Snyk in 30: Developer-first security democast |
Jim Armstrong |
Mar. 02, 2023 |
1538 |
- |
Demystifying HTTP request smuggling |
- |
Jun. 30, 2020 |
2721 |
3 |
Announcing the 2022 State of Open Source Security report from Snyk and the Linux Foundation |
Megan Moore |
Jun. 21, 2022 |
558 |
- |
How to successfully roll out developer-first license compliance |
Guy Podjarny |
Apr. 23, 2020 |
1366 |
- |
New OpenSSL critical vulnerability: What you need to know |
Vandana Verma Sehgal |
Oct. 31, 2022 |
1282 |
2 |
Welcoming Samantha Wessels: Snyk’s New Vice President, EMEA Sales |
Dino DiMarino |
Jan. 10, 2022 |
409 |
- |
Snyk - Your Next Career Move! |
Liran Tal |
Jan. 04, 2019 |
870 |
- |
SnykCon Day One wrap-up: Snyk Code, carbon neutrality & session highlights |
Ravi Maira |
Oct. 22, 2020 |
1319 |
- |
SnykCon 2021 recap #2: Supply chain security, the future of cybersecurity, automation as an enabler, and more |
Simon Maple |
Oct. 08, 2021 |
1802 |
- |
Snyk participates in Atlassian Remote Summit and limited-time Bitbucket Cloud promotion |
Sarah Conway |
Apr. 01, 2020 |
291 |
- |
Modern VS Code extension development: The basics |
Mdu Sibisi |
Sep. 14, 2023 |
2775 |
- |
What kind of (security) dog are you? |
Belyn Lai |
Aug. 25, 2023 |
756 |
- |
Mitigating DOM clobbering attacks in JavaScript |
Keshav Malik |
Aug. 07, 2023 |
1806 |
- |
Lessons learned from improving full-text search at Snyk with Elasticsearch |
Sergey Vasilkov |
Nov. 04, 2021 |
1747 |
- |
Improving coverage of cloud resources to reduce infrastructure drift |
Stephane Jourdan |
Mar. 23, 2022 |
2878 |
- |
CodeSecDays conference and more complete security coverage with GitGuardian |
Sarah Conway |
Aug. 10, 2023 |
989 |
- |
How Snyk is normalizing authentication strategies with Gloo Edge |
Joakim Bajoul Kakaei |
Jul. 20, 2021 |
1490 |
- |
Uncharted territory - discovering vulnerabilities in public Helm Charts |
Gareth Rushgrove |
Nov. 18, 2019 |
834 |
- |
DevSecOps tools for open source projects in JavaScript and Node.js |
Liran Tal |
Nov. 24, 2020 |
2122 |
- |
88% increase in application library vulnerabilities over two years |
Liran Tal |
Feb. 26, 2019 |
1041 |
11 |
Snyk named to the CRN 2020 Emerging Vendor list |
Anna Hester |
Aug. 03, 2020 |
277 |
- |
Snyk users don't have to worry about NVD delays |
Hadas Bloom |
Mar. 13, 2024 |
734 |
- |
How to increase Serverless observability, monitoring and security |
Liran Tal |
Jul. 15, 2019 |
1108 |
- |
Best practices for creating a modern npm package with security in mind |
Brian Clark |
Sep. 12, 2022 |
4985 |
2 |
10 Maven Security Best Practices |
Simon Maple |
Sep. 26, 2018 |
1759 |
- |
Launching serverless Snyk |
Tim Kadlec |
Nov. 03, 2016 |
360 |
- |
Automate cloud compliance with Snyk IaC |
Lauren Place |
Feb. 07, 2023 |
591 |
- |
Discussions on improving security through chaos engineering |
Mariah Gresham |
Aug. 03, 2023 |
966 |
- |
How to strengthen security in your CI/CD pipeline |
James Konik |
Jul. 12, 2023 |
1800 |
- |
Snyk welcomes Helios, accelerating our ASPM vision with runtime insights |
Manoj Nair |
Jan. 16, 2024 |
874 |
- |
Snyk joins OpenSSF: Tackling open source supply chain security with a developer-first approach |
Guy Podjarny |
Oct. 19, 2021 |
443 |
- |
Snyk & Trend Micro deepen collaboration with a new solution for solving open source development risks |
Geva Solomonovich |
Aug. 27, 2020 |
731 |
- |
Command line tools for containers—using Snyk with Buildah, Podman, and Skopeo |
Matt Jarvis |
Dec. 09, 2020 |
2177 |
- |
Introducing Snyk’s new Risk Score for risk-based prioritization |
Gur Shafriri, Benji Catabi-Kalman |
Aug. 17, 2023 |
1514 |
- |
Four easy ways to analyze your Java and Kotlin code |
Brian Vermeer |
Aug. 13, 2024 |
1982 |
- |
10 Serverless security best practices |
Liran Tal, Guy Podjarny |
May. 31, 2019 |
3289 |
- |
5 ways to improve security during digital transformation |
Erin Cullen |
Apr. 10, 2023 |
1007 |
- |
How to use AI for software development and cybersecurity |
Simon Maple |
Aug. 30, 2023 |
1755 |
- |
SnakeYaml 2.0: Solving the unsafe deserialization vulnerability |
Brian Vermeer |
Jun. 21, 2023 |
1205 |
- |
Provide granular permissions and groups for users in Azure Repos |
Simon Maple |
May. 06, 2019 |
131 |
- |
Write secure Kubernetes configuration with help from Snyk |
Gareth Rushgrove |
Nov. 18, 2019 |
565 |
- |
What’s so wild about exploits in the wild - and how can we prioritize accordingly? |
Rachel Cheyfitz |
Nov. 21, 2019 |
1409 |
- |
Finding YAML Deserialization with Snyk Code |
Calum Hutton |
Feb. 23, 2023 |
799 |
- |
Announcing customized role-based access controls for Snyk |
Daniel Berman |
Jun. 29, 2022 |
1237 |
- |
Snyk announces new Slack integration |
Sarah Conway |
May. 30, 2023 |
610 |
- |
Best practices for using AI in the SDLC |
Frank Fischer |
Jul. 19, 2023 |
749 |
- |
DevOpsDays Singapore 2024: Unmasking the security pitfalls in AI-generated code |
Hiroko Nakano |
Apr. 23, 2024 |
562 |
- |
80% of developers are not addressing Docker security |
Brian Vermeer |
Apr. 17, 2019 |
654 |
2 |
A recap from our latest PCI webinar, and compliance tips from Deliveroo |
Taylor Macomber |
Oct. 17, 2019 |
909 |
- |
How I was hacking docker containers by exploiting ImageMagick vulnerabilities |
Liran Tal |
Mar. 11, 2021 |
1153 |
- |
Instant security information with the Snyk security badge |
Brian Vermeer |
Aug. 04, 2020 |
469 |
- |
Announcing the 2022 State of Cloud Security report from Snyk |
Megan Moore |
Sep. 13, 2022 |
757 |
- |
Engineering culture at Snyk: The values that support and drive our teams |
Sergey Vasilkov |
May. 08, 2023 |
2259 |
- |
SnykCon recap: Building a developer-focused AppSec program |
Mariah Gresham |
Jan. 27, 2022 |
1051 |
- |
"Dirty Pipe" Linux vulnerability and your containerized applications (CVE-2022-0847) |
Eric Smalling |
Mar. 09, 2022 |
1180 |
- |
Security lessons with a Snyk Ambassador |
Andres Haro |
Oct. 11, 2022 |
941 |
- |
3 tips from Snyk and Dynatrace’s AI security experts |
Sarah Conway |
Jan. 22, 2024 |
905 |
- |
Securing Go modules made easy (and accurately!) |
Ariel Ornstein |
Aug. 07, 2019 |
416 |
- |
HTTPS Adoption *doubled* this year |
Guy Podjarny |
Jul. 20, 2016 |
1349 |
139 |
Threat modelling For Node.js applications |
Gergely Nemeth |
Aug. 31, 2016 |
825 |
- |
Snyk Code, the only security tool chosen by developers in Stack Overflow's 2024 AI Search and Developer Tools survey |
Liqian Lim (林利蒨) |
Aug. 27, 2024 |
901 |
- |
SourMint malicious SDK research write up |
Kirill Efimov |
Oct. 16, 2020 |
5703 |
- |
Snyk Voices: Returning from maternity leave |
Tali Wahrhaft |
May. 06, 2022 |
2557 |
- |
10 Spring Boot security best practices |
Simon Maple |
Aug. 16, 2018 |
1888 |
- |
Snyk’s approach to container security research and relative importance |
Jim Armstrong |
Dec. 14, 2020 |
945 |
- |
How to prevent NullPointerExceptions in Java |
Lucien Chemaly |
Sep. 21, 2023 |
2669 |
- |
The ultimate guide to creating a secure Python package |
Gourav Singh Bais |
May. 08, 2024 |
3482 |
- |
Why you need a security companion for AI-generated code |
Liqian Lim (林利蒨) |
Oct. 25, 2023 |
1834 |
- |
Join Snyk in celebrating 31 days of Cybersecurity Awareness Month 2021 |
Randall Degges |
Oct. 01, 2021 |
455 |
- |
29% of highest security integration orgs endure friction when collaborating |
Liran Tal |
Jan. 28, 2020 |
635 |
- |
Building Docker images in Kubernetes |
Vitalis Ogbonna |
May. 03, 2022 |
1557 |
- |
Snyk takes over Boston for SnykWeek |
Megan Moore |
May. 19, 2022 |
663 |
- |
Differences in version handling between RubyGems and npm |
Gareth Visagie |
Dec. 14, 2016 |
1243 |
4 |
Reduce risk to your supply chain with a software bill of materials (SBOM) |
Ryan Searle |
Jun. 07, 2023 |
881 |
- |
Snyk provides native integration for Atlassian Bitbucket Cloud security |
Sarah Conway |
Jun. 15, 2021 |
887 |
- |
What is typosquatting and how typosquatting attacks are responsible for malicious modules in npm |
Liran Tal |
Jan. 12, 2021 |
1350 |
1 |
Cybersecurity Venture’s 2023 Software Supply Chain Attack Report |
Sydney Milligan |
Oct. 10, 2023 |
816 |
- |
Maximizing IAM security with AWS permissions boundaries and Snyk |
Wayne Crissman |
Jun. 26, 2023 |
1019 |
- |
What makes Verdaccio a successful project? |
Oren Hacohen |
Feb. 02, 2021 |
1578 |
- |
Fun with ciphers in copycat Wordles |
Micah Silverman |
Feb. 02, 2022 |
903 |
- |
Data leak in the Netherlands: What developers should learn from this |
Brian Vermeer |
Mar. 31, 2023 |
753 |
- |
Snyk Unifies Open Source and Container Security for Coveo |
Sarah Conway |
Nov. 23, 2019 |
232 |
- |
Snyk Closes $200M to Modernize Security Industry |
Peter McKay |
Sep. 09, 2020 |
371 |
- |
Identify vulnerabilities in your container images with Snyk’s enhanced Docker Desktop Extension |
LaToya Muff |
Apr. 11, 2023 |
363 |
- |
Learning from cloud transformation as we move to AI |
David Lugo |
May. 21, 2024 |
976 |
- |
Enabling policy as code (PaC) with OPA and Rego |
Eric Smalling |
Jan. 19, 2022 |
1522 |
- |
Remote code execution, cross-site scripting, and denial of service vulnerabilities account for 2/3 of known vulnerabilities in .NET ecosystem |
Hayley Denbraver |
Jul. 25, 2019 |
1066 |
- |
How to secure an S3 bucket on AWS? |
Liran Tal |
Jul. 12, 2024 |
3393 |
- |
Using Pulumi to automate the Snyk Kubernetes integration for containers |
Pas Apicella |
Feb. 09, 2022 |
2064 |
- |
How Axel Springer National Media and Tech achieved continuous security with Snyk |
Nina McClure |
Sep. 03, 2024 |
952 |
- |
Modern security leader spotlight: with Marcin Hoppe from Auth0 |
Noa Korem |
Sep. 19, 2019 |
1096 |
- |
You should be using HTTP Strict Transport Security (HSTS) headers in your Node.js server |
Raphael Mun |
Dec. 29, 2022 |
1729 |
- |
The State of Open Source Security 2020 |
Alyssa Miller |
Jun. 24, 2020 |
1912 |
- |
Secure Java URL encoding and decoding |
Jura Gorohovsky |
Aug. 14, 2023 |
3090 |
- |
Snyk named a Leader, placed highest in Strategy category in The Forrester Wave: Software Composition Analysis (SCA), Q2 2023 report |
Manoj Nair |
Jun. 13, 2023 |
770 |
- |
Give employees the flexibility to do their best work |
Peter McKay |
Jun. 07, 2021 |
522 |
- |
Building a secure Amazon S3 bucket (AWS) |
Josh Stella |
Sep. 08, 2020 |
1746 |
- |
Nightfall AI and Snyk unite to deliver AI-powered secrets scanning for developers |
LaToya Muff |
Nov. 29, 2023 |
547 |
- |
SnykCon recap: Automation for better compliance and faster feedback loops |
Megan Moore |
Apr. 13, 2022 |
1189 |
- |
Krampus delivers an end-of-year Struts vulnerability |
Micah Silverman |
Jan. 02, 2024 |
1667 |
- |
3 tips for rebuilding a Docker image faster (and save CI seconds!) |
Liran Tal |
Dec. 28, 2023 |
2564 |
- |
6 stages of refactoring a Jest test case |
Liran Tal |
Sep. 04, 2019 |
324 |
- |
Does AI lead to AppSec hell or nirvana? |
Erin Cullen |
Oct. 03, 2023 |
1040 |
- |
Snyk and Trek10 publish new AWS Quick Start Guide to secure serverless CI/CD deployments |
