 |
896 |
- |
Node.js multithreading with worker threads: pros and cons |
James Walker |
Feb 27, 2023 |
2120 |
2 |
Code injection in Python: examples and prevention |
Lucien Chemaly |
Dec 06, 2023 |
1807 |
- |
PulseMeter Report: Software supply chains |
Erin Cullen |
Mar 21, 2023 |
708 |
- |
4 best practices for cultivating developer security adoption |
Erin Cullen |
Apr 20, 2023 |
897 |
- |
A stepping stone towards holistic application risk and compliance management of the Digital Operational Resiliency Act (DORA) |
Ben Desjardins |
Jul 11, 2024 |
1834 |
- |
Top 5 VS Code extensions for security |
Brian Clark |
Aug 24, 2023 |
1654 |
- |
Celebrating Juneteenth at Snyk |
Sherica Bryan |
Jun 16, 2023 |
858 |
- |
Vulnerabilities in NodeJS C/C++ add-on extensions |
Alessio Della Libera |
Aug 14, 2024 |
2808 |
- |
Fix cloud security issues faster and at the source with Snyk IaC |
Anthony Larkin |
Apr 04, 2023 |
632 |
- |
Improving the UI/UX of the Snyk VS Code extension |
Andy Gongea |
Nov 21, 2023 |
702 |
- |
Snyk Learn now aligns with the NIST NICE Workforce Framework |
Michael Biocchi |
Jun 07, 2023 |
471 |
- |
Common SAML vulnerabilities and how to remediate them |
Sam Sanoop |
Dec 19, 2023 |
966 |
- |
The Secure Developer: Security champions recap |
Sam Hepburn |
Jun 14, 2023 |
1365 |
- |
What can you do with an enriched SBOM? A parlay quickstart guide |
Gareth Rushgrove |
Jun 07, 2023 |
1077 |
- |
Snyk named a Leader in 2023 Gartner® Magic Quadrant™ for Application Security Testing |
Manoj Nair |
May 23, 2023 |
949 |
- |
Preventing server-side request forgery in Node.js applications |
David Ekete |
Feb 20, 2024 |
1759 |
- |
Symmetric vs. asymmetric encryption: Practical Python examples |
Josh Amata |
May 15, 2024 |
4010 |
- |
Snyk named a 2023 Gartner Peer Insights™ Customers’ Choice for Application Security Testing |
Ciana Abdollahian |
Dec 04, 2023 |
622 |
- |
Preventing broken access control in express Node.js applications |
Ben Smitthimedhin |
May 22, 2024 |
2923 |
- |
The SecurityManager is getting removed in Java: What that means for you |
Mdu Sibisi |
Jun 15, 2023 |
2238 |
- |
Building an npm package compatible with ESM and CJS in 2024 |
Liran Tal |
Apr 18, 2024 |
1082 |
- |
Extend the power of your AppSec data with the new Snyk and Snowflake integration |
Guy Plotnik |
Aug 06, 2024 |
1095 |
- |
Vulnerability disclosure: Which comes first, the security bug in PHP or the CVE? |
Liran Tal |
Dec 19, 2023 |
841 |
- |
Snyk sponsors Snowflake Summit |
LaToya Muff |
Jun 04, 2024 |
569 |
- |
An investigation into code injection vulnerabilities caused by generative AI |
Jack Hair |
Apr 16, 2024 |
983 |
- |
Lessons from OpenSSL vulnerabilities part 1: Preparing your supply chain for the next critical vulnerability |
Jamie Smith |
Apr 19, 2023 |
1133 |
- |
Manage security issues in Jira with Snyk Security in Jira Cloud |
LaToya Muff |
Aug 09, 2023 |
330 |
- |
Lessons from OpenSSL vulnerabilities part 2: Finding and fixing supply chain vulnerabilities |
Jamie Smith |
Apr 26, 2023 |
1977 |
- |
5 tips to supercharge app security from code to cloud |
Sonya Moisset |
Aug 08, 2023 |
2759 |
- |
The dangers of setattr: Avoiding Mass Assignment vulnerabilities in Python |
