Snyk users don't have to worry about NVD delays |
Hadas Bloom |
Mar 13, 2024 |
734 |
- |
Snyk welcomes Helios, accelerating our ASPM vision with runtime insights |
Manoj Nair |
Jan 16, 2024 |
874 |
- |
Four easy ways to analyze your Java and Kotlin code |
Brian Vermeer |
Aug 13, 2024 |
1982 |
- |
DevOpsDays Singapore 2024: Unmasking the security pitfalls in AI-generated code |
Hiroko Nakano |
Apr 23, 2024 |
562 |
- |
3 tips from Snyk and Dynatrace’s AI security experts |
Sarah Conway |
Jan 22, 2024 |
905 |
- |
Snyk Code, the only security tool chosen by developers in Stack Overflow's 2024 AI Search and Developer Tools survey |
Liqian Lim (林利蒨) |
Aug 27, 2024 |
901 |
- |
The ultimate guide to creating a secure Python package |
Gourav Singh Bais |
May 08, 2024 |
3482 |
- |
Learning from cloud transformation as we move to AI |
David Lugo |
May 21, 2024 |
976 |
- |
How to secure an S3 bucket on AWS? |
Liran Tal |
Jul 12, 2024 |
3393 |
- |
How Axel Springer National Media and Tech achieved continuous security with Snyk |
Nina McClure |
Sep 03, 2024 |
952 |
- |
Krampus delivers an end-of-year Struts vulnerability |
Micah Silverman |
Jan 02, 2024 |
1667 |
- |
3 ways AppSec modernization is a game-changer for financial services |
Katie DeMatteis |
Sep 03, 2024 |
782 |
- |
Leaky Vessels: Docker and runc container breakout vulnerabilities (January 2024) |
Jamie Smith |
Jan 31, 2024 |
1729 |
41 |
Introducing Snyk’s partnership with Gemini Code Assist |
David Lugo |
Apr 09, 2024 |
682 |
- |
Day in the life of a food giant CISO |
Vandana Verma Sehgal |
Apr 18, 2024 |
668 |
- |
Snyk & Atlassian: How to embed security in AI-assisted software development |
LaToya Muff |
Feb 14, 2024 |
1030 |
- |
Integrating Snyk Code SAST results in your ServiceNow workflows |
Sarah Conway |
May 07, 2024 |
514 |
- |
With Love, Your Applications |
Krysta Williams-Timm |
Feb 14, 2024 |
373 |
- |
Three trends shaping software supply chain security today |
Erin Cullen |
Aug 22, 2024 |
923 |
- |
AI quality: Garbage in, garbage out |
Michael Biocchi |
Jun 11, 2024 |
730 |
- |
Getting started with PHP static analysis in 2024 |
Liran Tal |
Mar 21, 2024 |
2431 |
- |
Securing your SBOM on Google Cloud |
David Lugo |
Mar 28, 2024 |
983 |
- |
More accurate than GPT-4: How Snyk’s CodeReduce improved the performance of other LLMs |
Eric Fernandez |
May 07, 2024 |
1245 |
- |
360 degrees of application security with Snyk |
Soumen Mukherjee |
Apr 24, 2024 |
1273 |
- |
Creating SBOMs with the Snyk CLI |
Brian Vermeer |
Feb 08, 2024 |
1348 |
- |
Vulnerability: runc process.cwd and leaked fds container breakout (CVE-2024-21626) |
Rory McNamara |
Jan 31, 2024 |
1114 |
3 |
Going beyond “shift left” to extend AppSec in all directions |
Ben Desjardins |
Jul 09, 2024 |
968 |
- |
How to build a modern DevSecOps culture: Lessons from Jaguar Land Rover and Asda |
Brian Piper |
Feb 21, 2024 |
1209 |
- |
Integrating the Snyk Language Server with IntelliJ IDEs |
Arvyd Paeglit |
Jun 17, 2024 |
344 |
- |
Polyfill supply chain attack embeds malware in JavaScript CDN assets |
Liran Tal |
Jun 26, 2024 |
1892 |
- |
A security expert’s view on Gartner’s generative AI insights |