Jay Yeras |
Sep. 29, 2020 |
480 |
- |
Announcing SnykCon 2021: Build Securely |
Guy Podjarny |
Jun. 01, 2021 |
825 |
- |
Node.js multithreading with worker threads series: worker_threads tutorial |
James Walker |
Oct. 25, 2022 |
2310 |
- |
PHP security in Snyk Code now GA |
DeveloperSteve Coochin |
Jan. 26, 2022 |
760 |
- |
Announcing Snyk AppRisk: Elevate your AppSec game with ASPM |
Daniel Berman |
Dec. 12, 2023 |
1464 |
- |
3 ways AppSec modernization is a game-changer for financial services |
Katie DeMatteis |
Sep. 03, 2024 |
782 |
- |
SnykLaunch April '23: C/C++ expansion, cloud and IaC updates, custom container security, new integrations, and more |
Jim Armstrong |
Apr. 04, 2023 |
1462 |
- |
New SEC cybersecurity rules put more onus on the CISO, not so much on directors |
Myke Lyons |
Aug. 03, 2023 |
1578 |
- |
Preventing malicious packages and supply chain attacks with Snyk |
Daniel Berman |
Aug. 31, 2021 |
1421 |
- |
Enhancing code to cloud security with the Common Configuration Scoring System |
Wayne Crissman |
Dec. 14, 2023 |
998 |
- |
Secure development when working from home — tips and tricks |
Guy Podjarny |
Mar. 31, 2020 |
1737 |
- |
Snyk welcomes Enso: Enabling security leaders to scale their AppSec program with ASPM |
Manoj Nair |
Jun. 07, 2023 |
972 |
- |
Leaky Vessels: Docker and runc container breakout vulnerabilities (January 2024) |
Jamie Smith |
Jan. 31, 2024 |
1729 |
41 |
Introducing Snyk’s partnership with Gemini Code Assist |
David Lugo |
Apr. 09, 2024 |
682 |
- |
Snyk is named a Strong Performer as a first-time entrant in the Forrester Wave™: Static Application Security Testing (SAST) Q3 2023 |
Peter McKay |
Sep. 20, 2023 |
696 |
- |
Zip Slip Vulnerability Cheat Sheet |
Simon Maple |
Jun. 28, 2018 |
440 |
- |
Day in the life of a food giant CISO |
Vandana Verma Sehgal |
Apr. 18, 2024 |
668 |
- |
7 tips for prioritizing container and web application vulnerabilities |
Daniel Berman |
Sep. 22, 2020 |
1195 |
- |
Top ten most popular docker images each contain at least 30 vulnerabilities |
Liran Tal |
Feb. 26, 2019 |
1133 |
562 |
Join "The Big Fix" to secure your projects with Snyk and earn cool swag |
Liran Tal |
Feb. 09, 2022 |
1029 |
- |
How to educate, train and empower developers in security |
Simon Maple |
Jul. 25, 2018 |
843 |
- |
Snyk & Atlassian: How to embed security in AI-assisted software development |
LaToya Muff |
Feb. 14, 2024 |
1030 |
- |
Integrating Snyk Code SAST results in your ServiceNow workflows |
Sarah Conway |
May. 07, 2024 |
514 |
- |
How to Detect and Remediate Kubernetes Vulnerability CVE-2019-11249 |
Hayley Denbraver |
Mar. 11, 2020 |
884 |
- |
Three reasons to invest in an ASPM solution in 2024 |
Julia Kraut |
Dec. 12, 2023 |
610 |
- |
Exposed or not, vulnerabilities are dangerous |
Tim Kadlec |
Nov. 08, 2017 |
466 |
- |
With Love, Your Applications |
Krysta Williams-Timm |
Feb. 14, 2024 |
373 |
- |
Snyk named a 2022 Gartner Peer Insights Customers’ Choice for Application Security Testing |
Tony Sleva |
Oct. 04, 2022 |
382 |
- |
Three trends shaping software supply chain security today |
Erin Cullen |
Aug. 22, 2024 |
923 |
- |
Snyk named Visionary in 2021 Gartner Magic Quadrant for AST |
Aner Mazur |
Jun. 01, 2021 |
1187 |
- |
Understanding the software supply chain security requirements in the cybersecurity Executive Order |
Daniel Berman |
Jun. 10, 2021 |
1503 |
- |
How to add Playwright tests to your pull request CI with GitHub Actions |
Liran Tal |
Oct. 14, 2022 |
2546 |
- |
Using insecure npm package manager defaults to steal your macOS keyboard shortcuts |
Yagiz Nizipli |
Jun. 28, 2023 |
1102 |
- |
Protestware is trending in open source: 4 different types and their impact |
Benji Catabi-Kalman |
Mar. 22, 2022 |
1185 |
- |
Keep your dependencies up-to-date—enable auto upgrades with Snyk |
Dan Mckean |
Nov. 06, 2019 |
450 |
- |
Fetch the Flag CTF 2022 writeup: Roadrunner |
Giovanni Funchal |
Nov. 10, 2022 |
1138 |
- |
Snyker Spotlight: Reflecting on Juneteenth |
Kris Broughton |
Jun. 17, 2021 |
1257 |
- |
4 benefits of visualizing your cloud infrastructure |
Diem Shin |
Jun. 11, 2019 |
650 |
- |
AI quality: Garbage in, garbage out |
Michael Biocchi |
Jun. 11, 2024 |
730 |
- |
How to secure JavaScript applications right from the CLI |
Gideon Idoko |
Oct. 24, 2023 |
2412 |
- |
Securing cloud native applications: ActiveCampaign’s VP, Information Security provides perspective |
Brian Piper |
Apr. 09, 2021 |
1232 |
- |
Jackson Deserialization Vulnerability |
Brian Vermeer |
Aug. 21, 2019 |
586 |
1 |
Happy 1st Birthday, Snyk Code! |
Frank Fischer |
May. 06, 2022 |
1368 |
- |
10 best practices for securely developing with AI |
Simon Maple |
Sep. 27, 2023 |
3204 |
- |
How Snyk Code prioritizes vulnerabilities using their Priority Score |
Frank Fischer |
Nov. 09, 2021 |
1078 |
- |
Snyk top 10 code vulnerabilities report |
Mariah Gresham |
May. 18, 2023 |
424 |
1 |
Reachable vulnerabilities: how to effectively prioritize open source security |
Krysztof Huszcza |
Aug. 18, 2020 |
2177 |
1 |
Analyzing the PwnKit local privilege escalation exploit |
Kyle Suero |
Jan. 29, 2022 |
726 |
- |
SDRing during COVID-19—Snyk style! |
Brendan McCrann |
Jun. 01, 2020 |
445 |
- |
Setting up the Docker image scan GitHub Action |
Mohammad-Ali A'râbi |
May. 19, 2023 |
1076 |
- |
Why do organizations trust Snyk to win the open source security battle? |
Benji Catabi-Kalman |
May. 27, 2020 |
2302 |
- |
Getting started with PHP static analysis in 2024 |
Liran Tal |
Mar. 21, 2024 |
2431 |
- |
Introducing the Snyk App for Compass: A complete view of software component risk |
LaToya Muff |
Oct. 05, 2023 |
662 |
- |
How to prevent XPath injection attacks |
Marcelo Oliveira |
May. 10, 2023 |
2175 |
- |
Securing your SBOM on Google Cloud |
David Lugo |
Mar. 28, 2024 |
983 |
- |
The Log4j vulnerability and its impact on software supply chain security |
Liran Tal |
Dec. 13, 2021 |
2129 |
- |
More accurate than GPT-4: How Snyk’s CodeReduce improved the performance of other LLMs |
Eric Fernandez |
May. 07, 2024 |
1245 |
- |
These aren’t the npm packages you’re looking for |
DeveloperSteve Coochin |
May. 04, 2022 |
1141 |
- |
One month to SnykCon 2021: Sessions to attend, flags to capture, Simons to Maple |
Leigh Moore |
Sep. 07, 2021 |
722 |
- |
Snyk’s guide to disclosing pronouns |
Mariah Gresham, Alex Fallon |
Jun. 09, 2022 |
774 |
- |
Can AI write secure code? |
Frank Fischer |
May. 03, 2023 |
2244 |
- |
Securing Artifactory using Snyk |
Or Fattal |
Aug. 19, 2019 |
591 |
- |
Snyk finds 200+ malicious npm packages, including Cobalt Strike dependency confusion attacks |
Kirill Efimov |
May. 24, 2022 |
2807 |
3 |
The State of Cloud Native Application Security survey—2021 |
Matt Jarvis |
Feb. 02, 2021 |
431 |
- |
Introducing parlay, a tool for enriching SBOMs |
Gareth Rushgrove |
Jun. 07, 2023 |
773 |
- |
Introducing groups – a new way to manage your teams in Snyk |
Anna Debenham |
Mar. 06, 2018 |
525 |
- |
Understanding filesystem takeover vulnerabilities in npm JavaScript package manager |
Liran Tal |
Jan. 07, 2020 |
1366 |
34 |
360 degrees of application security with Snyk |
Soumen Mukherjee |
Apr. 24, 2024 |
1273 |
- |
How to keep an HTTP connection alive for 9 hours |
Micah Silverman |
Oct. 23, 2023 |
2391 |
3 |
Log4Shell in a nutshell (for non-developers & non-Java developers) |
Micah Silverman |
Dec. 15, 2021 |
1203 |
- |
Congratulations to Snyk’s 2022 CRN Women of the Channel |
Carey Stanton |
May. 09, 2022 |
740 |
- |
New O’Reilly book — Cloud Native Application Security: Embracing Developer-First Security for the Cloud Era |
Simon Maple |
Jun. 15, 2021 |
965 |
- |
How to build a secure API gateway in Node.js |
Florian Rappl |
Dec. 28, 2022 |
2647 |
- |
Response to the Enduring Security Framework (ESF) Guide for Developers |
Gareth Rushgrove |
Sep. 03, 2022 |
602 |
- |
Creating SBOMs with the Snyk CLI |
Brian Vermeer |
Feb. 08, 2024 |
1348 |
- |
What’s new in Snyk? |
Rachel Cheyfitz |
Jun. 10, 2019 |
346 |
- |
Vulnerability: runc process.cwd and leaked fds container breakout (CVE-2024-21626) |
Rory McNamara |
Jan. 31, 2024 |
1114 |
3 |
Ethical hacking techniques |
Vandana Verma Sehgal |
Jun. 05, 2023 |
1713 |
- |
Snyk Container certified “VMware PKS Partner Ready” to find and fix vulnerabilities in container workloads |
Jim Armstrong |
Apr. 17, 2020 |
459 |
- |
Snykers spoke, we listened—Snyk collects 4 Best Place to Work awards by Comparably |
Fenella Vavasour |
Aug. 13, 2020 |
1099 |
- |
Snyk Closes $150M to Accelerate Developer-first Security |
Peter McKay |
Jan. 21, 2020 |
405 |
7 |
Alert: LaughTilYouCry ransomware sabotages npm package (with puns) |
Mariah Gresham |
Apr. 01, 2022 |
529 |
- |
10 Java security best practices |
Brian Vermeer, Jim Manico |
Sep. 17, 2019 |
3330 |
2 |
PCI standards open source security requirements — how to comply? |
Danny Grander |
Jul. 23, 2019 |
1393 |
- |
Snykers share wellness tips for mental health awareness month |
Belyn Lai |
May. 30, 2023 |
706 |
- |
Snyk Partner Speaks series: True DevSecOps with Snyk and Dynatrace |
Sarah Conway |
Jun. 08, 2023 |
177 |
- |
Vuln Cost: Effortless finding vulnerabilities in npm packages with VS Code |
Brian Vermeer |
Apr. 02, 2020 |
548 |
- |
Using Node.js event loop for timing attacks |
Danny Grander |
Feb. 16, 2016 |
1640 |
4 |
Snyk enhances ServiceNow with comprehensive insights into vulnerabilities in open source software |
Marco Morales |
Jan. 24, 2023 |
633 |
- |
The security course missing from higher education |
Michael Biocchi |
Jul. 12, 2022 |
955 |
- |
Snyk ranked #20 on 2022 Forbes Cloud 100 list |
Jeff Yoshimura |
Aug. 09, 2022 |
341 |
- |
From image security to workload security |
Gareth Rushgrove |
Oct. 31, 2019 |
859 |
- |
JVM Ecosystem Report 2020 |
Brian Vermeer |
Feb. 05, 2020 |
460 |
- |
Container images simplified with Ko |
Eric Smalling |
Oct. 10, 2022 |
3025 |
1 |
Snyk Ranked #19 on 2023 Forbes Cloud 100 List |
Peter McKay |
Aug. 08, 2023 |
430 |
- |
Responsible disclosure: the impact of vulnerability disclosure on open source security |
Asaf Biton |
Apr. 07, 2020 |
695 |
- |
Snyk Code is now available for free |
Frank Fischer |
May. 06, 2021 |
735 |
1 |
Talking visibility, scalability, and relationships in secure development with Phil Guimond of ViacomCBS |
Simon Maple |
Jul. 01, 2021 |
2244 |
- |
Security Transformation and The Three Faces of DevSecOps |
Guy Podjarny |
Mar. 08, 2019 |
243 |
- |
Going beyond “shift left” to extend AppSec in all directions |
Ben Desjardins |
Jul. 09, 2024 |
968 |
- |
Prioritizing vulnerabilities in Kubernetes deployments |
Gareth Rushgrove |
Aug. 06, 2020 |
572 |
- |
Snyk Named a 2018 Gartner Cool Vendor in Application and Data Security |
Guy Podjarny |
May. 15, 2018 |
657 |
- |
Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub |
Vandana Verma Sehgal |
Jun. 22, 2023 |
399 |
- |
Gradle dependencies: scanning with new Snyk Gradle plugin |
Brian Vermeer |
Oct. 23, 2020 |
885 |
- |