Jack Hair |
Feb 15, 2023 |
1334 |
- |
Buildkit mount cache race: Build-time race condition container breakout (CVE-2024-23651) |
Rory McNamara |
Jan 31, 2024 |
1022 |
- |
XS leaks: What they are and how to avoid them |
Gino Diño |
Jul 17, 2023 |
2287 |
1 |
SAS and Snyk discuss the future of AI for development and security teams |
Brian Piper |
Oct 09, 2023 |
848 |
- |
Suspicious Maintainer Unveils Threads of npm Supply Chain Attack |
Liran Tal |
Jul 16, 2024 |
1524 |
- |
New Year's security resolutions for 2024 from Snyk DevRel, SecRel, and friends |
Micah Silverman |
Jan 18, 2024 |
1188 |
- |
Buildkit build-time container teardown arbitrary delete (CVE-2024-23652) |
Rory McNamara |
Jan 31, 2024 |
879 |
- |
What you should know about PHP code security |
Liran Tal |
Sep 04, 2024 |
1773 |
- |
Secure your software supply chain with the new Snyk Vulnerability Intelligence for SBOM ServiceNow integration |
Sarah Conway |
Nov 07, 2023 |
531 |
- |
Snyk documentation: Our journey so far |
David Bailey |
Feb 29, 2024 |
978 |
- |
Snyk and ServiceNow collaborate on new SBOM solution |
Sarah Conway |
May 16, 2023 |
470 |
- |
Agent hijacking: The true impact of prompt injection attacks |
Elliot Ward, Rory McNamara, Mateo Rojas-Carulla, Sam Watts, Eric Allen |
Aug 28, 2024 |
2758 |
- |
Mimic your mental model with Project Collections |
Waleed Arshad |
Jun 27, 2023 |
745 |
- |
Rego 103: Types of values and rules |
Jasper Van der Jeugt, Becki Lee |
Nov 16, 2023 |
3425 |
- |
Introducing new Snyk AppRisk integrations: Enhancing application risk management with development context |
Daniel Berman |
Aug 01, 2024 |
890 |
- |
Understanding Kubernetes Pod Security Standards |
Gino Diño |
Jun 20, 2023 |
1389 |
- |
Avoiding mass assignment vulnerabilities in Node.js |
Benson Kuria Macharia |
Mar 28, 2023 |
2321 |
- |
Snyk Fetch the Flag CTF 2023 writeup: Honey Baked Messages |
John Hammond |
Nov 30, 2023 |
298 |
- |
Essential Node.js backend examples for developers in 2024 |
Liran Tal |
Jun 12, 2024 |
2643 |
- |
A developer’s best friend: Lessons learned from our canine companions about AI code security |
Krysta Williams-Timm |
Aug 26, 2024 |
803 |
- |
Preventing XSS in Django |
Liran Tal |
Mar 13, 2023 |
1932 |
- |
Snyk Code now secures AI builds with support for LLM sources |
Liqian Lim (林利蒨), Ranko Cupovic |
Jun 25, 2024 |
571 |
- |
Announcing Insights: Helping you focus on top risks for your organization |
Daniel Berman |
Jun 07, 2023 |
1737 |
- |
Priorities from the OpenSSF Secure Open Source Software Summit 2023 |
Dan Appelquist |
Oct 04, 2023 |
381 |
- |
Introducing the Snyk Partner Solutions Directory for discovering Snyk technology integrations |
Cara Sampson |
Apr 03, 2023 |
996 |
- |
Snyk’s Evolution: A Message From CEO Peter McKay |
Peter McKay |
Apr 13, 2023 |
549 |
- |
How to install Java on macOS |
Liran Tal |
Apr 17, 2024 |
2820 |
- |
CISO playbook: 3 things to consider when establishing a security culture |
Simon Maple |
Mar 09, 2023 |
1249 |
- |
GitHub Copilot code security: XSS in React |
Liran Tal |
Oct 19, 2023 |
2044 |
- |
Security success in the Bay Area with Slack |
Mariah Gresham |
May 17, 2023 |
878 |
- |
