Snyk users don't have to worry about NVD delays |
Hadas Bloom |
Mar. 13, 2024 |
734 |
- |
Snyk welcomes Helios, accelerating our ASPM vision with runtime insights |
Manoj Nair |
Jan. 16, 2024 |
874 |
- |
Four easy ways to analyze your Java and Kotlin code |
Brian Vermeer |
Aug. 13, 2024 |
1982 |
- |
DevOpsDays Singapore 2024: Unmasking the security pitfalls in AI-generated code |
Hiroko Nakano |
Apr. 23, 2024 |
562 |
- |
3 tips from Snyk and Dynatrace’s AI security experts |
Sarah Conway |
Jan. 22, 2024 |
905 |
- |
Snyk Code, the only security tool chosen by developers in Stack Overflow's 2024 AI Search and Developer Tools survey |
Liqian Lim (林利蒨) |
Aug. 27, 2024 |
901 |
- |
The ultimate guide to creating a secure Python package |
Gourav Singh Bais |
May. 08, 2024 |
3482 |
- |
Learning from cloud transformation as we move to AI |
David Lugo |
May. 21, 2024 |
976 |
- |
How to secure an S3 bucket on AWS? |
Liran Tal |
Jul. 12, 2024 |
3393 |
- |
How Axel Springer National Media and Tech achieved continuous security with Snyk |
Nina McClure |
Sep. 03, 2024 |
952 |
- |
Krampus delivers an end-of-year Struts vulnerability |
Micah Silverman |
Jan. 02, 2024 |
1667 |
- |
3 ways AppSec modernization is a game-changer for financial services |
Katie DeMatteis |
Sep. 03, 2024 |
782 |
- |
Leaky Vessels: Docker and runc container breakout vulnerabilities (January 2024) |
Jamie Smith |
Jan. 31, 2024 |
1729 |
41 |
Introducing Snyk’s partnership with Gemini Code Assist |
David Lugo |
Apr. 09, 2024 |
682 |
- |
Day in the life of a food giant CISO |
Vandana Verma Sehgal |
Apr. 18, 2024 |
668 |
- |
Snyk & Atlassian: How to embed security in AI-assisted software development |
LaToya Muff |
Feb. 14, 2024 |
1030 |
- |
Integrating Snyk Code SAST results in your ServiceNow workflows |
Sarah Conway |
May. 07, 2024 |
514 |
- |
With Love, Your Applications |
Krysta Williams-Timm |
Feb. 14, 2024 |
373 |
- |
Three trends shaping software supply chain security today |
Erin Cullen |
Aug. 22, 2024 |
923 |
- |
AI quality: Garbage in, garbage out |
Michael Biocchi |
Jun. 11, 2024 |
730 |
- |
Getting started with PHP static analysis in 2024 |
Liran Tal |
Mar. 21, 2024 |
2431 |
- |
Securing your SBOM on Google Cloud |
David Lugo |
Mar. 28, 2024 |
983 |
- |
More accurate than GPT-4: How Snyk’s CodeReduce improved the performance of other LLMs |
Eric Fernandez |
May. 07, 2024 |
1245 |
- |
360 degrees of application security with Snyk |
Soumen Mukherjee |
Apr. 24, 2024 |
1273 |
- |
Creating SBOMs with the Snyk CLI |
Brian Vermeer |
Feb. 08, 2024 |
1348 |
- |
Vulnerability: runc process.cwd and leaked fds container breakout (CVE-2024-21626) |
Rory McNamara |
Jan. 31, 2024 |
1114 |
3 |
Going beyond “shift left” to extend AppSec in all directions |
Ben Desjardins |
Jul. 09, 2024 |
968 |
- |
How to build a modern DevSecOps culture: Lessons from Jaguar Land Rover and Asda |
Brian Piper |
Feb. 21, 2024 |
1209 |
- |
Integrating the Snyk Language Server with IntelliJ IDEs |
Arvyd Paeglit |
Jun. 17, 2024 |
344 |
- |
Polyfill supply chain attack embeds malware in JavaScript CDN assets |
Liran Tal |
Jun. 26, 2024 |
1892 |
- |
A security expert’s view on Gartner’s generative AI insights |
Liqian Lim (林利蒨) |
Aug. 07, 2024 |
1729 |
- |
Snyk CLI: Introducing Semantic Versioning and release channels |
Chintan B. |
Apr. 30, 2024 |
930 |
- |
Call for action: Exploring vulnerabilities in Github Actions |