Snyk Partner Speak Video Series Puts Spotlight on New Integrations |
Sarah Conway |
Apr. 12, 2023 |
181 |
- |
Snyk takes on responsibility for Node.js ecosystem vulnerability disclosure program |
Benji Catabi-Kalman |
May. 25, 2021 |
499 |
2 |
Securing S3 bucket configuration and access with Snyk & Solvo |
Lauren Place |
Oct. 18, 2021 |
1114 |
- |
How to build a modern DevSecOps culture: Lessons from Jaguar Land Rover and Asda |
Brian Piper |
Feb. 21, 2024 |
1209 |
- |
78% of vulnerabilities are found in indirect dependencies, making remediation complex |
Liran Tal |
Feb. 26, 2019 |
989 |
- |
Snyk IaC scanning enhancements include Azure and AWS infrastructure as code |
Eric Smalling |
Feb. 23, 2021 |
769 |
- |
Launching the State of Open Source Security Survey |
Tim Kadlec |
Sep. 21, 2017 |
366 |
7 |
Go security cheatsheet: 8 security best practices for Go developers |
Eric Smalling |
Feb. 09, 2021 |
1889 |
- |
Panel recap: Breaking Bad Security Habits with Corey Quinn |
Erin Cullen |
Dec. 20, 2022 |
985 |
- |
Welcoming Dino DiMarino: The first Snyk Chief Revenue Officer |
Peter McKay |
Oct. 13, 2021 |
452 |
- |
Amplifying AAPI Voices to Honor Asian American Pacific Islander Heritage Month |
Belyn Lai, Yos Pang |
May. 25, 2023 |
1495 |
- |
NPM security: preventing supply chain attacks |
Liran Tal |
Nov. 08, 2022 |
3307 |
1 |
Integrating the Snyk Language Server with IntelliJ IDEs |
Arvyd Paeglit |
Jun. 17, 2024 |
344 |
- |
3 tips to manage drift from manual changes in Terraform |
Stephane Jourdan |
May. 22, 2020 |
939 |
- |
Black Hat Asia customer panel recap: How to lead DevSecOps adoption |
Brian Piper |
Sep. 18, 2023 |
821 |
- |
Critical Arbitrary Code Execution Vulnerability Found in Kubernetes |
Liran Tal |
Dec. 20, 2018 |
715 |
- |
Recap: Stress-Free Security for Devs and Ops on AWS |
David Lugo |
Apr. 03, 2023 |
1341 |
- |
Fixing vulnerabilities in Maven projects |
Brian Vermeer |
Sep. 14, 2020 |
948 |
- |
Building a culture of Digital Trust |
Stephanie Dominy |
Feb. 18, 2020 |
999 |
- |
SuiteCRM: PHAR deserialization vulnerability to code execution |
Sam Sanoop |
May. 07, 2021 |
1707 |
- |
Hunting intent-based Android security vulnerabilities with Snyk Code |
Raul Onitza-Klugman |
May. 27, 2021 |
1654 |
- |
81% believe developers should own security, but they aren’t well-equipped |
Liran Tal |
Feb. 26, 2019 |
923 |
- |
Polyfill supply chain attack embeds malware in JavaScript CDN assets |
Liran Tal |
Jun. 26, 2024 |
1892 |
- |
The npm faker package and the unexpected demise of open source libraries |
Liran Tal |
Sep. 02, 2022 |
2339 |
- |
Building security into your Azure DevOps Pipeline |
Udi Nachmany |
Dec. 16, 2019 |
308 |
- |
Kernel privilege escalation: how Kubernetes container isolation impacts privilege escalation attacks |
Kamil Potrec |
Dec. 03, 2020 |
3824 |
4 |
NumPy arbitrary code execution vulnerability |
Hayley Denbraver |
Feb. 05, 2019 |
394 |
- |
Java ecosystem survey 2021 |
Brian Vermeer |
Feb. 15, 2021 |
247 |
- |
Go security: announcing enhanced security for Go applications |
Daniel Berman |
Dec. 16, 2020 |
1319 |
- |
Snyk Fetch the Flag CTF 2023 writeup: Audiopolis |
John Hammond |
Nov. 30, 2023 |
278 |
- |
Securing the digital future: Reviewing the Biden-Harris administration's National Cybersecurity Strategy |
Vandana Verma Sehgal |
Mar. 20, 2023 |
713 |
- |
Hypergrowth Playbook: 7 best practices as you go from startup to scaleup |
Dipti Salopek |
Aug. 25, 2021 |
1052 |
- |
RPM Package Manager: RPM package security scanning with Snyk |
Ivan Stanev |
Nov. 13, 2020 |
2414 |
- |
Snyk streamlines procurement with AWS Marketplace Solution Provider Private Offers (SPPO) |
David Lugo |
May. 11, 2021 |
696 |
- |
A security expert’s view on Gartner’s generative AI insights |
Liqian Lim (林利蒨) |
Aug. 07, 2024 |
1729 |
- |
Using third party content securely |
Gareth Rushgrove |
Nov. 08, 2019 |
881 |
- |
Snyk CLI: Introducing Semantic Versioning and release channels |
Chintan B. |
Apr. 30, 2024 |
930 |
- |
Scanning Harbor registry images for vulnerabilities with Snyk |
Eric Smalling |
Apr. 01, 2021 |
655 |
- |
Cheat sheet: Meeting security compliance standards |
Mariah Gresham |
Sep. 15, 2022 |
784 |
- |
How to make a mock API server in JavaScript |
David Ekete |
Oct. 20, 2022 |
2038 |
1 |
Shifting left security incident management with the Snyk & Opsgenie integration |
Jay Yeras |
Feb. 24, 2021 |
840 |
- |
Call for action: Exploring vulnerabilities in Github Actions |
Elliot Ward, Rory McNamara, Raul Onitza-Klugman |
Jun. 06, 2024 |
3977 |
- |
Continuous dependency updates: Improving processes by front-loading pain |
James Bowes |
May. 24, 2021 |
1499 |
2 |
How Snyk can help secure supply chains per Executive Order M-21-30 |
Vandana Verma Sehgal |
Sep. 29, 2022 |
1767 |
1 |
Security in context: When is a CVE not a CVE? |
Matt Jarvis |
Dec. 17, 2021 |
953 |
2 |
Session management security: Best practices for protecting user sessions |
Okoth Pius |
Jul. 11, 2023 |
2703 |
1 |
31% don’t track application dependencies and 38% only track direct dependencies |
Liran Tal |
Jan. 28, 2020 |
653 |
- |
Data loss prevention for developers |
Annabel Gauci |
May. 24, 2023 |
2103 |
2 |
Snyk brings infrastructure as code security to HashiCorp Terraform Cloud |
Marco Morales |
May. 04, 2022 |
762 |
- |
Top 5 scary AWS misconfigurations |
Shilpi Bhattacharjee |
Oct. 31, 2022 |
816 |
- |
Immutable infrastructure: Networks |
Drew Wright |
Apr. 17, 2015 |
1152 |
- |
Log4j 2.16 High Severity Vulnerability (CVE-2021-45105) Discovered |
Benji Catabi-Kalman |
Dec. 18, 2021 |
767 |
- |
Vulnerable Gradle plugin-publish plugin reveals sensitive information |
Brian Vermeer |
Mar. 31, 2020 |
364 |
- |
Snyk and Atlassian deepen partnership with Snyk security in Jira Software |
Jill Wilkins |
Feb. 08, 2023 |
412 |
- |
Announcing enhanced end-to-end security for Bitbucket Cloud development workflows |
Daniel Berman |
Jun. 04, 2020 |
829 |
- |
10 modern Node.js runtime features to start using in 2024 |
Liran Tal |
May. 29, 2024 |
5030 |
2 |
Snyk and AWS announce native Amazon EKS support directly from the AWS Management Console |
David Lugo |
Jun. 12, 2024 |
418 |
- |
5 Node.js security code snippets every backend developer should know |
Liran Tal |
Feb. 28, 2024 |
3106 |
- |
Regular Expression Denial of Service (REDoS) in UAParser.js |
Alyssa Miller |
Oct. 26, 2020 |
1125 |
- |
Introducing the ASPM Masterclass |
Erin Cullen |
Mar. 12, 2024 |
504 |
- |
The new, improved Snyk Container CLI |
Gareth Rushgrove |
Oct. 29, 2020 |
932 |
- |
Welcoming Adriana Bokel Herde: Snyk’s new Chief People Officer |
Peter McKay |
Sep. 01, 2021 |
588 |
- |
Dependency injection in Python |
Lucien Chemaly |
Oct. 31, 2023 |
2919 |
- |
Snyk Apps now GA: An easy, standardized, and secure framework for building custom integrations |
Sarah Conway |
Nov. 20, 2023 |
1108 |
- |
Manage security issues in Jira with Snyk Security in Jira Cloud |
LaToya Muff |
Aug. 09, 2023 |
330 |
- |
Securing symmetric encryption algorithms in Java |
Brian Vermeer |
Oct. 18, 2023 |
1489 |
- |
How Comic Relief’s developers used Snyk to automate security and boost productivity as part of their Digital Transformation. |
Ellen Van Keulen |
Mar. 22, 2018 |
709 |
- |
Scan for AWS CloudFormation misconfigurations with Snyk IaC |
Ilianna Papastefanou |
Jun. 17, 2021 |
1083 |
- |
Managing Node.js Docker images in GitHub Packages using GitHub Actions |
Liran Tal |
Jul. 13, 2021 |
1791 |
- |
Preventing insecure deserialization in Node.js |
Benson Kuria Macharia |
Apr. 17, 2023 |
1890 |
- |
Building a security-conscious CI/CD pipeline |
Peter De Tender |
Jun. 29, 2023 |
1529 |
- |
Snyk Code CLI support now in public beta |
Frank Fischer |
Sep. 21, 2021 |
1619 |
- |
New Gartner Market Guide highlights the importance of Software Composition Analysis (SCA) |
Daniel Berman |
Sep. 01, 2020 |
1434 |
- |
Open source maintainers want to be secure, but 70% lack skills |
Liran Tal |
Feb. 26, 2019 |
1787 |
- |
Interview with an engineer: Diving into modern SAST |
Snyk Team |
May. 18, 2022 |
1355 |
- |
Snyk debuts on 2021 CNBC Disruptor 50 List at #15 |
Peter McKay |
May. 27, 2021 |
363 |
- |
Announcing Snyk’s developer-first prioritization capabilities |
Daniel Berman |
Jul. 22, 2020 |
1604 |
- |
A year-old dormant malicious remote code execution vulnerability discovered in Webmin |
Hayley Denbraver |
Aug. 20, 2019 |
510 |
3 |
Controlling your server with a reverse shell attack |
Brian Vermeer |
Aug. 10, 2022 |
1544 |
- |
Snyk at RSAC 2021 — ML in SAST: Distraction or Disruption |
Tony Sleva |
Jun. 30, 2021 |
882 |
- |
Protecting our culture as we hyperscale |
Dipti Salopek |
Feb. 04, 2020 |
823 |
- |
Is your team on the *security* naughty or nice list? |
Mariah Gresham |
Dec. 20, 2023 |
873 |
- |
Secure your application from Argo CD to Kubernetes |
JJ Ng |
Oct. 12, 2022 |
1253 |
- |
How to find and fix XML entity vulnerabilities |
Michael Sherman |
Sep. 07, 2022 |
2223 |
- |
How REI built a DevSecOps culture and how Snyk helped |
Brian Piper |
Feb. 27, 2024 |
1154 |
- |
What’s a known vulnerability? |
Guy Podjarny |
Feb. 06, 2018 |
991 |
- |
Applying risk management to DevOps practices with Snyk & Datadog |
Brian Piper |
Jan. 04, 2021 |
815 |
- |
Preventing YAML parsing vulnerabilities with snakeyaml in Java |
Brian Vermeer |
Mar. 30, 2021 |
1273 |
- |
Container image formats under the hood |
Agata Krajewska |
Nov. 18, 2020 |
2232 |
- |
Git, the easy way: changing history using rebase—part I |
Or Kamara |
Jun. 09, 2020 |
1869 |
- |
Announcing Snyk Impact |
Bry Breckenridge |
Oct. 06, 2021 |
1031 |
- |
Snyk achieves Red Hat Vulnerability Scanner Certification |
Tomás González Blasini, David Lugo |
Apr. 03, 2023 |
391 |
- |
4 tips to manage multiple Terraform versions |
Stephane Jourdan |
May. 27, 2020 |
750 |
- |
Snyk is available on the GOV.UK Digital Marketplace! |
Guy Podjarny |
Jun. 01, 2017 |
385 |
- |
SolarWinds Orion Security Breach: A Shift In The Software Supply Chain Paradigm |
Anton Hoffman |
Mar. 02, 2021 |
576 |
- |
Why fuzzing tools should be part of your security toolkit |
Kuria Macharia |
Oct. 28, 2022 |
1763 |
- |
Why the Facebook outage and Twitch breach matter to business leaders |
Josh Stella |
Oct. 14, 2021 |
1357 |
- |
How to find and fix Critical WebP zero-day vulnerability CVE-2023-4863 |
Brian Clark, Eric Smalling, Tim Gowan |
Oct. 05, 2023 |
1282 |
- |
Snyk-Watcher: keep Snyk in sync |
Vlad Perelmuter |
Feb. 17, 2021 |
429 |
- |
Weak Hash vulnerability discovered in crypto-js and crypto-es (CVE-2023-46233 & CVE-2023-46133) |
Jamie Smith |
Oct. 25, 2023 |
1509 |
- |
Regular Expression Denial-of-Service in websocket-extensions |
Alyssa Miller |
Jun. 22, 2020 |
849 |
- |
Developing secure software: how to implement the OWASP top 10 Proactive Controls |
Liran Tal |
Nov. 05, 2020 |
1423 |
- |
Why did is-promise happen and what can we learn from it |
Liran Tal |
Apr. 28, 2020 |
1314 |
2 |
2022 Snyk Customer Value Study highlights: The impact of developer-first security |