Liqian Lim (林利蒨) |
Aug 07, 2024 |
1729 |
- |
Snyk CLI: Introducing Semantic Versioning and release channels |
Chintan B. |
Apr 30, 2024 |
930 |
- |
Call for action: Exploring vulnerabilities in Github Actions |
Elliot Ward, Rory McNamara, Raul Onitza-Klugman |
Jun 06, 2024 |
3977 |
- |
10 modern Node.js runtime features to start using in 2024 |
Liran Tal |
May 29, 2024 |
5030 |
2 |
Snyk and AWS announce native Amazon EKS support directly from the AWS Management Console |
David Lugo |
Jun 12, 2024 |
418 |
- |
5 Node.js security code snippets every backend developer should know |
Liran Tal |
Feb 28, 2024 |
3106 |
- |
Introducing the ASPM Masterclass |
Erin Cullen |
Mar 12, 2024 |
504 |
- |
How REI built a DevSecOps culture and how Snyk helped |
Brian Piper |
Feb 27, 2024 |
1154 |
- |
Snyk Learn and the NIST Cybersecurity Framework (CSF) |
Michael Biocchi |
Mar 06, 2024 |
523 |
- |
Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195) |
Liran Tal |
Jan 18, 2024 |
1059 |
- |
Mastering Python virtual environments: A complete guide to venv, Docker, and securing your code |
Liran Tal |
Jan 10, 2024 |
1589 |
- |
5 security best practices for adopting generative AI code assistants like GitHub Copilot |
Liqian Lim (林利蒨) |
Mar 05, 2024 |
1368 |
- |
A denial of service Regex breaks FastAPI security |
Liran Tal |
Jul 31, 2024 |
1878 |
- |
Talk to us about Snyk CLI |
Chintan B., Neil Mackay |
Jun 06, 2024 |
859 |
- |
How Mulesoft fosters a developer-first, shift-left culture with Snyk |
Gerald Crescione |
Apr 30, 2024 |
798 |
- |
Preventing SQL injection attacks in Node.js |
Lucien Chemaly |
Feb 20, 2024 |
2260 |
- |
Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk |
Chandler Mayo |
Jun 25, 2024 |
902 |
- |
Welcoming Danny Allan and Brian Rogan: Snyk leadership team expands with key appointments to accelerate innovation |
Peter McKay |
Feb 06, 2024 |
492 |
- |
10 GitHub Security Best Practices |
Brian Vermeer |
Feb 05, 2024 |
3532 |
3 |
Reporting AppSec risk up to your CISO |
Kate Powers Burke, Ezra Tanzer |
Feb 13, 2024 |
1945 |
- |
Securing next-gen development: Lessons from Trust Bank and TASConnect |
Gerald Crescione |
Jun 05, 2024 |
1312 |
- |
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant |
Brian Vermeer |
Aug 29, 2024 |
1000 |
- |
How Snyk ensures safe adoption of AI |
Akanchha Shrivastava |
Mar 27, 2024 |
1534 |
- |
Navigating the AI-powered development era in financial services |
Lawrence Crowther |
Aug 26, 2024 |
826 |
- |
7 tips to become a successful bug bounty hunter |
Ben Sadeghipour |
Jan 25, 2024 |
1246 |
- |
Nine Docker pro tips for Node.js developers |
Liran Tal |
Apr 11, 2024 |
1630 |
- |
Build and deploy a Node.js security scanning API to Platformatic Cloud |
Liran Tal |
Jan 05, 2024 |
2980 |
- |
Buildkit GRPC SecurityMode privilege check: Build-time container breakout (CVE-2024-23653) |
Rory McNamara |
Jan 31, 2024 |
946 |
- |
Kroger’s approach to supply chain security |
Brian Piper |
Jan 02, 2024 |
888 |
- |
AppSec spring cleaning checklist |
Mariah Gresham |
May 13, 2024 |
783 |
- |
Welcoming Diana Brunelle: Snyk’s New Chief People Officer |
Peter McKay |