Elliot Ward, Rory McNamara, Raul Onitza-Klugman |
Jun. 06, 2024 |
3977 |
- |
10 modern Node.js runtime features to start using in 2024 |
Liran Tal |
May. 29, 2024 |
5030 |
2 |
Snyk and AWS announce native Amazon EKS support directly from the AWS Management Console |
David Lugo |
Jun. 12, 2024 |
418 |
- |
5 Node.js security code snippets every backend developer should know |
Liran Tal |
Feb. 28, 2024 |
3106 |
- |
Introducing the ASPM Masterclass |
Erin Cullen |
Mar. 12, 2024 |
504 |
- |
How REI built a DevSecOps culture and how Snyk helped |
Brian Piper |
Feb. 27, 2024 |
1154 |
- |
Snyk Learn and the NIST Cybersecurity Framework (CSF) |
Michael Biocchi |
Mar. 06, 2024 |
523 |
- |
Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195) |
Liran Tal |
Jan. 18, 2024 |
1059 |
- |
Mastering Python virtual environments: A complete guide to venv, Docker, and securing your code |
Liran Tal |
Jan. 10, 2024 |
1589 |
- |
5 security best practices for adopting generative AI code assistants like GitHub Copilot |
Liqian Lim (林利蒨) |
Mar. 05, 2024 |
1368 |
- |
A denial of service Regex breaks FastAPI security |
Liran Tal |
Jul. 31, 2024 |
1878 |
- |
Talk to us about Snyk CLI |
Chintan B., Neil Mackay |
Jun. 06, 2024 |
859 |
- |
How Mulesoft fosters a developer-first, shift-left culture with Snyk |
Gerald Crescione |
Apr. 30, 2024 |
798 |
- |
Preventing SQL injection attacks in Node.js |
Lucien Chemaly |
Feb. 20, 2024 |
2260 |
- |
Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk |
Chandler Mayo |
Jun. 25, 2024 |
902 |
- |
Welcoming Danny Allan and Brian Rogan: Snyk leadership team expands with key appointments to accelerate innovation |
Peter McKay |
Feb. 06, 2024 |
492 |
- |
10 GitHub Security Best Practices |
Brian Vermeer |
Feb. 05, 2024 |
3532 |
3 |
Reporting AppSec risk up to your CISO |
Kate Powers Burke, Ezra Tanzer |
Feb. 13, 2024 |
1945 |
- |
Securing next-gen development: Lessons from Trust Bank and TASConnect |
Gerald Crescione |
Jun. 05, 2024 |
1312 |
- |
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant |
Brian Vermeer |
Aug. 29, 2024 |
1000 |
- |
How Snyk ensures safe adoption of AI |
Akanchha Shrivastava |
Mar. 27, 2024 |
1534 |
- |
Navigating the AI-powered development era in financial services |
Lawrence Crowther |
Aug. 26, 2024 |
826 |
- |
7 tips to become a successful bug bounty hunter |
Ben Sadeghipour |
Jan. 25, 2024 |
1246 |
- |
Nine Docker pro tips for Node.js developers |
Liran Tal |
Apr. 11, 2024 |
1630 |
- |
Build and deploy a Node.js security scanning API to Platformatic Cloud |
Liran Tal |
Jan. 05, 2024 |
2980 |
- |
Buildkit GRPC SecurityMode privilege check: Build-time container breakout (CVE-2024-23653) |
Rory McNamara |
Jan. 31, 2024 |
946 |
- |
Kroger’s approach to supply chain security |
Brian Piper |
Jan. 02, 2024 |
888 |
- |
AppSec spring cleaning checklist |
Mariah Gresham |
May. 13, 2024 |
783 |
- |
Welcoming Diana Brunelle: Snyk’s New Chief People Officer |
Peter McKay |
Jul. 22, 2024 |
336 |
- |
GitHub “besieged” by malware repositories and repo confusion: Why you'll be ok |
Liran Tal |
Mar. 12, 2024 |
2102 |
- |
Snyk Code’s autofixing feature, DeepCode AI Fix, just got better |
Eric Fernandez, Berkay Berabi |
Apr. 23, 2024 |
2452 |
- |
5 tips for adopting AI code assistance securely |
Liqian Lim (林利蒨) |
May. 30, 2024 |
856 |
- |