Jeff Yoshimura |
Oct. 18, 2022 |
1061 |
- |
Announcing the Snyk Team plan: Secure development for teams |
Daniel Berman |
Apr. 21, 2021 |
879 |
- |
It takes a community: Responding to open source criticism post-Log4Shell |
Randall Degges |
Dec. 24, 2021 |
1904 |
- |
Open source vulnerabilities tripped Equifax, how can you defend yourself? |
Guy Podjarny |
Sep. 11, 2017 |
1233 |
12 |
Continuously secure all apps with unlimited Snyk projects |
Guy Podjarny |
Apr. 05, 2017 |
379 |
- |
How to update cURL |
Brian Clark, Eric Smalling |
Oct. 11, 2023 |
1772 |
- |
AWS top 10 misconfigurations and how to fix them: A cheat sheet |
Erin Cullen |
Mar. 15, 2023 |
1546 |
- |
Call for nominations: The Snykie awards for Secure Development |
Sarah Wills |
Sep. 28, 2021 |
427 |
- |
Fixing a Prototype Override Protection Bypass Vulnerability in qs |
Tim Kadlec |
Mar. 14, 2017 |
546 |
- |
6 big AWS IAM vulnerabilities – and how to avoid them |
Becki Lee |
Nov. 05, 2021 |
1098 |
- |
77% of 433,000 sites use vulnerable JavaScript libraries |
Tim Kadlec |
Nov. 21, 2017 |
1394 |
108 |
Azure Repos enriched with DevSecOps capabilities |
Ariel Ornstein |
May. 01, 2019 |
440 |
- |
Snyk + International Dog Day: recap |
Megan Moore |
Oct. 05, 2022 |
374 |
- |
Snyk vulnerability disclosure program: what’s going on behind the scenes? |
Asaf Biton |
Apr. 14, 2020 |
885 |
- |
The most common vulnerabilities in Maven Central and npm |
Simon Maple |
Jun. 27, 2018 |
540 |
- |
Handling security vulnerabilities in Spring Boot |
Brian Vermeer |
Nov. 29, 2023 |
1451 |
- |
Three considerations for building an effective security program |
Alex Bovee |
May. 04, 2023 |
920 |
- |
How Dun & Bradstreet and Shutterstock built successful security champions programs |
Sarah Wills |
Oct. 14, 2021 |
922 |
- |
Top 8 penetration testing tools |
Benson Kuria Macharia |
May. 25, 2023 |
1172 |
- |
Snyk Learn and the NIST Cybersecurity Framework (CSF) |
Michael Biocchi |
Mar. 06, 2024 |
523 |
- |
Snyk named #39 on 2021 Forbes Cloud 100 list |
Jeff Yoshimura |
Aug. 11, 2021 |
375 |
- |
Deep dive into Visual Studio Code extension security vulnerabilities |
Raul Onitza-Klugman |
May. 26, 2021 |
2562 |
1 |
Snyk Fetch the Flag CTF 2023 writeup: Protect The Environment |
John Hammond |
Nov. 30, 2023 |
243 |
- |
How even quick Node.js async functions can block the Event-Loop |
Michael Gokhman |
Feb. 04, 2019 |
3451 |
3 |
Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195) |
Liran Tal |
Jan. 18, 2024 |
1059 |
- |
Accelerate C/ C++ security with Snyk |
Marcie Cheung |
Dec. 05, 2023 |
614 |
- |
The Secure Developer: talking DevSecOps in Azure with Microsoft’s Victoria Almazova |
Hayley Denbraver |
Sep. 26, 2019 |
819 |
- |
Scaling your security team without hiring |
Drew Wright |
Nov. 02, 2022 |
984 |
- |
Angular security best practices |
Liran Tal |
Aug. 10, 2020 |
2003 |
2 |
Mastering Python virtual environments: A complete guide to venv, Docker, and securing your code |
Liran Tal |
Jan. 10, 2024 |
1589 |
- |
Snyk Fetch the Flag CTF 2023 writeup: I Do Math |
John Hammond |
Nov. 30, 2023 |
190 |
- |
Snyk @ Snyk: Enabling Kubernetes RBAC for Snyk’s Developers |
Omer Levi Hevroni |
Apr. 14, 2021 |
771 |
- |
8 tips for securing containers from source to runtime |
Sarah Conway |
Aug. 24, 2022 |
661 |
- |
How to verify and secure your Mastodon account |
Liran Tal |
Dec. 05, 2022 |
946 |
- |
How to protect Node.js apps from CSRF attacks |
Victor Ikechukwu |
Oct. 17, 2023 |
3146 |
- |
Snyk integrates with AWS Security Hub to automate security remediation workflows |
David Lugo |
Jun. 12, 2023 |
884 |
- |
Command injection vulnerability in Snyk CLI released prior to September 1, 2022 (older than v1.996.0) |
Gareth Rushgrove |
Oct. 03, 2022 |
501 |
- |
LGBTQ+ in tech: from building apps to spreading magic—part I |
Eirini-Eleni Papadopoulou |
Jun. 29, 2020 |
2646 |
- |
How to implement SSL/TLS pinning in Node.js |
Nwani Victory |
Aug. 29, 2023 |
2298 |
- |
Python security best practices cheat sheet |
Frank Fischer |
Sep. 27, 2021 |
2241 |
5 |
Streamline dependency updates with Mergify and Snyk |
Liran Tal |
Aug. 23, 2023 |
1548 |
- |
10 Docker Security Best Practices |
Liran Tal, Omer Levi Hevroni |
Mar. 06, 2019 |
3479 |
1 |
The Cloud Security Podcast is now powered by Snyk! |
Ashish Rajan |
Jul. 26, 2022 |
562 |
- |
5 security best practices for adopting generative AI code assistants like GitHub Copilot |
Liqian Lim (林利蒨) |
Mar. 05, 2024 |
1368 |
- |
A denial of service Regex breaks FastAPI security |
Liran Tal |
Jul. 31, 2024 |
1878 |
- |
How secure is WebAssembly? 5 security concerns unique to WebAssembly |
Marcelo Oliveira |
Jul. 28, 2023 |
1448 |
2 |
Scanning Red Hat Quay registry images for vulnerabilities with Snyk |
Jim Armstrong |
Apr. 01, 2021 |
880 |
- |
The Docker project turns 10! Looking back at a decade of containers |
Eric Smalling |
Mar. 17, 2023 |
3058 |
- |
Update: OpenSSL high severity vulnerabilities |
Vandana Verma Sehgal |
Nov. 03, 2022 |
516 |
- |
Talk to us about Snyk CLI |
Chintan B., Neil Mackay |
Jun. 06, 2024 |
859 |
- |
Snyk Announces New Rapid7 Strategic Partnership at RSA 2020 |
Sarah Conway |
Feb. 24, 2020 |
387 |
- |
How Mulesoft fosters a developer-first, shift-left culture with Snyk |
Gerald Crescione |
Apr. 30, 2024 |
798 |
- |
Snyk Open Source adds beta C/C++ security scanning for unmanaged OSS |
Daniel Berman |
Dec. 08, 2021 |
974 |
- |
Why developer-first SAST tools are the future of code security |
Liran Tal |
Apr. 28, 2021 |
2293 |
- |
Launching a Free-Tier Version of our Container Vulnerability Management Solution |
Liron Lifshitz-Yadin |
Oct. 10, 2018 |
253 |
- |
The art of conditional rendering: Tips and tricks for React and Next.js developers |
Kumar Harsh |
Oct. 30, 2023 |
2865 |
- |
Trend Micro and Snyk partner to deliver complete remediation to secure containers |
Geva Solomonovich |
Oct. 08, 2019 |
438 |
- |
Snyk's 2023 State of Open Source Security: Supply chain security, AI, and more |
Simon Maple |
Jul. 26, 2023 |
1184 |
- |
Snyk achieves AWS Security Competency |
David Lugo |
Nov. 15, 2023 |
514 |
- |
Improve security by knowing when to ignore IaC vulnerabilities |
Craig Furman |
Sep. 29, 2021 |
1004 |
- |
Diagnosing and fixing memory leaks in Python |
Drew Wright |
Mar. 07, 2017 |
2313 |
- |
Faster & improved tests for JavaScript lockfile based projects |
Liliana Kastilio |
Dec. 10, 2018 |
641 |
- |
Welcoming Sanjay Poonen to the Snyk Board of Directors |
Peter McKay |
Oct. 20, 2021 |
564 |
- |
Preventing SQL injection attacks in Node.js |
Lucien Chemaly |
Feb. 20, 2024 |
2260 |
- |
Snyking in - regular expression denial of service vulnerability exploit in the ms package |
Simon Maple |
Mar. 13, 2019 |
864 |
- |
Addressing cybersecurity challenges in open source software with the Linux Foundation |
Mariah Gresham |
Jul. 20, 2022 |
1033 |
- |
Angular vs React: security bakeoff 2019 |
Liran Tal |
Oct. 30, 2019 |
999 |
- |
A brief history of modularity |
Josh Emerson |
Nov. 21, 2016 |
625 |
- |
DevSecCon24 2021: 24 hours of development, security, and inclusivity |
Sam Hepburn |
Jun. 07, 2021 |
845 |
- |
Popular Python library, urllib3, subject to a denial of service vulnerability |
Hayley Denbraver |
Mar. 09, 2020 |
485 |
- |
Snyk $7M Series A - and a huge thanks! |
Guy Podjarny |
Mar. 08, 2018 |
884 |
- |
Best practices for secrets management in serverless applications |
Liran Tal |
Jun. 13, 2019 |
709 |
- |
How Voltos Uses Snyk to Secure Their Own Security Product |
Glenn Gillen |
Feb. 22, 2017 |
807 |
- |
Find and fix vulnerabilities in Artifactory container repositories |
Jim Armstrong |
Feb. 08, 2020 |
674 |
- |
SnykLaunch June ‘23: Insights and DeepCode AI enable faster fixes and prioritization |
Jim Armstrong |
Jun. 07, 2023 |
1567 |
- |
Snyk and Rapid7 partnership expand capabilities to enhance security for cloud native applications |
Sarah Conway |
Sep. 17, 2020 |
341 |
- |
Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk |
Chandler Mayo |
Jun. 25, 2024 |
902 |
- |
Breaking down the ’critical’ OpenSSL vulnerability |
Elliot Ward, Raul Onitza-Klugman |
Nov. 04, 2022 |
1657 |
- |
2020 Q1 in review—JVM ecosystem report, DevSecOps insights, and more |
Simon Maple |
Dec. 28, 2020 |
844 |
- |
Does GitOps enhance application security? |
Vandana Verma Sehgal |
Aug. 21, 2023 |
1026 |
- |
What are AI hallucinations and why should developers care? |
Liran Tal |
Aug. 16, 2023 |
2376 |
1 |
Ruby gem installations can expose you to lockfile injection attacks |
Liran Tal |
Aug. 17, 2022 |
2317 |
- |
Fastify Node.js framework improves JSON security thanks to a security report |
Liran Tal |
Mar. 10, 2020 |
424 |
1 |
Infrastructure drift and drift detection explained |
Lauren Place |
Mar. 09, 2022 |
1362 |
- |
Welcoming Danny Allan and Brian Rogan: Snyk leadership team expands with key appointments to accelerate innovation |
Peter McKay |
Feb. 06, 2024 |
492 |
- |
The 8 best IntelliJ plugins for improving your coding experience |
Brian Vermeer |
Aug. 26, 2021 |
1356 |
- |
Fixing `marked` XSS vulnerability |
Guy Podjarny |
May. 15, 2016 |
1081 |
2 |
Keeping your open source credentials closed |
Guy Podjarny |
Dec. 14, 2015 |
1258 |
- |
Getting started with React Native security |
Kingsley Ubah |
Apr. 07, 2022 |
2306 |
- |
Code Dx 5.3 integrates with Snyk for comprehensive vulnerability management |
Utsav Sanghani |
Apr. 19, 2021 |
531 |
- |
Fetch the Flag CTF 2022 writeup: Logster |
Sonya Moisset |
Nov. 10, 2022 |
1063 |
- |
Snyk welcomes Reviewpad: Code, commit, celebrate! |
Manoj Nair |
Oct. 30, 2023 |
606 |
- |
Our favorite 2023 Snyk Fetch the Flag CTF writeups from the community |
Danielle Bradford |
Nov. 21, 2023 |
183 |
- |
5 ways to prevent PHP code injection |
DeveloperSteve Coochin |
Jun. 29, 2021 |
1907 |
- |
Top 3 security best practices for handling JWTs |
Liran Tal |
Dec. 18, 2023 |
2007 |
- |
A quick primer on LDAP injection |
Eric Kahuha |
Jun. 01, 2023 |
1379 |
- |
10 GitHub Security Best Practices |
Brian Vermeer |
Feb. 05, 2024 |
3532 |
3 |
Ruby on Rails Docker for local development environment |
Mikhail Tereschenko |
Nov. 02, 2022 |
1770 |
- |
So, you think your CI/CD environment is secure? |
Simon Maple |
Feb. 21, 2019 |
1426 |
2 |
.NET developers alert: Moq NuGET package exfiltrates user emails from git |
Liran Tal |
Aug. 09, 2023 |
831 |
2 |
Snyk Code in 2021: Redefining SAST |
Frank Fischer |
Dec. 21, 2021 |
593 |
- |
Snyk expands into Asia Pacific Japan |
Peter McKay |
Mar. 11, 2021 |
706 |
- |
International Men’s Day—it’s time to talk |
Nickie Hills |
Nov. 19, 2020 |
1159 |
- |
Fixing a Remote Code Execution Vulnerability in EJS |
Tim Kadlec |
Nov. 30, 2016 |
664 |
- |
Modern VS Code extension development tutorial: Building a secure extension |
Mdu Sibisi |
Oct. 02, 2023 |
3917 |
- |
Securing Bitbucket Cloud with Snyk |
Ariel Ornstein |
Apr. 04, 2019 |
460 |
- |
Container vulnerability management for developers |
Aner Mazur |
Jun. 28, 2018 |