How to setup Deno Dev Container on GitHub Codespaces? |
Liran Tal |
Jul 18, 2024 |
2097 |
- |
Command injection in Python: examples and prevention |
Rubaiat Hossain |
Dec 21, 2023 |
2558 |
- |
How to avoid web cache poisoning attacks |
Najia Gul |
Sep 11, 2023 |
2155 |
- |
How to secure Python Flask applications |
Gourav Singh Bais |
May 21, 2024 |
4209 |
- |
Fetch the Flag CTF 2023 sneak peek |
Danielle Bradford |
Sep 06, 2023 |
187 |
- |
A DevSecOps solution for your apps on AWS from Snyk |
David Lugo |
Nov 28, 2023 |
900 |
- |
Snyk named as a top cybersecurity company in inaugural Fortune Cyber 60 2023 list |
Snyk Team |
Dec 18, 2023 |
337 |
- |
Security vs. Development: A game of priorities |
Andrew MacKenzie |
Nov 06, 2023 |
1009 |
- |
Identifying Insecure C Code with Valgrind and Fixing with Snyk Code |
Liran Tal |
Sep 24, 2024 |
1373 |
- |
Meet the new host for The Secure Developer podcast |
Mariah Gresham |
May 09, 2024 |
469 |
- |
How to mitigate security issues in GenAI code and LLM integrations |
Liran Tal |
Sep 11, 2024 |
2394 |
- |
Announcing new Snyk AppRisk integration with Orca Security |
Daniel Berman |
Sep 11, 2024 |
809 |
- |
Want to avoid a data breach? Employ secrets detection |
Liran Tal |
Sep 16, 2024 |
2539 |
- |
Promise queues and batching concurrent tasks in Deno |
Liran Tal |
Sep 25, 2024 |
3378 |
- |
5 reasons why developers at FinServ institutions are outpacing their security teammates |
Katie DeMatteis |
Sep 09, 2024 |
822 |
- |
Dive into AI and LLM learning with the new Snyk Learn learning path |
Michael Biocchi |
Sep 18, 2024 |
310 |
- |
Welcoming Gary Olson: Snyk’s new Chief Revenue Officer |
Peter McKay |
Mar 04, 2024 |
444 |
- |
How SAS secures their AI-generated code |
Gerald Crescione |
Apr 15, 2024 |
1874 |
- |
The journey to AppSec gold: Lessons we can learn from the Olympians |
Krysta Williams-Timm |
Aug 15, 2024 |
714 |
- |
3 best practices to make the most of Snyk AppRisk Essentials |
Daniel Berman |
Sep 19, 2024 |
1801 |
- |
Infosec Europe session: 4 tips for safer AI adoption |
Gerald Crescione |
Aug 01, 2024 |
1103 |
- |
How to prevent log injection vulnerability in JavaScript and Node.js applications |
Liran Tal |
Sep 26, 2024 |
1504 |
- |
Meet Snyk for Government: Our developer security solution with FedRAMP ATO |
Danny Allan |
Sep 17, 2024 |
502 |
- |
Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System |
Jim Armstrong |
Sep 27, 2024 |
1224 |
- |
Going beyond reachability to prioritize what matters most |
Jamie Smith |
Oct 01, 2024 |
1149 |
- |
Proactive AppSec continuous vulnerability management for developers and security teams |
Liran Tal |
Oct 02, 2024 |
1804 |
- |
Snyk named a 2024 Gartner Peer Insights™ Customers’ Choice for Application Security Testing for the 3rd consecutive year |
Nina McClure |
Oct 02, 2024 |
723 |
- |
The mysterious supply chain concern of string-width-cjs npm package |
Liran Tal |
Oct 03, 2024 |
1455 |
- |
SnykLaunch Oct 2024: Enhanced PR experience, extended visibility, AI-powered security, holistic risk management |
Anthony Larkin |
Oct 08, 2024 |
1489 |
- |
A look into your engineering interview at Snyk |
Philip Beevers |
Oct 09, 2024 |
750 |
- |
Foundations of trust: Securing the future of AI-generated code |