Abusing Ubuntu 24.04 features for root privilege escalation |
Rory McNamara |
Sep. 09, 2024 |
5975 |
- |
Snyk's AppSec dream team |
Krysta Williams-Timm |
Mar. 19, 2024 |
843 |
- |
Automate security controls from development to production on Google Cloud |
David Lugo |
Jun. 18, 2024 |
1073 |
- |
Copilot amplifies insecure codebases by replicating vulnerabilities in your projects |
Randall Degges |
Feb. 22, 2024 |
1578 |
- |
10 Dimensions of Python Static Analysis |
Liran Tal |
Jul. 17, 2024 |
4861 |
- |
A security expert’s view on Gartner’s generative AI insights - Part 2 |
Liqian Lim (林利蒨) |
Aug. 08, 2024 |
1231 |
- |
Why ASPM is the future of AppSec: Key points from our newest whitepaper |
Sarah Conway |
Jun. 18, 2024 |
1177 |
- |
Breaking caches and bypassing Istio RBAC with HTTP response header injection |
Rory McNamara |
Jun. 20, 2024 |
2498 |
- |
How to choose a security tool for your AI-generated code |
Liqian Lim (林利蒨) |
Jan. 09, 2024 |
1774 |
- |
Exploiting HTTP/2 CONTINUATION frames for DoS attacks |
Vandana Verma Sehgal |
Apr. 08, 2024 |
696 |
- |
Repo Jacking: The Great Source-code Swindle |
Elliot Ward |
Jul. 25, 2024 |
2516 |
- |
The XZ backdoor CVE-2024-3094 |
Liran Tal |
Mar. 31, 2024 |
1800 |
- |
Fastify plugins as building blocks for a backend Node.js API |
Liran Tal |
May. 28, 2024 |
2479 |
- |
InCyber Forum Europe recap: 4 tips from DevSecOps experts |
Nina McClure |
Aug. 14, 2024 |
1217 |
- |
How to secure a REST API? |
Liran Tal |
Jun. 27, 2024 |
2768 |
- |
Preventing SQL injection in C# with Entity Framework |
Brian Vermeer |
Jul. 30, 2024 |
1273 |
- |
Snyk AppRisk Pro: A holistic approach to application risk management |
Daniel Berman |
May. 01, 2024 |
1597 |
- |
Secure AI tool adoption: Perceptions and realities |
Alex Salkever |
Jun. 04, 2024 |
733 |
- |
Automatic source locations with Rego |
Jasper Van der Jeugt |
Feb. 12, 2024 |
2614 |
- |
4 AI coding risks and how to address them |
Liqian Lim (林利蒨) |
Jun. 13, 2024 |
1200 |
- |
Why “vulnerability management” falls short in modern application security |
Daniel Berman |
Jun. 13, 2024 |
988 |
- |
Leaky Vessels deep dive: Escaping from Docker one syscall at a time |
Rory McNamara |
Feb. 06, 2024 |
10279 |
4 |
Application vulnerability management best practices |
Mariah Gresham |
Aug. 06, 2024 |
1240 |
- |
Six takeaways from our ASPM masterclass series |
Erin Cullen |
Apr. 10, 2024 |
1110 |
- |
A stepping stone towards holistic application risk and compliance management of the Digital Operational Resiliency Act (DORA) |
Ben Desjardins |
Jul. 11, 2024 |
1834 |
- |
Vulnerabilities in NodeJS C/C++ add-on extensions |
Alessio Della Libera |
Aug. 14, 2024 |
2808 |
- |
Preventing server-side request forgery in Node.js applications |
David Ekete |
Feb. 20, 2024 |
1759 |
- |
Symmetric vs. asymmetric encryption: Practical Python examples |
Josh Amata |
May. 15, 2024 |
4010 |
- |
Preventing broken access control in express Node.js applications |
Ben Smitthimedhin |
May. 22, 2024 |
2923 |
- |
Building an npm package compatible with ESM and CJS in 2024 |
Liran Tal |
Apr. 18, 2024 |
1082 |
- |
Extend the power of your AppSec data with the new Snyk and Snowflake integration |
Guy Plotnik |
Aug. 06, 2024 |
1095 |
- |
Snyk sponsors Snowflake Summit |
LaToya Muff |
Jun. 04, 2024 |
569 |
- |
An investigation into code injection vulnerabilities caused by generative AI |
Jack Hair |