655 |
- |
Introducing SUS: Snyk Ultimate Security |
Megan Moore |
Apr. 01, 2022 |
592 |
- |
Engineering is somewhat like basketball |
Anton Drukh |
Aug. 04, 2016 |
1224 |
- |
A serious security flaw in runC can result in root privilege escalation in Docker and Kubernetes |
Liran Tal |
Feb. 13, 2019 |
932 |
- |
Showing Snyk security information in GitHub code scanning |
Gareth Rushgrove |
Oct. 07, 2020 |
582 |
- |
Control your role! Kubernetes RBAC explored |
James Walker |
Jul. 27, 2023 |
2123 |
- |
The importance of platform engineers in a security program |
Elliott Spira |
Apr. 13, 2023 |
962 |
- |
Snyk Partner Speak Video with ServiceNow: A complete view of application security |
Sarah Conway |
May. 02, 2023 |
196 |
- |
Snyk <3 Jira |
Anna Debenham |
Jun. 20, 2018 |
551 |
- |
Reporting AppSec risk up to your CISO |
Kate Powers Burke, Ezra Tanzer |
Feb. 13, 2024 |
1945 |
- |
How Snyk Social Trends help you fix essential security vulnerabilities |
Brian Vermeer |
Aug. 18, 2021 |
909 |
- |
Securing next-gen development: Lessons from Trust Bank and TASConnect |
Gerald Crescione |
Jun. 05, 2024 |
1312 |
- |
Building a secure CI/CD pipeline with GitHub Actions for your Java Application |
Brian Vermeer |
Jun. 27, 2022 |
1456 |
- |
My first week at Snyk was at our All Hands Conference |
Hayley Denbraver |
Feb. 12, 2019 |
1300 |
- |
Snyk brings developer-first AppSec approach to C/C++ |
Roy Ram, Neha Shenoy |
Apr. 04, 2023 |
1094 |
- |
Maven support is here! |
Guy Podjarny |
Apr. 18, 2017 |
441 |
- |
Snyk sponsors Atlassian Team ’22: Bringing developer security to the Atlassian ecosystem |
Sarah Conway |
Apr. 05, 2022 |
601 |
- |
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant |
Brian Vermeer |
Aug. 29, 2024 |
1000 |
- |
Writing unit tests in Java |
Lewis Gavin |
Nov. 18, 2022 |
1629 |
- |
Trend Micro launches Cloud One Open Source Security powered by Snyk |
Geva Solomonovich |
May. 10, 2021 |
926 |
- |
How to do password hashing in Java applications the right way! |
Brian Vermeer |
Mar. 24, 2022 |
1911 |
- |
DevSecOps lifecycle coverage with new Snyk and Dynatrace app |
Sarah Conway |
May. 15, 2023 |
507 |
- |
2022 Collaboration Partner of the Year: Snyk |
Sarah Conway |
Oct. 05, 2022 |
417 |
- |
How Snyk ensures safe adoption of AI |
Akanchha Shrivastava |
Mar. 27, 2024 |
1534 |
- |
You can’t compare SAST tools using only lists, test suites, and benchmarks |
Asaf Biton |
Jun. 16, 2021 |
832 |
- |
Signing container images: Comparing Sigstore, Notary, and Docker Content Trust |
Hrittik Roy |
Sep. 26, 2023 |
3098 |
- |
Real-time threat protection with Snyk and SentinelOne |
Shivam Jindal |
Nov. 09, 2023 |
679 |
- |
Secure JavaScript URL validation |
Mannan Tirmizi |
May. 09, 2023 |
1940 |
6 |
A recap of our Kubernetes configuration security announcement and webinar |
Jim Armstrong |
Apr. 10, 2020 |
1051 |
- |
Using JLink to create smaller Docker images for your Spring Boot Java application |
Brian Vermeer |
Aug. 24, 2023 |
1499 |
- |
Adding Snyk security to Jira and Bitbucket Cloud |
LaToya Muff |
Oct. 25, 2023 |
647 |
- |
How to scale successfully with Snyk’s Project Attributes and Tags |
Waleed Arshad |
Sep. 30, 2020 |
1160 |
- |
SDR Series: Meet our APJ team |
Snyk Team |
Apr. 26, 2022 |
1350 |
- |
VS Code extension: building auto CI/CD with GitHub Actions |
Shai Mendel |
Apr. 06, 2020 |
1225 |
- |
Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code |
Brian Vermeer |
Apr. 25, 2023 |
1523 |
- |
Scaling security with DevSecOps at a Forbes Cloud 100 company |
Taylor Macomber |
Sep. 16, 2020 |
730 |
- |
How SME lender New10 uses AWS and Snyk to deliver quickly and securely |
Udi Nachmany |
Jul. 08, 2019 |
1608 |
- |
SocketSleuth: Improving security testing for WebSocket applications |
Elliot Ward |
Sep. 06, 2023 |
843 |
- |
Cheatsheet: top 10 application security acronyms |
Alyssa Miller |
Dec. 01, 2020 |
2037 |
4 |
Serialization and deserialization in Java: explaining the Java deserialize vulnerability |
Brian Vermeer |
Dec. 18, 2020 |
1847 |
- |
AI-generated security fixes in Snyk Code now available |
Jim Armstrong |
May. 09, 2023 |
823 |
- |
Snyk named to CNBC 2023 Disruptor 50 List |
Peter McKay |
May. 09, 2023 |
311 |
- |
Exploring 3 types of directory traversal vulnerabilities in C/C++ |
Kirill Efimov |
Apr. 04, 2022 |
2081 |
- |
Navigating the AI-powered development era in financial services |
Lawrence Crowther |
Aug. 26, 2024 |
826 |
- |
Fetch the Flag CTF 2022 writeup: Pay Attention |
Assaf Ben Josef |
Nov. 10, 2022 |
1058 |
- |
Cloud Security at Blackhat and Defcon 2022 |
Ashish Rajan |
Sep. 06, 2022 |
1896 |
- |
Snyk Integrates with AWS to Help Enterprises Build Secure Applications |
Udi Nachmany |
Apr. 09, 2020 |
548 |
- |
How much do we really know about how packages behave on the npm registry? |
Liran Tal |
Apr. 22, 2019 |
944 |
1 |
Achieving developer security adoption at Nylas with Snyk |
Erin Cullen |
Dec. 04, 2023 |
762 |
- |
WillowTree roundtable: security for hypergrowth organizations |
Mariah Gresham |
Apr. 22, 2022 |
1051 |
- |
Launching "The Secure Developer" Podcast |
Guy Podjarny |
Oct. 11, 2016 |
542 |
- |
Fetch the Flag CTF 2022 writeup: git-refs |
Iulia Manda |
Nov. 10, 2022 |
585 |
- |
Top 5 security concerns for infrastructure as code |
Raphael Mun |
Jul. 14, 2023 |
1565 |
- |
8 tips for securing your CI/CD pipeline with Snyk |
Eric Smalling |
Jul. 20, 2023 |
3928 |
- |
Timing out synchronous functions with regex |
Steve Shani |
Apr. 06, 2023 |
1071 |
- |
Concerns of supply-chain attacks amplify as remote code execution was found in Ruby gem strong_password |
Liran Tal |
Jul. 07, 2019 |
615 |
4 |
How Okta empowers devs to find & fix security issues with Snyk |
Mariah Gresham |
Aug. 25, 2023 |
958 |
- |
Make Snyk notifications work for you |
Michele Wiedemer |
Apr. 06, 2022 |
550 |
- |
A Denial of Service vulnerability discovered in the Axios JavaScript package - affecting all versions of the popular HTTP client |
Liran Tal |
May. 06, 2019 |
749 |
2 |
7 tips to become a successful bug bounty hunter |
Ben Sadeghipour |
Jan. 25, 2024 |
1246 |
- |
SQL injection cheat sheet: 8 best practices to prevent SQL injection attacks |
Brian Vermeer |
Mar. 26, 2021 |
1802 |
- |
Nine Docker pro tips for Node.js developers |
Liran Tal |
Apr. 11, 2024 |
1630 |
- |
Announcing IaC+ early access: Secure your infrastructure configurations across the SDLC |
Lauren Place |
Oct. 03, 2023 |
686 |
- |
Dependency Health—assessing package risk with Snyk |
Anna Debenham |
May. 16, 2019 |
832 |
- |
How to generate an SBOM for JavaScript and Node.js applications |
Liran Tal |
May. 22, 2023 |
2795 |
- |
Build and deploy a Node.js security scanning API to Platformatic Cloud |
Liran Tal |
Jan. 05, 2024 |
2980 |
- |
Buildkit GRPC SecurityMode privilege check: Build-time container breakout (CVE-2024-23653) |
Rory McNamara |
Jan. 31, 2024 |
946 |
- |
64% of developers report that Java 8 remains the most often used release |
Brian Vermeer |
Feb. 05, 2020 |
926 |
- |
What does Biden's Executive Order on AI safety measures mean for businesses? |
Liqian Lim (林利蒨) |
Nov. 02, 2023 |
2399 |
- |
Docker for Java developers: 5 things you need to know not to fail your security |
Brian Vermeer |
Nov. 20, 2020 |
2056 |
- |
The inevitability of Developer Security |
Guy Podjarny |
Sep. 09, 2021 |
614 |
- |
From zero to security hero: test your GitHub projects for known vulnerabilities |
Simon Maple |
Nov. 12, 2020 |
625 |
- |
Kroger’s approach to supply chain security |
Brian Piper |
Jan. 02, 2024 |
888 |
- |
Java turns 25—aging like fine wine or more like milk? |
Brian Vermeer |
May. 22, 2020 |
820 |
1 |
AppSec spring cleaning checklist |
Mariah Gresham |
May. 13, 2024 |
783 |
- |
Enhancing PCI compliance security with SAST and SCA |
DeveloperSteve Coochin |
Feb. 08, 2022 |
1359 |
- |
Welcoming Diana Brunelle: Snyk’s New Chief People Officer |
Peter McKay |
Jul. 22, 2024 |
336 |
- |
Installing and managing Java on macOS |
Keshav Malik |
Oct. 12, 2023 |
1464 |
- |
The importance of verifying webhook signatures |
Marcelo Oliveira |
Jun. 29, 2023 |
1829 |
- |
Three ways Snyk made software supply chains more secure in 2022 |
Jamie Smith |
Jan. 12, 2023 |
1390 |
- |
Docker for Node.js developers: 5 things you need to know not to fail your security |
Liran Tal |
Jan. 25, 2021 |
1829 |
- |
Improving developer experience with security tools at Pinterest |
Megan Moore |
Jul. 14, 2022 |
1165 |
- |
Open source maintainer pulls the plug on npm packages colors and faker, now what? |
Liran Tal |
Jan. 09, 2022 |
1160 |
1 |
Best practices for container isolation |
Maryann Agofure |
Aug. 29, 2022 |
1562 |
- |
Skyscanner fixed projects and gained visibility into their open source vulnerability exposure. |
Ellen Van Keulen |
May. 03, 2018 |
818 |
- |
Introducing pkgbot! |
Karen Yavine |
Jan. 19, 2017 |
475 |
- |
Announcing Snyk CLI for Ruby, and more ways to fix Ruby vulnerabilities |
Johanna Kollmann |
Dec. 19, 2016 |
287 |
- |
Rego 102: Combining queries with AND/OR and custom messages |
Jasper Van der Jeugt, Becki Lee |
Nov. 09, 2023 |
2514 |
- |
Best practices for building a production-ready Dockerfile for PHP applications |
James Walker |
Aug. 22, 2023 |
2507 |
- |
Introducing The Secure Developer community |
Sam Hepburn |
Feb. 14, 2019 |
431 |
- |
Azure Bicep security fundamentals |
Mark Johnson |
Dec. 13, 2022 |
1143 |
- |
Use Snyk security policies to prioritize fixes more efficiently |
Daniel Berman |
Aug. 11, 2021 |
1080 |
- |
Snyk sponsoring 2021 Open Source Summit by the Linux Foundation |
Sarah Conway |
Sep. 16, 2021 |
680 |
- |
A guide to input validation with Spring Boot |
Lucien Chemaly |
Sep. 12, 2023 |
2751 |
- |
Detect infrastructure drift and unmanaged resources with Snyk IaC |
Stephane Jourdan |
May. 09, 2022 |
1485 |
- |
What’s new in CVSS 4.0 |
Paul Lascar |
Nov. 08, 2023 |
1679 |
- |
GitHub “besieged” by malware repositories and repo confusion: Why you'll be ok |
Liran Tal |
Mar. 12, 2024 |
2102 |
- |
GitHub Security Code Scanning: Secure your open source dependencies |
Daniel Berman |
May. 04, 2021 |
996 |
- |
Safer together: Snyk and CISPA collaborate for the greater good |
Idan Digmi |
Jun. 06, 2022 |
853 |
- |
Announcing Snyk Apps beta: Build custom apps to extend Snyk security into your workflows |
Daniel Berman |
Oct. 06, 2021 |
651 |
- |
Snyk & Intuit roundtable: Breaking silos, engaging with security and developer communities |
Simon Maple |
Apr. 30, 2021 |
1654 |
- |
Security in the Container Registry |
Udi Nachmany |
Feb. 21, 2019 |
665 |
- |
Kotlin overtakes Scala and Clojure, becoming the 2nd most popular language on the JVM ecosystem |
Brian Vermeer |
Feb. 05, 2020 |
970 |
192 |
Snyk Code’s autofixing feature, DeepCode AI Fix, just got better |
Eric Fernandez, Berkay Berabi |
Apr. 23, 2024 |
2452 |
- |
Snyk provides a critical security layer for CommunityBridge, a new Linux Foundation platform |
Noa Korem |
Mar. 13, 2019 |
360 |
- |