Danny Allan |
Oct 10, 2024 |
888 |
- |
Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code |
Liran Tal |
Oct 10, 2024 |
875 |
- |
Automatically fix code vulnerabilities with AI |
Micah Silverman |
Oct 14, 2024 |
1132 |
- |
How Snyk is prioritizing developer experience |
Anthony Larkin |
Oct 16, 2024 |
860 |
- |
Snyk announces commitment to Service for America, bringing security education access to all |
Michael Biocchi |
Oct 17, 2024 |
394 |
- |
Ensuring comprehensive security testing in DevOps pipelines |
Jim Armstrong |
Oct 17, 2024 |
1317 |
- |
Introducing: Extensive AppSec visibility with Snyk Analytics |
Nastasha Casale |
Oct 17, 2024 |
952 |
- |
Elevating Views of Risk: Holistic Application Risk Management with Snyk |
Daniel Berman |
Oct 22, 2024 |
1601 |
- |
Women - Kickstart your Application Security Career! |
Vandana Verma Sehgal |
Oct 22, 2024 |
1020 |
- |
Find, auto-fix, and prioritize intelligently, with Snyk's AI-powered code security tools |
Liqian Lim (林利蒨) |
Oct 24, 2024 |
2083 |
- |
Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV) |
Liran Tal |
Oct 23, 2024 |
1469 |
- |
Best Practices for Continuous Vulnerability Management |
Liran Tal |
Oct 29, 2024 |
1698 |
- |
Top 5 SAST Auto-fixing Tools and How They Compare |
Liqian Lim (林利蒨) |
Oct 29, 2024 |
966 |
- |
Lottie Player npm package compromised for crypto wallet theft |
Liran Tal |
Oct 31, 2024 |
825 |
2 |
If you don’t know about HTTP Archive’s Web Almanac yet, you should! |
Brian Clark |
Nov 01, 2024 |
710 |
- |
Snyk Recharge days: Making time to take time |
Adriana Bokel Herde |
May 17, 2023 |
710 |
- |
GitFlops: The Dangers of Terraform Automation Platforms |
Elliot Ward |
Nov 07, 2024 |
1831 |
- |
Extending Developer Security with Dev-First Dynamic Testing |
Manoj Nair |
Nov 12, 2024 |
1565 |
- |
How ASPM boosts visibility to manage application risk |
Daniel Berman |
Nov 12, 2024 |
1144 |
- |
Understanding command injection vulnerabilities in Go |
Liran Tal |
Nov 14, 2024 |
1891 |
1 |
Snyk named a Customer Favorite in The Forrester Wave™: Software Composition Analysis Software, Q4 2024 Report |
Peter McKay |
Nov 13, 2024 |
460 |
- |
An Introduction to capture the flag |
Sonya Moisset |
Sep 13, 2023 |
828 |
- |
Women in security: Inspiring leaders of today and tomorrow |
Jonaki Egenolf |
Nov 19, 2024 |
433 |
- |
How to prioritize vulnerabilities based on risk |
Daniel Berman |
Nov 19, 2024 |
1153 |
- |
A commitment to future generations: Snyk’s 2024 Student Edition Capture The Flag Recap |
Michael Biocchi |
Nov 21, 2024 |
332 |
- |
Why a solid DevOps foundation is vital for effective DevSecOps |
Ben Desjardins |
Nov 27, 2024 |
1117 |
- |
Measuring AppSec success: Key KPIs that demonstrate value |
Daniel Berman |
Nov 26, 2024 |
1479 |
- |
Seven steps to close coverage gaps with ASPM |
Daniel Berman |
Dec 03, 2024 |
1023 |
- |
2024 Open Source Security Report: Slowing Progress and New Challenges for DevSecOps |
Jamie Smith |
Dec 03, 2024 |
973 |
- |
Empowering women in security: The impact of mentorship |
Erin Cullen |
Nov 27, 2024 |
696 |
- |
Snyk-generated SBOMs now include license details for the open source libraries in your projects |