Apr. 16, 2024 |
983 |
- |
Buildkit mount cache race: Build-time race condition container breakout (CVE-2024-23651) |
Rory McNamara |
Jan. 31, 2024 |
1022 |
- |
Suspicious Maintainer Unveils Threads of npm Supply Chain Attack |
Liran Tal |
Jul. 16, 2024 |
1524 |
- |
New Year's security resolutions for 2024 from Snyk DevRel, SecRel, and friends |
Micah Silverman |
Jan. 18, 2024 |
1188 |
- |
Buildkit build-time container teardown arbitrary delete (CVE-2024-23652) |
Rory McNamara |
Jan. 31, 2024 |
879 |
- |
What you should know about PHP code security |
Liran Tal |
Sep. 04, 2024 |
1773 |
- |
Snyk documentation: Our journey so far |
David Bailey |
Feb. 29, 2024 |
978 |
- |
Agent hijacking: The true impact of prompt injection attacks |
Elliot Ward, Rory McNamara, Mateo Rojas-Carulla, Sam Watts, Eric Allen |
Aug. 28, 2024 |
2758 |
- |
Introducing new Snyk AppRisk integrations: Enhancing application risk management with development context |
Daniel Berman |
Aug. 01, 2024 |
890 |
- |
Essential Node.js backend examples for developers in 2024 |
Liran Tal |
Jun. 12, 2024 |
2643 |
- |
A developer’s best friend: Lessons learned from our canine companions about AI code security |
Krysta Williams-Timm |
Aug. 26, 2024 |
803 |
- |
Snyk Code now secures AI builds with support for LLM sources |
Liqian Lim (林利蒨), Ranko Cupovic |
Jun. 25, 2024 |
571 |
- |
How to install Java on macOS |
Liran Tal |
Apr. 17, 2024 |
2820 |
- |
How to setup Deno Dev Container on GitHub Codespaces? |
Liran Tal |
Jul. 18, 2024 |
2097 |
- |
How to secure Python Flask applications |
Gourav Singh Bais |
May. 21, 2024 |
4209 |
- |
Identifying Insecure C Code with Valgrind and Fixing with Snyk Code |
Liran Tal |
Sep. 24, 2024 |
1373 |
- |
Meet the new host for The Secure Developer podcast |
Mariah Gresham |
May. 09, 2024 |
469 |
- |
How to mitigate security issues in GenAI code and LLM integrations |
Liran Tal |
Sep. 11, 2024 |
2394 |
- |
Announcing new Snyk AppRisk integration with Orca Security |
Daniel Berman |
Sep. 11, 2024 |
809 |
- |
Want to avoid a data breach? Employ secrets detection |
Liran Tal |
Sep. 16, 2024 |
2539 |
- |
Promise queues and batching concurrent tasks in Deno |
Liran Tal |
Sep. 25, 2024 |
3378 |
- |
5 reasons why developers at FinServ institutions are outpacing their security teammates |
Katie DeMatteis |
Sep. 09, 2024 |
822 |
- |
Dive into AI and LLM learning with the new Snyk Learn learning path |
Michael Biocchi |
Sep. 18, 2024 |
310 |
- |
Welcoming Gary Olson: Snyk’s new Chief Revenue Officer |
Peter McKay |
Mar. 04, 2024 |
444 |
- |
How SAS secures their AI-generated code |
Gerald Crescione |
Apr. 15, 2024 |
1874 |
- |
The journey to AppSec gold: Lessons we can learn from the Olympians |
Krysta Williams-Timm |
Aug. 15, 2024 |
714 |
- |
3 best practices to make the most of Snyk AppRisk Essentials |
Daniel Berman |
Sep. 19, 2024 |
1801 |
- |
Infosec Europe session: 4 tips for safer AI adoption |
Gerald Crescione |
Aug. 01, 2024 |
1103 |
- |
How to prevent log injection vulnerability in JavaScript and Node.js applications |
Liran Tal |
Sep. 26, 2024 |
1504 |
- |
Meet Snyk for Government: Our developer security solution with FedRAMP ATO |
Danny Allan |
Sep. 17, 2024 |
502 |
- |
Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System |
Jim Armstrong |
Sep. 27, 2024 |
1224 |
- |
Going beyond reachability to prioritize what matters most |