Snyk is Now Integrated with Chrome’s Lighthouse |
Tim Kadlec |
Apr. 03, 2018 |
578 |
- |
How to build a secure WebSocket server in Python |
Kingsley Ubah |
Jul. 05, 2022 |
2728 |
- |
Best practices for rolling out Snyk |
Or Feuer |
Aug. 06, 2019 |
1203 |
- |
How Lunar shifted security left while building a cloud native bank |
Brian Piper |
Jan. 20, 2022 |
759 |
- |
How Snyk helps satisfy White House cybersecurity recommendations |
Vandana Verma Sehgal |
Mar. 23, 2022 |
1149 |
- |
Tips to scale your DevSecOps organization from Gene Kim and Guy Podjarny |
Ravi Maira |
Nov. 02, 2020 |
1176 |
- |
Generating fake security data with Python and faker-security |
Michael Aquilina |
Apr. 26, 2022 |
859 |
- |
Checking Helm Charts for security misconfigurations |
Gareth Rushgrove |
Jun. 03, 2020 |
429 |
1 |
Rediscovering argument injection when using VCS tools — git and mercurial |
Alessio Della Libera |
Aug. 23, 2022 |
2111 |
3 |
Join the Snyk Developer Challenge |
Brittany Cannon |
Aug. 01, 2022 |
479 |
- |
5 tips for adopting AI code assistance securely |
Liqian Lim (林利蒨) |
May. 30, 2024 |
856 |
- |
Welcoming Tamar Yehoshua to the Snyk Board of Directors |
Snyk Team |
Jul. 26, 2021 |
405 |
- |
2020 Q4 in review—iOS remote code execution, developer-first SAST, and more |
Simon Maple |
Dec. 31, 2020 |
1077 |
- |
Abusing Ubuntu 24.04 features for root privilege escalation |
Rory McNamara |
Sep. 09, 2024 |
5975 |
189 |
Snyk's AppSec dream team |
Krysta Williams-Timm |
Mar. 19, 2024 |
843 |
- |
A moment of respite for our mental health |
Dipti Salopek |
May. 11, 2020 |
353 |
- |
Improved security testing for git-based Gradle projects using lockfile |
Antonio Gomes |
Dec. 07, 2020 |
693 |
- |
Limitations of a single AI model |
Frank Fischer |
Aug. 07, 2023 |
1401 |
- |
Automate security controls from development to production on Google Cloud |
David Lugo |
Jun. 18, 2024 |
1073 |
- |
Shipping Kubernetes-native applications with confidence |
Amir Moualem |
Nov. 14, 2019 |
1337 |
- |
My internship journey at Snyk |
Caroline Gow |
Feb. 16, 2023 |
1329 |
- |
SourMint: Malicious code, ad fraud, and data leak in iOS |
Alyssa Miller |
Aug. 24, 2020 |
1900 |
10 |
Copilot amplifies insecure codebases by replicating vulnerabilities in your projects |
Randall Degges |
Feb. 22, 2024 |
1578 |
- |
January in review: funding news, DevSecOps insights study, and much more |
Hayley Denbraver |
Jan. 31, 2020 |
455 |
- |
Snyk Partner Speak video series with HashiCorp |
Sarah Conway |
Oct. 04, 2023 |
180 |
- |
5 ways to secure Drupal 10 |
Sushnigdha Tripathy |
Aug. 23, 2022 |
1692 |
- |
New Java 17 features for improved security and serialization |
Brian Vermeer |
Oct. 21, 2021 |
1262 |
- |
Snyk Code adds security scanning for C# and .NET |
Frank Fischer |
Jul. 29, 2021 |
588 |
- |
AppSec during hypergrowth: Empower your developers to overcome the tech talent shortage |
Jim Armstrong |
Nov. 16, 2021 |
835 |
- |
Engineering equal opportunities at Snyk |
Francesca Scantlebury |
May. 28, 2020 |
1156 |
- |
A day in the life of a CISO: Chris Hughes of Aquia |
Vandana Verma Sehgal |
Nov. 04, 2022 |
851 |
- |
10 Dimensions of Python Static Analysis |
Liran Tal |
Jul. 17, 2024 |
4861 |
- |
A security expert’s view on Gartner’s generative AI insights - Part 2 |
Liqian Lim (林利蒨) |
Aug. 08, 2024 |
1231 |
- |
Accelerating the Snyk infrastructure as code vision with the addition of CloudSkiff |
Guy Podjarny |
Oct. 29, 2021 |
801 |
- |
A (soft) introduction to Python dependency management |
Lucian Irsigler |
Sep. 14, 2021 |
1651 |
- |
High severity vulnerability found in libcurl and curl (CVE-2023-38545) |
Hadas Bloom |
Oct. 04, 2023 |
1104 |
- |
Improved risk assessment with EPSS scores in Snyk |
Daniel Berman |
May. 22, 2023 |
1297 |
- |
Node.js vs. Deno vs. Bun: JavaScript runtime comparison |
James Konik |
Sep. 05, 2023 |
2966 |
- |
Looking back at Black Hat USA 2022 |
Vandana Verma Sehgal |
Sep. 21, 2022 |
903 |
- |
Rego 101: Introduction to Rego |
Becki Lee |
Nov. 02, 2023 |
2503 |
- |
How LiveRamp used Snyk to remediate Log4Shell |
Brian Piper |
May. 19, 2022 |
685 |
- |
Snyker Spotlight: Jeff Yoshimura on his Asian American heritage & AAPI Month |
Jeff Yoshimura |
May. 19, 2021 |
1078 |
- |
What is package lock json and how a lockfile works for yarn and npm packages? |
Liran Tal |
Mar. 14, 2019 |
1224 |
- |
npm passes the 1 millionth package milestone! What can we learn? |
Liran Tal, Simon Maple |
Jun. 04, 2019 |
872 |
5 |
Why ASPM is the future of AppSec: Key points from our newest whitepaper |
Sarah Conway |
Jun. 18, 2024 |
1177 |
- |
Find and fix the Log4Shell exploit fast with Snyk |
Ariel Ornstein |
Dec. 13, 2021 |
1350 |
- |
Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools |
Calum Hutton |
Nov. 27, 2023 |
1511 |
- |
Snyk IaC for Terraform Enterprise: Expanding Snyk compatibility with HashiCorp Terraform |
Sarah Conway |
Sep. 28, 2022 |
562 |
- |
7 AppSec tips from Snowflake’s Director of Product Security |
Brian Piper |
Aug. 31, 2023 |
850 |
- |
Breaking caches and bypassing Istio RBAC with HTTP response header injection |
Rory McNamara |
Jun. 20, 2024 |
2498 |
- |
How to choose a security tool for your AI-generated code |
Liqian Lim (林利蒨) |
Jan. 09, 2024 |
1774 |
- |
SnykWeek New York: In the cloud |
Megan Moore |
Oct. 10, 2022 |
731 |
- |
File encryption in Python: An in-depth exploration of symmetric and asymmetric techniques |
Keshav Malik |
Nov. 22, 2023 |
2132 |
- |
How to Dockerize a PHP application securely |
James Olaogun |
Aug. 02, 2023 |
2389 |
1 |
Building a secure GraphQL API with Node.js |
Lawrence Eagles |
Mar. 29, 2022 |
1901 |
- |
Avoiding SMTP Injection: A Whitebox primer |
Sam Sanoop |
Sep. 15, 2022 |
1579 |
1 |
Best practices for effective attack surface analysis |
Benson Kuria Macharia |
Jul. 18, 2023 |
1659 |
- |
AWS vulnerability scanning using the Snyk integration |
Matt Jarvis |
Feb. 10, 2021 |
2419 |
- |
Secure password hashing in Go |
Love Bhardwaj |
Dec. 05, 2023 |
3088 |
- |
How Spotify uses Snyk to secure the SDLC |
Brian Piper |
Sep. 13, 2022 |
919 |
- |
Announcing the open beta of Snyk's revamped security reporting |
Daniel Berman |
Nov. 09, 2022 |
1354 |
- |
Webhook Security Best Practices |
Gints Dreimanis |
Jul. 06, 2022 |
1168 |
- |
New IaC security workshop from Snyk, HashiCorp, and AWS at KubeCon Europe 2023 and on-demand |
Sarah Conway |
Apr. 10, 2023 |
1035 |
- |
SnykCon 2021 Partner Day recap: New partners, service offerings, and Snyk Apps |
Sarah Conway |
Oct. 08, 2021 |
916 |
- |
Snyk is your security companion for Amazon CodeWhisperer |
Liqian Lim (林利蒨) |
Nov. 29, 2023 |
1817 |
- |
6 steps for scaling risk-based AppSec programs |
Julia Kraut |
Oct. 13, 2023 |
938 |
- |
Best practices for API gateway security |
Kuria Macharia |
Sep. 07, 2022 |
1510 |
- |
Power up security collaboration with Snyk and Slack |
Sarah Conway |
Oct. 23, 2023 |
271 |
- |
Take actions to improve security in your Docker images |
Brian Vermeer |
Apr. 17, 2019 |
1686 |
1 |
Exploiting HTTP/2 CONTINUATION frames for DoS attacks |
Vandana Verma Sehgal |
Apr. 08, 2024 |
696 |
- |
Repo Jacking: The Great Source-code Swindle |
Elliot Ward |
Jul. 25, 2024 |
2516 |
- |
How to maintain npm dependencies in your project |
José Pérez Rivas |
Jun. 11, 2020 |
972 |
- |
Safely handling containers |
Tales Casagrande |
Jun. 22, 2022 |
729 |
- |
Security implications of cross-origin resource sharing (CORS) in Node.js |
Victor Ikechukwu |
Sep. 13, 2023 |
2582 |
- |
The world since coronavirus: adapting quickly to a fully remote environment |
Dipti Salopek |
Mar. 16, 2020 |
686 |
- |
Shifting responsibly left with the enhanced Snyk security gating on pull requests |
Daniel Berman |
Mar. 31, 2020 |
810 |
- |
How cloud transforms IT security into AppSec |
Guy Podjarny |
Mar. 12, 2020 |
1565 |
3 |
Using Rego as a generic policy language |
Dickson Boateng |
Jun. 03, 2022 |
1323 |
- |
Fetch the Flag CTF 2022 writeup: Disposable Message |
Michael Aquilina |
Nov. 10, 2022 |
2421 |
- |
Snyk partners with the makers of Greenkeeper to help developers proactively maintain dependency health |
Daniel Berman |
Mar. 05, 2020 |
754 |
- |
JavaScript and Node.js Security – The Common Pitfalls |
Guy Podjarny |
Apr. 11, 2018 |
172 |
- |
Serverless Security implications—from infra to OWASP |
Guy Podjarny |
Apr. 19, 2017 |
2307 |
114 |
Fetch the Flag CTF 2022 writeup: Treasure Trove |
Luke Watts |
Nov. 10, 2022 |
572 |
- |
10 npm Security Best Practices |
Liran Tal |
Feb. 19, 2019 |
3184 |
3 |
How to write your first unit test in JavaScript |
Raphael Mun |
Oct. 28, 2022 |
1600 |
2 |
Scanning Docker images for key binaries - going beyond package managers |
Liron Lifshitz-Yadin |
Feb. 07, 2019 |
312 |
- |
Snyk highlights AWS re:Invent 2023 |
David Lugo |
Dec. 14, 2023 |
820 |
- |
The Snyk Perpetual Key Rotation Machine |
Megan Moore |
Apr. 01, 2023 |
1000 |
- |
Developer-centric DAST with Bright Security |
Vitaly Unic |
Apr. 14, 2023 |
1496 |
- |
Scoring security vulnerabilities 101: Introducing CVSS for CVEs |
Liran Tal |
May. 16, 2019 |
2268 |
1 |
Embrace your next cybersecurity career with The Big Fix |
Liran Tal |
Feb. 22, 2023 |
692 |
- |
The XZ backdoor CVE-2024-3094 |
Liran Tal |
Mar. 31, 2024 |
1800 |
- |
How Snyk can help secure supply chains per "A Guide to Implementing the Software Bill of Materials (SBOM) for Software Management"’ by Japan's METI |
Hiroko Nakano |
Aug. 01, 2023 |
566 |
- |
Career growth in a scale-up world |
Dipti Salopek |
Aug. 17, 2020 |
674 |
- |
10 Eclipse plugins you shouldn’t code without |
Brian Vermeer |
Aug. 15, 2019 |
1295 |
3 |
Snyk fix: Automatic vulnerability remediation from the Snyk CLI |
Daniel Berman |
Oct. 07, 2021 |
1302 |
- |
Patches of Pride: Love, inclusivity, & cute pets in celebration of Pride month |
Ashley Ladd |
Jun. 20, 2023 |
463 |
- |
Snyk’s new native integration with Bitbucket Cloud emphasizes dev-first security |
Sarah Conway |
Oct. 25, 2022 |
847 |
- |
Malicious remote code execution backdoor discovered in the popular bootstrap-sass Ruby gem |
Liran Tal |
Apr. 04, 2019 |
1109 |
147 |
ReDoS vulnerabilities in npm spikes by 143% and XSS continues to grow |
Liran Tal |
Feb. 26, 2019 |
1235 |
1 |
Cloud security fundamentals part 3: Empower your developers |
Drew Wright |
Oct. 21, 2022 |
1044 |
- |
Using ES2015 Proxy for fun and profit |
Alon Niv |
Aug. 23, 2016 |
1147 |
2 |
Snyk's AppSec journey in 2022 |
Jason Lane |
Jan. 11, 2023 |
1554 |
- |
Choosing the best Node.js Docker image |
Liran Tal, Adrian Mouat |
Sep. 30, 2022 |
3033 |
2 |
Introducing Snyk Training, our online learning platform |
Michele Wiedemer |
Aug. 11, 2022 |
424 |
- |
10 AWS security considerations when migrating |
Drew Wright |
Nov. 29, 2022 |
1455 |
- |
Bolstering Snyk's developer security platform in 2022 |
Daniel Berman |
Jan. 09, 2023 |
2059 |
- |
Teaming up with Sysdig to deliver developer and runtime Kubernetes security |
Jim Armstrong |
Feb. 16, 2022 |
679 |
- |
Kicking off 2022 by recognizing DevSecOps leaders |