Jamie Smith |
Dec 09, 2024 |
906 |
- |
How to mitigate SSRF vulnerabilities in Go |
Liran Tal |
Dec 10, 2024 |
910 |
- |
Snyk’s risk-based approach to prioritization |
Daniel Berman |
Dec 11, 2024 |
1082 |
- |
Ultralytics AI Pwn Request Supply Chain Attack |
Stephen Thoemmes |
Dec 11, 2024 |
1375 |
- |
Vulnerability vs Weakness: Understanding Key Differences in AppSec |
Daniel Berman |
Nov 17, 2023 |
1934 |
- |
Ethical Hacking: Top Tools |
Vandana Verma Sehgal |
Jun 01, 2023 |
1601 |
- |
The 4 best DevSecOps tools for a secure DevOps workflow |
Liran Tal |
Jan 23, 2024 |
1583 |
- |
Essential AI Tools to Boost Developer Productivity and Security |
Liqian Lim (林利蒨) |
Mar 01, 2024 |
1385 |
- |
4 Advantages of using AI code review |
Rory McNamara |
Nov 29, 2023 |
1152 |
- |
Unlocking the power of multi-cloud security |
Vandana Verma Sehgal |
Apr 25, 2023 |
1147 |
- |
Supply Chain Security Risks & Best Practice |
Liran Tal |
Apr 04, 2023 |
1102 |
- |
How to implement DevSecOps in 4 steps |
Jamie Smith |
Jun 22, 2023 |
1316 |
- |
Software Supply Chain Security Tools: Types, Features & Considerations |
Jamie Smith |
Aug 02, 2023 |
1306 |
- |
Developer-first supply chain security |
Jamie Smith |
Sep 19, 2023 |
1330 |
- |
Asset-first application security: What is it and how can it help |
Daniel Berman |
Nov 03, 2023 |
1156 |
- |
Defense in Depth |
Daniel Berman |
Feb 29, 2024 |
1430 |
- |
Top AWS Security Risks & Prevention |
Rory McNamara |
Mar 02, 2023 |
1256 |
- |
Secrets Management: Tools & Best Practice |
Jamie Smith |
Jun 26, 2023 |
1318 |
- |
Product Security vs. Application Security: What’s the Difference? |
Rory McNamara |
Jul 21, 2023 |
1390 |
- |
4 Enterprise-level security best practices |
Manoj Nair |
Jul 20, 2023 |
617 |
- |
AppSec Maturity Models |
Rory McNamara |
Mar 08, 2024 |
1120 |
- |
Cybersecurity Hygiene 101 |
Liran Tal |
Mar 02, 2023 |
1594 |
- |
High profile AWS breaches & how to avoid them |
Jamie Smith |
Jun 07, 2023 |
1197 |
- |
API Security Guide |
Liran Tal |
Apr 25, 2023 |
1338 |
- |
Did you make the *security* naughty or nice list this year? |
Mariah Gresham |
Dec 18, 2024 |
590 |
- |
4 tips for securing GenAI-assisted development |
Sarah Conway |
Dec 18, 2024 |
859 |
- |
New year, new security goals: Improve your AppSec in 2025 |
Mariah Gresham |
Jan 01, 2025 |
729 |
- |
Securing the Digital Future: AppSec Best Practices in Digital Banking |
Hiroko Nakano |
Jan 06, 2025 |
587 |
- |
Securing GenAI Development with Snyk |
Liqian Lim (林利蒨) |
Jan 09, 2025 |
697 |
- |
Snyk Recognized as Trusted Partner and Innovator by JPMorganChase |
Ken Mellert |
Jan 14, 2025 |
294 |
- |
BFI’s Journey in Digital Transformation: A Fireside Chat on Elevating Application Security and Developer Experience |
Hiroko Nakano |
Jan 15, 2025 |
506 |
- |
Snyk Security Labs Testing Update: Cursor.com AI Code Editor |
Danny Allan |
Jan 14, 2025 |
688 |
6 |
Understanding the EU’s Cyber Resilience Act (CRA) |
Ben Desjardins |
Jan 22, 2025 |
1105 |
- |
Sneak Peek into Fetch the Flag CTF 2025 |
Gina Fitzpatrick |
Jan 21, 2025 |
293 |
- |
Reviving DevSecOps: How Snyk’s new framework builds trust and collaboration |
Ben Desjardins |
Jan 23, 2025 |
793 |
- |