Jamie Smith |
Oct. 01, 2024 |
1149 |
- |
Proactive AppSec continuous vulnerability management for developers and security teams |
Liran Tal |
Oct. 02, 2024 |
1804 |
- |
Snyk named a 2024 Gartner Peer Insights™ Customers’ Choice for Application Security Testing for the 3rd consecutive year |
Nina McClure |
Oct. 02, 2024 |
723 |
- |
The mysterious supply chain concern of string-width-cjs npm package |
Liran Tal |
Oct. 03, 2024 |
1455 |
- |
SnykLaunch Oct 2024: Enhanced PR experience, extended visibility, AI-powered security, holistic risk management |
Anthony Larkin |
Oct. 08, 2024 |
1489 |
- |
A look into your engineering interview at Snyk |
Philip Beevers |
Oct. 09, 2024 |
750 |
- |
Foundations of trust: Securing the future of AI-generated code |
Danny Allan |
Oct. 10, 2024 |
888 |
- |
Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code |
Liran Tal |
Oct. 10, 2024 |
875 |
- |
Automatically fix code vulnerabilities with AI |
Micah Silverman |
Oct. 14, 2024 |
1132 |
- |
How Snyk is prioritizing developer experience |
Anthony Larkin |
Oct. 16, 2024 |
860 |
- |
Snyk announces commitment to Service for America, bringing security education access to all |
Michael Biocchi |
Oct. 17, 2024 |
394 |
- |
Ensuring comprehensive security testing in DevOps pipelines |
Jim Armstrong |
Oct. 17, 2024 |
1317 |
- |
Introducing: Extensive AppSec visibility with Snyk Analytics |
Nastasha Casale |
Oct. 17, 2024 |
952 |
- |
Elevating Views of Risk: Holistic Application Risk Management with Snyk |
Daniel Berman |
Oct. 22, 2024 |
1601 |
- |
Women - Kickstart your Application Security Career! |
Vandana Verma Sehgal |
Oct. 22, 2024 |
1020 |
- |
Find, auto-fix, and prioritize intelligently, with Snyk's AI-powered code security tools |
Liqian Lim (林利蒨) |
Oct. 24, 2024 |
2083 |
- |
Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV) |
Liran Tal |
Oct. 23, 2024 |
1469 |
- |
Best Practices for Continuous Vulnerability Management |
Liran Tal |
Oct. 29, 2024 |
1698 |
- |
Top 5 SAST Auto-fixing Tools and How They Compare |
Liqian Lim (林利蒨) |
Oct. 29, 2024 |
966 |
- |
Lottie Player npm package compromised for crypto wallet theft |
Liran Tal |
Oct. 31, 2024 |
825 |
2 |
If you don’t know about HTTP Archive’s Web Almanac yet, you should! |
Brian Clark |
Nov. 01, 2024 |
710 |
- |
GitFlops: The Dangers of Terraform Automation Platforms |
Elliot Ward |
Nov. 07, 2024 |
1831 |
- |
Extending Developer Security with Dev-First Dynamic Testing |
Manoj Nair |
Nov. 12, 2024 |
1565 |
- |
How ASPM boosts visibility to manage application risk |
Daniel Berman |
Nov. 12, 2024 |
1144 |
- |
Understanding command injection vulnerabilities in Go |
Liran Tal |
Nov. 14, 2024 |
1891 |
- |
Snyk named a Customer Favorite in The Forrester Wave™: Software Composition Analysis Software, Q4 2024 Report |
Peter McKay |
Nov. 13, 2024 |
460 |
- |
Women in security: Inspiring leaders of today and tomorrow |
Jonaki Egenolf |
Nov. 19, 2024 |
433 |
- |
How to prioritize vulnerabilities based on risk |
Daniel Berman |
Nov. 19, 2024 |
1153 |
- |
A commitment to future generations: Snyk’s 2024 Student Edition Capture The Flag Recap |
Michael Biocchi |
Nov. 21, 2024 |
332 |
- |
Why a solid DevOps foundation is vital for effective DevSecOps |
Ben Desjardins |
Nov. 27, 2024 |
1117 |
- |
Measuring AppSec success: Key KPIs that demonstrate value |
Daniel Berman |
Nov. 26, 2024 |
1479 |
- |