Jul 22, 2024 |
336 |
- |
GitHub “besieged” by malware repositories and repo confusion: Why you'll be ok |
Liran Tal |
Mar 12, 2024 |
2102 |
- |
Snyk Code’s autofixing feature, DeepCode AI Fix, just got better |
Eric Fernandez, Berkay Berabi |
Apr 23, 2024 |
2452 |
- |
5 tips for adopting AI code assistance securely |
Liqian Lim (林利蒨) |
May 30, 2024 |
856 |
- |
Abusing Ubuntu 24.04 features for root privilege escalation |
Rory McNamara |
Sep 09, 2024 |
5975 |
189 |
Snyk's AppSec dream team |
Krysta Williams-Timm |
Mar 19, 2024 |
843 |
- |
Automate security controls from development to production on Google Cloud |
David Lugo |
Jun 18, 2024 |
1073 |
- |
Copilot amplifies insecure codebases by replicating vulnerabilities in your projects |
Randall Degges |
Feb 22, 2024 |
1578 |
- |
10 Dimensions of Python Static Analysis |
Liran Tal |
Jul 17, 2024 |
4861 |
- |
A security expert’s view on Gartner’s generative AI insights - Part 2 |
Liqian Lim (林利蒨) |
Aug 08, 2024 |
1231 |
- |
Why ASPM is the future of AppSec: Key points from our newest whitepaper |
Sarah Conway |
Jun 18, 2024 |
1177 |
- |
Breaking caches and bypassing Istio RBAC with HTTP response header injection |
Rory McNamara |
Jun 20, 2024 |
2498 |
- |
How to choose a security tool for your AI-generated code |
Liqian Lim (林利蒨) |
Jan 09, 2024 |
1774 |
- |
Exploiting HTTP/2 CONTINUATION frames for DoS attacks |
Vandana Verma Sehgal |
Apr 08, 2024 |
696 |
- |
Repo Jacking: The Great Source-code Swindle |
Elliot Ward |
Jul 25, 2024 |
2516 |
- |
The XZ backdoor CVE-2024-3094 |
Liran Tal |
Mar 31, 2024 |
1800 |
- |
Fastify plugins as building blocks for a backend Node.js API |
Liran Tal |
May 28, 2024 |
2479 |
- |
InCyber Forum Europe recap: 4 tips from DevSecOps experts |
Nina McClure |
Aug 14, 2024 |
1217 |
- |
How to secure a REST API? |
Liran Tal |
Jun 27, 2024 |
2768 |
- |
Preventing SQL injection in C# with Entity Framework |
Brian Vermeer |
Jul 30, 2024 |
1273 |
- |
Snyk AppRisk Pro: A holistic approach to application risk management |
Daniel Berman |
May 01, 2024 |
1597 |
- |
Secure AI tool adoption: Perceptions and realities |
Alex Salkever |
Jun 04, 2024 |
733 |
- |
Automatic source locations with Rego |
Jasper Van der Jeugt |
Feb 12, 2024 |
2614 |
- |
4 AI coding risks and how to address them |
Liqian Lim (林利蒨) |
Jun 13, 2024 |
1200 |
- |
Why “vulnerability management” falls short in modern application security |
Daniel Berman |
Jun 13, 2024 |
988 |
- |
Leaky Vessels deep dive: Escaping from Docker one syscall at a time |
Rory McNamara |
Feb 06, 2024 |
10279 |
4 |
Application vulnerability management best practices |
Mariah Gresham |
Aug 06, 2024 |
1240 |
- |
Six takeaways from our ASPM masterclass series |
Erin Cullen |
Apr 10, 2024 |
1110 |
- |
A stepping stone towards holistic application risk and compliance management of the Digital Operational Resiliency Act (DORA) |
Ben Desjardins |
Jul 11, 2024 |
1834 |
- |
Vulnerabilities in NodeJS C/C++ add-on extensions |
Alessio Della Libera |
Aug 14, 2024 |
2808 |
- |
Preventing server-side request forgery in Node.js applications |
David Ekete |
Feb 20, 2024 |
1759 |
- |
Symmetric vs. asymmetric encryption: Practical Python examples |