Jeff Yoshimura |
Jan. 06, 2022 |
1146 |
- |
Snyk integrates with AWS CloudTrail Lake to simplify security audits |
David Lugo |
Feb. 01, 2023 |
551 |
- |
Fastify plugins as building blocks for a backend Node.js API |
Liran Tal |
May. 28, 2024 |
2479 |
- |
Local Type Inference Cheat Sheet for Java 10 and beyond! |
Simon Maple |
Apr. 26, 2018 |
1868 |
3 |
Snyk scanning capabilities are now embedded in Jira Software |
Sarah Conway |
Jun. 06, 2023 |
658 |
- |
Is your website vulnerable? Let’s fix it! |
Liran Tal |
Mar. 05, 2020 |
807 |
- |
InCyber Forum Europe recap: 4 tips from DevSecOps experts |
Nina McClure |
Aug. 14, 2024 |
1217 |
- |
Launching .NET support for GitHub, Bitbucket and GitLab |
Ariel Ornstein |
Feb. 04, 2019 |
448 |
- |
8 Azure Repos Security Best Practices |
Simon Maple |
May. 06, 2019 |
92 |
- |
Exploring the Spring Security authorization bypass (CVE-2022-31692) |
Brian Vermeer |
Dec. 16, 2022 |
1121 |
- |
XSS Attacks: The Next Wave |
Guy Podjarny |
Jun. 08, 2017 |
1700 |
88 |
Severe security vulnerability in Bower’s zip archive extraction |
Liran Tal |
Jan. 31, 2019 |
995 |
2 |
Key points from Google and Accenture's ransomware white paper |
Vandana Verma Sehgal |
Nov. 07, 2022 |
1459 |
- |
Snyk Week of Impact 2023: A week of meaningful contributions and community engagement |
Bianca Matei |
Nov. 08, 2023 |
567 |
- |
A post-mortem of the malicious event-stream backdoor |
Danny Grander, Liran Tal |
Dec. 06, 2018 |
1470 |
- |
SnykLaunch recap: Custom Base Image Recommendations |
Jamie Smith |
Apr. 04, 2023 |
1133 |
- |
Demystifying the AWS shared security responsibility model |
David Lugo |
Nov. 13, 2023 |
1004 |
- |
Tips for hardening your container image security strategy |
Matt Jarvis |
Jul. 14, 2021 |
1166 |
- |
Snyk Container in 2021: Shifting container security all the way left |
Jim Armstrong |
Dec. 22, 2021 |
1386 |
- |
Shifting compliance left: Helping legal teams and developers cooperate around licensing issues |
Rachel Cheyfitz |
Oct. 03, 2019 |
622 |
- |
Automating Kubernetes workload security reporting |
Rags Srinivas |
Mar. 02, 2020 |
590 |
- |
Mitigating path traversal vulns in Java with Snyk Code |
Brian Vermeer |
Mar. 06, 2023 |
1044 |
2 |
Developer driven workflows: Dockerfile image scanning, prioritization, and remediation |
Eric Smalling |
Mar. 26, 2021 |
5791 |
- |
How to integrate ASPM with your application security program |
Vandana Verma Sehgal |
Nov. 28, 2023 |
1258 |
- |
Log4Shell remediation cheat sheet |
Simon Maple |
Dec. 14, 2021 |
1602 |
19 |
Top considerations for addressing risks in the OWASP Top 10 for LLMs |
Simon Maple |
Sep. 07, 2023 |
3135 |
- |
Building an application security battle plan: Home Alone edition |
Brian Clark |
Dec. 20, 2022 |
898 |
- |
Java configuration: how to prevent security misconfigurations |
Brian Vermeer |
Feb. 26, 2021 |
1069 |
- |
Snyk Code adds Go security scanning |
Frank Fischer |
Oct. 14, 2021 |
782 |
- |
Top ten Docker images contain over 8000 vulnerable paths |
Hayley Denbraver |
Mar. 07, 2019 |
955 |
11 |
Snyk chats with Shutterstock about building a DevSecOps culture |
Brian Piper |
Apr. 02, 2021 |
844 |
- |
Swift deserialization security primer |
Sam Sanoop |
Jul. 18, 2023 |
1155 |
- |
Implementing TLS in Kubernetes |
Rubaiat Hossain |
Jul. 31, 2023 |
2063 |
- |
Bitbucket Server Integration in Beta |
Guy Podjarny |
Jun. 07, 2017 |
237 |
- |
Container security throughout the SDLC |
Gareth Rushgrove |
Oct. 16, 2019 |
884 |
- |
Deploying a Gatsby site to GitHub Pages from Travis CI |
Liran Tal |
Dec. 03, 2019 |
646 |
- |
190,000 users affected by Docker Hub’s security breach. Now what? |
Liran Tal |
Apr. 29, 2019 |
717 |
1 |
Ruby email rule removed from Snyk Code |
Frank Fischer |
Oct. 13, 2022 |
594 |
- |
Cloud security updates you need to know from re:Invent 2022 |
Ashish Rajan |
Dec. 21, 2022 |
2303 |
- |
How to secure a REST API? |
Liran Tal |
Jun. 27, 2024 |
2768 |
- |
Proactively fixing vulnerabilities to maintain Java security and project hygiene with Snyk |
Lee Turner |
Nov. 16, 2021 |
876 |
- |
Implementing TLS/SSL in Python |
Kingsley Ubah |
Oct. 16, 2022 |
1489 |
- |
Find and fix vulnerabilities in your CI/CD pipeline with Snyk and Harness |
Pas Apicella |
Dec. 10, 2021 |
1406 |
- |
2022 Container Security Trends Report: Exploring ownership, education, expertise, and more |
Megan Moore |
Apr. 27, 2022 |
737 |
- |
Getting started with query parameterization |
Mary Gathoni |
Oct. 24, 2023 |
2337 |
- |
Fetch the Flag CTF 2022 writeup: Not So Smart Fridge |
Antonio Gomes |
Nov. 10, 2022 |
1026 |
- |
How Atlassian used Snyk to solve Log4Shell |
Sarah Conway |
Nov. 16, 2022 |
813 |
- |
10 best practices to containerize Node.js web applications with Docker |
Liran Tal, Yoni Goldberg |
Sep. 15, 2022 |
6338 |
- |
Finding and fixing insecure direct object references in Python |
Keshav Malik |
Jul. 19, 2023 |
1509 |
- |
Preventing SQL injection in C# with Entity Framework |
Brian Vermeer |
Jul. 30, 2024 |
1273 |
- |
Snyk and StackHawk form strategic alliance to equip app teams with modern, developer-first security testing |
David Lugo |
May. 02, 2022 |
716 |
- |
Scaling Snyk fast with copy-paste orgs |
Anna Debenham |
Oct. 11, 2018 |
375 |
- |
Brian Vermeer named one of Business Insider’s "21 Top Developers Shaping Tech and Forging New Paths" |
Liran Tal |
Aug. 03, 2021 |
353 |
- |
Securing the web (forward) |
Daniel Appelquist |
Mar. 27, 2023 |
1233 |
- |
Putting container security in the hands of developers |
Leigh Moore |
Nov. 12, 2019 |
331 |
2 |
Open source security with O’Reilly author Guy Podjarny |
Hayley Denbraver |
Aug. 30, 2019 |
1493 |
- |
Lessons learned from the Argo CD zero-day vulnerability (CVE-2022-24348) |
Eric Smalling |
Feb. 10, 2022 |
1375 |
- |
JVM Ecosystem Report 2018 |
Simon Maple |
Oct. 17, 2018 |
1200 |
- |
Securing cloud infrastructure for PCI review |
DeveloperSteve Coochin |
Mar. 03, 2022 |
2080 |
- |
Using Snyk to implement end-to-end DevSecOps on Microsoft Azure |
Daniel Berman |
May. 26, 2020 |
752 |
- |
Announcing automated fixes for vulnerabilities in .NET dependencies |
Daniel Berman |
Nov. 17, 2021 |
1349 |
- |
Snyk AppRisk Pro: A holistic approach to application risk management |
Daniel Berman |
May. 01, 2024 |
1597 |
- |
Securing container applications using the Snyk CLI |
Hadar Mutai |
Aug. 30, 2022 |
489 |
- |
Exploring the advanced technologies behind Snyk Code |
Frank Fischer |
Oct. 20, 2021 |
1155 |
- |
Mitigating ImageMagick vulnerabilities in Node.js |
Guy Podjarny |
May. 06, 2016 |
623 |
7 |
Secure AI tool adoption: Perceptions and realities |
Alex Salkever |
Jun. 04, 2024 |
733 |
- |
Python Mocking 101: Fake it before you make it |
Mike Lin |
Feb. 10, 2018 |
2272 |
- |
Announcing Snyk for Ruby |
Guy Podjarny |
Nov. 10, 2016 |
482 |
- |
Why your team should attend SnykCon 2020 |
Simon Maple |
Oct. 07, 2020 |
535 |
- |
Mental Health Awareness Month: How losing my father changed me |
Tim Leroy |
May. 31, 2022 |
957 |
- |
Building Vue 3 components with Tailwind CSS |
Mary Gathoni |
Feb. 21, 2023 |
2017 |
- |
Announcing Snyk-Powered Linting in Sonar |
Tim Kadlec |
Oct. 25, 2017 |
517 |
- |
Automatic source locations with Rego |
Jasper Van der Jeugt |
Feb. 12, 2024 |
2614 |
- |
New year ushers in new wave of Snyk Technology Alliance Partner Program members |
Sarah Conway |
Jan. 12, 2023 |
444 |
- |
Fixing XXE Vulnerabilities in Nokogiri |
Tim Kadlec |
Feb. 14, 2017 |
740 |
- |
Allyship and advocacy: Celebrating Disability Pride Month at Snyk |
Alex Fallon |
Jul. 27, 2022 |
1764 |
- |
Discover package vulnerabilities with the Snyk integration for JSDelivr |
Brian Vermeer |
Jun. 08, 2020 |
301 |
- |
4 AI coding risks and how to address them |
Liqian Lim (林利蒨) |
Jun. 13, 2024 |
1200 |
- |
Understanding Amazon S3 security and compliance on AWS |
Drew Wright |
May. 10, 2019 |
1606 |
- |
Looking at the Snyk integration with Red Hat CodeReady Dependency Analytics |
Sarah Conway |
Sep. 03, 2020 |
374 |
- |
Announcing the Snyk Business trial: Security across the SDLC |
Mariah Gresham |
Feb. 15, 2022 |
612 |
- |
Why “vulnerability management” falls short in modern application security |
Daniel Berman |
Jun. 13, 2024 |
988 |
- |
Leaky Vessels deep dive: Escaping from Docker one syscall at a time |
Rory McNamara |
Feb. 06, 2024 |
10279 |
4 |
Critical WebP 0-day security CVE-2023-4863 impacts wider software ecosystem |
Brian Clark, Eric Smalling, Jonathan Moses |
Sep. 28, 2023 |
1825 |
- |
Revisiting unit testing and mocking in Python |
Mike Lin |
Jul. 07, 2018 |
1847 |
- |
OSPO security evolution: The Kübler-Ross Model of open source |
Dan Appelquist |
Jan. 12, 2023 |
783 |
- |
Snyk integrates with Amazon EventBridge to enable secure AppDev at scale |
David Lugo |
Jun. 12, 2023 |
735 |
- |
Don’t build security tools, build developer tools instead |
Guy Podjarny |
Jan. 09, 2018 |
724 |
- |
Proxy authentication in Snyk CLI for Windows |
Steve Winton |
Oct. 06, 2022 |
297 |
- |
Snyk Fetch the Flag CTF 2023 writeup: Silent Cartographer |
John Hammond |
Nov. 30, 2023 |
362 |
- |
10 Kubernetes Security Context settings you should understand |
Eric Smalling |
Mar. 10, 2021 |
2720 |
2 |
See Snyk and GitHub in action at GitHub Universe |
Sarah Conway |
Nov. 13, 2019 |
257 |
- |
Application vulnerability management best practices |
Mariah Gresham |
Aug. 06, 2024 |
1240 |
- |
Snyk recognized as an Emerging Segment Leader in Application Security in Snowflake's Next Generation of Cybersecurity Applications report |
LaToya Muff |
Dec. 11, 2023 |
658 |
- |
Gitpod remote code execution 0-day vulnerability via WebSockets |
Elliot Ward |
Feb. 27, 2023 |
2121 |
1 |
A day in the life of an ethical hacker |
Sonya Moisset |
Jun. 05, 2023 |
2679 |
- |
How to prevent open redirect vulnerabilities in Laravel |
Kevin Kimani |
Dec. 27, 2023 |
1696 |
- |
Bringing cloud native application security full circle |
Erin Cullen |
Jun. 08, 2022 |
845 |
- |
Snyk Voted Next European Unicorn for B2B Enterprise |
Guy Podjarny |
May. 22, 2019 |
422 |
- |
Find and fix HTTP/2 rapid reset zero-day vulnerability CVE-2023-44487 |
Jamie Smith, Kriti Dogra, Anthony Larkin |
Oct. 11, 2023 |
1225 |
- |
Six takeaways from our ASPM masterclass series |
Erin Cullen |
Apr. 10, 2024 |
1110 |
- |
Snyk increases investment in partners with new Snyk Technology Alliance Partner Program |
Cara Sampson |
Apr. 27, 2022 |
1502 |
- |
The 5 dimensions of an npm dependency |
Guy Podjarny |
Jun. 16, 2016 |
1640 |
8 |
Add a SECURITY.md file to your Azure Repos |
Simon Maple |
May. 06, 2019 |
718 |
- |
Snyk has acquired DevSecCon! |
Guy Podjarny |
Jul. 24, 2019 |
699 |
- |
3 tips for effective developer security training |
Mariah Gresham |
Dec. 01, 2022 |
1127 |
- |
Snyk transformed cloud security in 2022 with developer-first solution |
Lauren Place |
Jan. 11, 2023 |
1211 |
- |
Snyk Fetch the Flag CTF 2023 writeup: Off the SETUID |
Carlos Polop |
Nov. 30, 2023 |
1710 |
- |
