New year, new security goals: Improve your AppSec in 2025 |
Mariah Gresham |
Jan 01, 2025 |
729 |
- |
Securing the Digital Future: AppSec Best Practices in Digital Banking |
Hiroko Nakano |
Jan 06, 2025 |
587 |
- |
Securing GenAI Development with Snyk |
Liqian Lim (林利蒨) |
Jan 09, 2025 |
697 |
- |
Snyk Recognized as Trusted Partner and Innovator by JPMorganChase |
Ken Mellert |
Jan 14, 2025 |
294 |
- |
BFI’s Journey in Digital Transformation: A Fireside Chat on Elevating Application Security and Developer Experience |
Hiroko Nakano |
Jan 15, 2025 |
506 |
- |
Snyk Security Labs Testing Update: Cursor.com AI Code Editor |
Danny Allan |
Jan 14, 2025 |
688 |
6 |
Understanding the EU’s Cyber Resilience Act (CRA) |
Ben Desjardins |
Jan 22, 2025 |
1105 |
- |
Sneak Peek into Fetch the Flag CTF 2025 |
Gina Fitzpatrick |
Jan 21, 2025 |
293 |
- |
Reviving DevSecOps: How Snyk’s new framework builds trust and collaboration |
Ben Desjardins |
Jan 23, 2025 |
793 |
- |
Introducing Snyk Accelerate powered by Accenture |
Taylor Buie |
Jan 28, 2025 |
1079 |
- |
Consolidate Security Findings with Snyk and Google Security Command Center |
Daniel Berman |
Feb 06, 2025 |
701 |
- |
Do not pass GO - Malicious Package Alert |
Vandana Verma Sehgal |
Feb 12, 2025 |
477 |
- |
The First Round of Changes to Match Snyk's Design Language |
Snyk Team |
Jan 23, 2025 |
703 |
- |
Can Snyk Find Weak Cryptographic Algorithms? Bye Bye MD5 |
Liran Tal |
Feb 25, 2025 |
582 |
- |
Celebrating Black History Month 2025 at Snyk |
Snyk Team |
Feb 26, 2025 |
708 |
- |
Snyk’s Fetch the Flag CTF is More Than Just a CTF |
John Hammond |
Feb 20, 2025 |
784 |
- |
Incorporating security by design: Managing risk in DevSecOps |
Ben Desjardins |
Feb 25, 2025 |
844 |
- |
Does Claude 3.7 Sonnet Generate Insecure Code? |
Stephen Thoemmes |
Feb 26, 2025 |
571 |
- |
Solving Security Challenges with Snyk Code and Symbolic AI |
Liran Tal |
Feb 27, 2025 |
916 |
- |
Leveraging Generative AI with DevSecOps for Enhanced Security |
Stephen Thoemmes |
Feb 27, 2025 |
1059 |
- |
ChatGPT and Secure Coding: Benefits and Security Vulnerabilities of ChatGPT-Generated Code |
Stephen Thoemmes |
Mar 04, 2025 |
907 |
- |
Can Snyk Detect JWT Security Issues? |
Liran Tal |
Mar 04, 2025 |
1201 |
- |
Learn about API security risks with the new Snyk Learn Learning Path |
Michael Biocchi |
Mar 06, 2025 |
319 |
- |
Fetch the Flag CTF 2025 Community Writeups |
Gina Fitzpatrick |
Mar 05, 2025 |
240 |
- |
Introducing Snyk Accelerate with Accenture |
Taylor Buie |
Jan 28, 2025 |
880 |
- |
AI Code Generation: Code Security & Quality, Benefits, Risks & Top Tools |
Stephen Thoemmes |
Mar 11, 2025 |
1122 |
- |
Snyk and ServiceNow: Streamlining Vulnerability Management with ServiceNow VR Assignment Rules |
Sarah Conway |
Mar 12, 2025 |
556 |
- |
DevSecOps Automation Framework |
Ben Desjardins |
Mar 11, 2025 |
795 |
- |
Snyk Helps Secure the Golang Bento Project |
Phill Garrett |
Mar 12, 2025 |
401 |
- |
AI Risk Management: Benefits, Challenges, and Best Practices |
Stephen Thoemmes |
Mar 13, 2025 |
968 |
- |
Responding and remediating: Best practices for handling security alerts |
Ben Desjardins |
Mar 13, 2025 |
874 |
- |
Building a Culture of Secure Coding: Empowering Developers to Build Resilient Software |
Akanchha Shrivastava |
Mar 18, 2025 |
1499 |
- |
Unburdening Developers From Vulnerability Fatigue with Snyk Delta Findings |
Liran Tal |
Mar 18, 2025 |
1337 |
- |
Reconstructing the TJ Actions Changed Files GitHub Actions Compromise |
Micah Silverman |
Mar 17, 2025 |
2139 |
- |
Overcoming AppSec Challenges in FinServ: How CIBC Balances Speed, Security, and Compliance |
Snyk Team |
Mar 20, 2025 |
523 |
- |
CVE-2025-29927 Authorization Bypass in Next.js Middleware |
Liran Tal |
Mar 23, 2025 |
681 |
- |
What is a Data Poisoning Attack? |
Stephen Thoemmes |
Mar 25, 2025 |
852 |
- |
Governance in DevSecOps: Measuring and Improving Security Outcomes |
Ben Desjardins |
Mar 27, 2025 |
1053 |
- |