Josh Amata |
May 15, 2024 |
4010 |
- |
Preventing broken access control in express Node.js applications |
Ben Smitthimedhin |
May 22, 2024 |
2923 |
- |
Building an npm package compatible with ESM and CJS in 2024 |
Liran Tal |
Apr 18, 2024 |
1082 |
- |
Extend the power of your AppSec data with the new Snyk and Snowflake integration |
Guy Plotnik |
Aug 06, 2024 |
1095 |
- |
Snyk sponsors Snowflake Summit |
LaToya Muff |
Jun 04, 2024 |
569 |
- |
An investigation into code injection vulnerabilities caused by generative AI |
Jack Hair |
Apr 16, 2024 |
983 |
- |
Buildkit mount cache race: Build-time race condition container breakout (CVE-2024-23651) |
Rory McNamara |
Jan 31, 2024 |
1022 |
- |
Suspicious Maintainer Unveils Threads of npm Supply Chain Attack |
Liran Tal |
Jul 16, 2024 |
1524 |
- |
New Year's security resolutions for 2024 from Snyk DevRel, SecRel, and friends |
Micah Silverman |
Jan 18, 2024 |
1188 |
- |
Buildkit build-time container teardown arbitrary delete (CVE-2024-23652) |
Rory McNamara |
Jan 31, 2024 |
879 |
- |
What you should know about PHP code security |
Liran Tal |
Sep 04, 2024 |
1773 |
- |
Snyk documentation: Our journey so far |
David Bailey |
Feb 29, 2024 |
978 |
- |
Agent hijacking: The true impact of prompt injection attacks |
Elliot Ward, Rory McNamara, Mateo Rojas-Carulla, Sam Watts, Eric Allen |
Aug 28, 2024 |
2758 |
- |
Introducing new Snyk AppRisk integrations: Enhancing application risk management with development context |
Daniel Berman |
Aug 01, 2024 |
890 |
- |
Essential Node.js backend examples for developers in 2024 |
Liran Tal |
Jun 12, 2024 |
2643 |
- |
A developer’s best friend: Lessons learned from our canine companions about AI code security |
Krysta Williams-Timm |
Aug 26, 2024 |
803 |
- |
Snyk Code now secures AI builds with support for LLM sources |
Liqian Lim (林利蒨), Ranko Cupovic |
Jun 25, 2024 |
571 |
- |
How to install Java on macOS |
Liran Tal |
Apr 17, 2024 |
2820 |
- |
How to setup Deno Dev Container on GitHub Codespaces? |
Liran Tal |
Jul 18, 2024 |
2097 |
- |
How to secure Python Flask applications |
Gourav Singh Bais |
May 21, 2024 |
4209 |
- |
Identifying Insecure C Code with Valgrind and Fixing with Snyk Code |
Liran Tal |
Sep 24, 2024 |
1373 |
- |
Meet the new host for The Secure Developer podcast |
Mariah Gresham |
May 09, 2024 |
469 |
- |
How to mitigate security issues in GenAI code and LLM integrations |
Liran Tal |
Sep 11, 2024 |
2394 |
- |
Announcing new Snyk AppRisk integration with Orca Security |
Daniel Berman |
Sep 11, 2024 |
809 |
- |
Want to avoid a data breach? Employ secrets detection |
Liran Tal |
Sep 16, 2024 |
2539 |
- |
Promise queues and batching concurrent tasks in Deno |
Liran Tal |
Sep 25, 2024 |
3378 |
- |
5 reasons why developers at FinServ institutions are outpacing their security teammates |
Katie DeMatteis |
Sep 09, 2024 |
822 |
- |
Dive into AI and LLM learning with the new Snyk Learn learning path |
Michael Biocchi |
Sep 18, 2024 |
310 |
- |
Welcoming Gary Olson: Snyk’s new Chief Revenue Officer |
Peter McKay |
Mar 04, 2024 |
444 |
- |
How SAS secures their AI-generated code |
Gerald Crescione |
Apr 15, 2024 |
1874 |
- |
The journey to AppSec gold: Lessons we can learn from the Olympians |
Krysta Williams-Timm |
Aug 15, 2024 |
714 |
- |
3 best practices to make the most of Snyk AppRisk Essentials |
Daniel Berman |
Sep 19, 2024 |
1801 |
- |
Infosec Europe session: 4 tips for safer AI adoption |
Gerald Crescione |
Aug 01, 2024 |
1103 |
- |
How to prevent log injection vulnerability in JavaScript and Node.js applications |
Liran Tal |
Sep 26, 2024 |
1504 |
- |
Meet Snyk for Government: Our developer security solution with FedRAMP ATO |
Danny Allan |
Sep 17, 2024 |
502 |
- |
Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System |
Jim Armstrong |
Sep 27, 2024 |
1224 |
- |
Going beyond reachability to prioritize what matters most |
Jamie Smith |
Oct 01, 2024 |
1149 |
- |
Proactive AppSec continuous vulnerability management for developers and security teams |
Liran Tal |
Oct 02, 2024 |
1804 |
- |
Snyk named a 2024 Gartner Peer Insights™ Customers’ Choice for Application Security Testing for the 3rd consecutive year |
Nina McClure |
Oct 02, 2024 |
723 |
- |
The mysterious supply chain concern of string-width-cjs npm package |
Liran Tal |
Oct 03, 2024 |
1455 |
- |
SnykLaunch Oct 2024: Enhanced PR experience, extended visibility, AI-powered security, holistic risk management |
Anthony Larkin |
Oct 08, 2024 |
1489 |
- |
A look into your engineering interview at Snyk |
Philip Beevers |
Oct 09, 2024 |
750 |
- |
Foundations of trust: Securing the future of AI-generated code |
Danny Allan |
Oct 10, 2024 |
888 |
- |
Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code |
Liran Tal |
Oct 10, 2024 |
875 |
- |
Automatically fix code vulnerabilities with AI |
Micah Silverman |
Oct 14, 2024 |
1132 |
- |
How Snyk is prioritizing developer experience |
Anthony Larkin |
Oct 16, 2024 |
860 |
- |
Snyk announces commitment to Service for America, bringing security education access to all |
Michael Biocchi |
Oct 17, 2024 |
394 |
- |
Ensuring comprehensive security testing in DevOps pipelines |
Jim Armstrong |
Oct 17, 2024 |
1317 |
- |
Introducing: Extensive AppSec visibility with Snyk Analytics |
Nastasha Casale |
Oct 17, 2024 |
952 |
- |
Elevating Views of Risk: Holistic Application Risk Management with Snyk |
Daniel Berman |
Oct 22, 2024 |
1601 |
- |
Women - Kickstart your Application Security Career! |
Vandana Verma Sehgal |
Oct 22, 2024 |
1020 |
- |
Find, auto-fix, and prioritize intelligently, with Snyk's AI-powered code security tools |
Liqian Lim (林利蒨) |
Oct 24, 2024 |
2083 |
- |
Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV) |
Liran Tal |
Oct 23, 2024 |
1469 |
- |
Best Practices for Continuous Vulnerability Management |
Liran Tal |
Oct 29, 2024 |
1698 |
- |
Top 5 SAST Auto-fixing Tools and How They Compare |
Liqian Lim (林利蒨) |
Oct 29, 2024 |
966 |
- |
Lottie Player npm package compromised for crypto wallet theft |
Liran Tal |
Oct 31, 2024 |
825 |
2 |
If you don’t know about HTTP Archive’s Web Almanac yet, you should! |
Brian Clark |
Nov 01, 2024 |
710 |
- |
GitFlops: The Dangers of Terraform Automation Platforms |
Elliot Ward |
Nov 07, 2024 |
1831 |
- |
Extending Developer Security with Dev-First Dynamic Testing |
Manoj Nair |
Nov 12, 2024 |
1565 |
- |
How ASPM boosts visibility to manage application risk |
Daniel Berman |
Nov 12, 2024 |
1144 |
- |
Understanding command injection vulnerabilities in Go |
Liran Tal |
Nov 14, 2024 |
1891 |
1 |
Snyk named a Customer Favorite in The Forrester Wave™: Software Composition Analysis Software, Q4 2024 Report |
Peter McKay |
Nov 13, 2024 |
460 |
- |
Women in security: Inspiring leaders of today and tomorrow |
Jonaki Egenolf |
Nov 19, 2024 |
433 |
- |
How to prioritize vulnerabilities based on risk |
Daniel Berman |
Nov 19, 2024 |
1153 |
- |
A commitment to future generations: Snyk’s 2024 Student Edition Capture The Flag Recap |
Michael Biocchi |
Nov 21, 2024 |
332 |
- |
Why a solid DevOps foundation is vital for effective DevSecOps |
Ben Desjardins |
Nov 27, 2024 |
1117 |
- |
Measuring AppSec success: Key KPIs that demonstrate value |
Daniel Berman |
Nov 26, 2024 |
1479 |
- |
Seven steps to close coverage gaps with ASPM |
Daniel Berman |
Dec 03, 2024 |
1023 |
- |
2024 Open Source Security Report: Slowing Progress and New Challenges for DevSecOps |
Jamie Smith |
Dec 03, 2024 |
973 |
- |
Empowering women in security: The impact of mentorship |
Erin Cullen |
Nov 27, 2024 |
696 |
- |
Snyk-generated SBOMs now include license details for the open source libraries in your projects |
Jamie Smith |
Dec 09, 2024 |
906 |
- |
How to mitigate SSRF vulnerabilities in Go |
Liran Tal |
Dec 10, 2024 |
910 |
- |
Snyk’s risk-based approach to prioritization |
Daniel Berman |
Dec 11, 2024 |
1082 |
- |
Ultralytics AI Pwn Request Supply Chain Attack |
Stephen Thoemmes |
Dec 11, 2024 |
1375 |
- |
The 4 best DevSecOps tools for a secure DevOps workflow |
Liran Tal |
Jan 23, 2024 |
1583 |
- |
Essential AI Tools to Boost Developer Productivity and Security |
Liqian Lim (林利蒨) |
Mar 01, 2024 |
1385 |
- |
Defense in Depth |
Daniel Berman |
Feb 29, 2024 |
1430 |
- |
AppSec Maturity Models |
Rory McNamara |
Mar 08, 2024 |
1120 |
- |
Did you make the *security* naughty or nice list this year? |
Mariah Gresham |
Dec 18, 2024 |
590 |
- |
4 tips for securing GenAI-assisted development |
Sarah Conway |
Dec 18, 2024 |
859 |
- |
New year, new security goals: Improve your AppSec in 2025 |
Mariah Gresham |
Jan 01, 2025 |
729 |
- |
Securing the Digital Future: AppSec Best Practices in Digital Banking |
Hiroko Nakano |
Jan 06, 2025 |
587 |
- |
Securing GenAI Development with Snyk |
Liqian Lim (林利蒨) |
Jan 09, 2025 |
697 |
- |
Snyk Recognized as Trusted Partner and Innovator by JPMorganChase |
Ken Mellert |
Jan 14, 2025 |
294 |
- |
BFI’s Journey in Digital Transformation: A Fireside Chat on Elevating Application Security and Developer Experience |
Hiroko Nakano |
Jan 15, 2025 |
506 |
- |
Snyk Security Labs Testing Update: Cursor.com AI Code Editor |
Danny Allan |
Jan 14, 2025 |
688 |
6 |
Understanding the EU’s Cyber Resilience Act (CRA) |
Ben Desjardins |
Jan 22, 2025 |
1105 |
- |
Sneak Peek into Fetch the Flag CTF 2025 |
Gina Fitzpatrick |
Jan 21, 2025 |
293 |
- |
Reviving DevSecOps: How Snyk’s new framework builds trust and collaboration |
Ben Desjardins |
Jan 23, 2025 |
793 |
- |