Three expert tips for cultivating secure software development practices |
Simon Maple |
Mar. 01, 2023 |
896 |
- |
Spring4Shell: The zero-day RCE in the Spring Framework explained |
Brian Vermeer |
Apr. 01, 2022 |
927 |
- |
5 Common open source security myths everyone needs to know |
Karl Hopkinson-Turrell |
Apr. 24, 2020 |
1031 |
- |
Introducing Snyk developer-first security into the Terraform Cloud workflow |
Sarah Conway |
Oct. 06, 2021 |
759 |
- |
Goodbye, 2020! Look out, 2021 |
Peter McKay |
Jan. 26, 2021 |
393 |
- |
Node.js multithreading with worker threads: pros and cons |
James Walker |
Feb. 27, 2023 |
2120 |
2 |
How to effectively detect and mitigate Trojan Source attacks in JavaScript codebases with ESLint |
Liran Tal |
Nov. 10, 2021 |
1219 |
- |
How Datto made developer-first security a reality with Snyk |
Brian Piper |
Nov. 09, 2021 |
1125 |
- |
Announcing Snyk’s new Global Service Provider program |
Cyndi Doyle |
Feb. 23, 2022 |
696 |
- |
Website security score explained |
Liran Tal |
May. 13, 2020 |
677 |
- |
Serverless is great, but what about the security of my AWS Lambda functions and their dependencies? |
Liran Tal |
Jul. 03, 2019 |
961 |
1 |
Securing your open source dependencies with the Snyk Visual Studio Code extension |
Daniel Berman |
Nov. 23, 2021 |
1040 |
- |
Attacking an FTP Client: MGETting more than you bargained for |
Danny Grander |
Apr. 04, 2018 |
1603 |
1 |
Code injection in Python: examples and prevention |
Lucien Chemaly |
Dec. 06, 2023 |
1807 |
- |
Introducing service accounts: API tokens for your org |
Anna Debenham |
Jun. 12, 2018 |
172 |
- |
Mitigating clickJacking — the DevSecOps way! |
Omer Levi Hevroni |
May. 25, 2020 |
798 |
- |
SnykCon 2021 is almost here! |
Randall Degges |
Aug. 24, 2021 |
1382 |
- |
Django security tips |
Hayley Denbraver |
Mar. 25, 2020 |
1481 |
- |
Improving GraphQL security with static analysis and Snyk Code |
Sam Sanoop |
Apr. 12, 2022 |
1528 |
- |
How can a Content Security Policy prevent XSS and other vulnerabilities? |
Luke Watts |
Feb. 09, 2020 |
900 |
- |
Snyk research team discovers severe prototype pollution security vulnerabilities affecting all versions of lodash |
Liran Tal |
Jul. 05, 2019 |
925 |
10 |
SnykHer celebrates International Women’s Day 2022 |
Jess Katz |
Mar. 07, 2022 |
697 |
- |
Visibly invisible malicious Node.js packages: When configuration niche meets invisible characters |
Aviad Hahami |
Feb. 28, 2022 |
1240 |
- |
Mental Health Awareness—three important manager lessons that I couldn’t have done without |
Ella Gee |
May. 21, 2020 |
1066 |
- |
Git checkout remote branch: how it works and when to use it |
Brian Vermeer |
Dec. 15, 2020 |
835 |
- |
PulseMeter Report: Software supply chains |
Erin Cullen |
Mar. 21, 2023 |
708 |
- |
4 best practices for cultivating developer security adoption |
Erin Cullen |
Apr. 20, 2023 |
897 |
- |
Kubernetes open sourced their security audit. What can we learn? |
Hayley Denbraver |
Aug. 08, 2019 |
894 |
2 |
Applying the principle of least privilege to Kubernetes using RBAC |
Jekayin-Oluwa Olabemiwo |
Aug. 29, 2022 |
1734 |
- |
How and when to use Docker labels / OCI container annotations |
Eric Smalling |
Nov. 03, 2021 |
1617 |
- |
2020 Q3 in review—Snyk & DeepCode, Angular security best practices, and more |
Simon Maple |
Dec. 30, 2020 |
1009 |
- |
Cloud Security Podcast awarded SANS Podcast of the Year |
Jeff Yoshimura |
Dec. 19, 2022 |
830 |
- |
Introducing open source security runtime monitoring |
Aner Mazur |
Nov. 12, 2018 |
783 |
- |
Creating an automated cloud infrastructure testing tool with Terraform and PyTest |
Drew Wright |
Mar. 27, 2020 |
3559 |
- |
A stepping stone towards holistic application risk and compliance management of the Digital Operational Resiliency Act (DORA) |
Ben Desjardins |
Jul. 11, 2024 |
1834 |
- |
Top 5 VS Code extensions for security |
Brian Clark |
Aug. 24, 2023 |
1654 |
- |
Celebrating Juneteenth at Snyk |
Sherica Bryan |
Jun. 16, 2023 |
858 |
- |
Vulnerabilities in NodeJS C/C++ add-on extensions |
Alessio Della Libera |
Aug. 14, 2024 |
2808 |
- |
To our Community from the Snyk Team |
Peter McKay |
Mar. 13, 2020 |
266 |
- |
Snyk and Atlassian, Sitting in a Tree |
Aner Mazur |
Aug. 24, 2017 |
618 |
- |
Code injection vulnerabilities (CVSSv3 5.8) found in Snyk CLI and IDE plugins |
Carm Janneteau |
Nov. 30, 2022 |
585 |
- |
Advancing SBOM standards: Snyk and SPDX |
Gareth Rushgrove |
Jun. 16, 2021 |
829 |
- |
5 "no experience needed" tips for building secure applications |
Liran Tal |
Dec. 27, 2022 |
997 |
- |
How to install Ruby in a macOS for local development |
Liran Tal |
Sep. 27, 2022 |
1579 |
- |
Our privilege is our responsibility |
Dipti Salopek |
Jun. 05, 2020 |
470 |
- |
Fix cloud security issues faster and at the source with Snyk IaC |
Anthony Larkin |
Apr. 04, 2023 |
632 |
- |
Improving the UI/UX of the Snyk VS Code extension |
Andy Gongea |
Nov. 21, 2023 |
702 |
- |
Best practices for Kubernetes Secrets management |
Eric Kahuha |
Nov. 16, 2022 |
1777 |
- |
Snyk Learn now aligns with the NIST NICE Workforce Framework |
Michael Biocchi |
Jun. 07, 2023 |
471 |
- |
RSA 2020: who we met and what we learned |
Peter McKay |
Mar. 02, 2020 |
385 |
- |
Common SAML vulnerabilities and how to remediate them |
Sam Sanoop |
Dec. 19, 2023 |
966 |
- |
The Secure Developer: Security champions recap |
Sam Hepburn |
Jun. 14, 2023 |
1365 |
- |
Introducing the Snyk Ambassador program: A call for nomination to champion application security |
Liran Tal |
Aug. 16, 2021 |
540 |
- |
February in review: JVM Ecosystem Report, Python and Container Updates, and more |
Hayley Denbraver |
Feb. 28, 2020 |
558 |
- |
How community participation can enhance your development career |
Randall Degges |
Nov. 15, 2022 |
1117 |
- |
Introducing the new Snyk UI |
Steve Winton |
Sep. 29, 2022 |
383 |
- |
What can you do with an enriched SBOM? A parlay quickstart guide |
Gareth Rushgrove |
Jun. 07, 2023 |
1077 |
- |
Why speed matters in Static Application Security Testing (SAST) |
Frank Fischer |
Aug. 20, 2021 |
698 |
- |
Snyk kicks off Community Outreach Internship Program |
Dipti Salopek |
Feb. 11, 2021 |
537 |
- |
Snyk named a Leader in 2023 Gartner® Magic Quadrant™ for Application Security Testing |
Manoj Nair |
May. 23, 2023 |
949 |
- |
Java dependency management: how many lines of code does my application hold? |
Brian Vermeer |
Aug. 12, 2020 |
795 |
- |
An unintimidating introduction to the dark arts of C/C++ vulnerabilities |
Aviad Hahami |
Apr. 15, 2022 |
1513 |
- |
Preventing server-side request forgery in Node.js applications |
David Ekete |
Feb. 20, 2024 |
1759 |
- |
Secure your Kubernetes applications with Snyk Container |
Gareth Rushgrove |
Nov. 12, 2019 |
434 |
- |
Responsible disclosure: CodeCov CEO & CTO share learnings from the breach |
Mariah Gresham |
Dec. 09, 2021 |
1186 |
- |
Symmetric vs. asymmetric encryption: Practical Python examples |
Josh Amata |
May. 15, 2024 |
4010 |
- |
GDPR Compliance and Open Source |
Ellen Van Keulen |
Sep. 26, 2017 |
665 |
- |
Improving code quality with linting in Python |
Keshav Malik |
Oct. 12, 2022 |
1767 |
2 |
Keeping Docker secrets secure (even if you’re not using Kubernetes) |
Marcelo Oliveira |
Aug. 24, 2022 |
1484 |
- |
Making climate positive changes |
Luke Watts |
Sep. 05, 2019 |
609 |
- |
dompdf security alert: RCE vulnerability found in popular PHP PDF library |
DeveloperSteve Coochin |
Mar. 18, 2022 |
1185 |
- |
84% of all websites are impacted by jQuery XSS vulnerabilities |
Liran Tal |
Oct. 30, 2019 |
781 |
- |
5 best practices for React with TypeScript security |
Marcelo Oliveira |
Dec. 08, 2022 |
1755 |
- |
48% see security a major constraint on the ability to deliver software quickly |
Liran Tal |
Jan. 28, 2020 |
975 |
- |
Snyk named a 2023 Gartner Peer Insights™ Customers’ Choice for Application Security Testing |
Ciana Abdollahian |
Dec. 04, 2023 |
622 |
- |
How to use GitHub Actions environment variables |
Lewis Gavin |
Nov. 22, 2022 |
1877 |
- |
Preventing broken access control in express Node.js applications |
Ben Smitthimedhin |
May. 22, 2024 |
2923 |
- |
Open Source Vulnerabilities and Security with Microsoft’s Jeff McAffer |
Hayley Denbraver |
Nov. 20, 2019 |
841 |
- |
The SecurityManager is getting removed in Java: What that means for you |
Mdu Sibisi |
Jun. 15, 2023 |
2238 |
- |
Welcoming Karyn Smith: Snyk’s new Chief Legal Officer |
Peter McKay |
Feb. 07, 2022 |
539 |
- |
A Snyk peek into Node.js and npm’s state of open source security report 2019 |
Liran Tal |
Oct. 09, 2019 |
700 |
1 |
Happiness in the year of COVID-19 |
Dipti Salopek |
Oct. 15, 2020 |
473 |
- |
Do you know how healthy your .NET dependencies are? |
Hayley Denbraver |
May. 03, 2019 |
1550 |
- |
Building an npm package compatible with ESM and CJS in 2024 |
Liran Tal |
Apr. 18, 2024 |
1082 |
- |
Investing in our planet: One tree planted for each new Snyker |
Tori Hay Lindahl |
Apr. 22, 2022 |
444 |
- |
Extend the power of your AppSec data with the new Snyk and Snowflake integration |
Guy Plotnik |
Aug. 06, 2024 |
1095 |
- |
Meet (and join) our newest Snyk Ambassadors – Fall 2022 edition! |
Gerald Crescione |
Sep. 19, 2022 |
861 |
- |
How AppSec has evolved in 2021: Reddit’s perspective |
Brian Piper |
May. 03, 2021 |
1077 |
- |
Navigating your own career growth in a hyper-growth startup |
Dipti Salopek |
Jan. 07, 2020 |
849 |
- |
Vulnerability disclosure: Which comes first, the security bug in PHP or the CVE? |
Liran Tal |
Dec. 19, 2023 |
841 |
- |
Snyk sponsors Snowflake Summit |
LaToya Muff |
Jun. 04, 2024 |
569 |
- |
An investigation into code injection vulnerabilities caused by generative AI |
Jack Hair |
Apr. 16, 2024 |
983 |
- |
Lessons from OpenSSL vulnerabilities part 1: Preparing your supply chain for the next critical vulnerability |
Jamie Smith |
Apr. 19, 2023 |
1133 |
- |
Snyk Raises $70M to Accelerate Dev-first Security |
Peter McKay |
Sep. 09, 2019 |
409 |
- |
Announcing Social Trends: Use social media for security intelligence |
Daniel Berman |
Jul. 28, 2021 |
1232 |
- |
Log4j vulnerability explained: Prevent Log4Shell RCE by updating to version 2.17.1 |
Brian Vermeer |
Dec. 10, 2021 |
1135 |
- |
March in review: State of Open Source Security survey, All.The.Talks virtual conference, and more |
Eirini-Eleni Papadopoulou |
Mar. 31, 2020 |
621 |
- |
How Atlassian CISO Adrian Ludwig built a world-class product security team |
Ravi Maira |
Oct. 28, 2020 |
728 |
- |
Managing license compliance across your organization with Snyk’s license policies |
Josefa Riveros |
Apr. 30, 2020 |
741 |
- |
JavaScript type confusion: Bypassed input validation (and how to remediate) |
Alessio Della Libera |
Nov. 03, 2021 |
2957 |
9 |
Manage security issues in Jira with Snyk Security in Jira Cloud |
LaToya Muff |
Aug. 09, 2023 |
330 |
- |
Lessons from OpenSSL vulnerabilities part 2: Finding and fixing supply chain vulnerabilities |
Jamie Smith |
Apr. 26, 2023 |
1977 |
- |
Using the Snyk API to find and fix vulnerabilities |
Josh Emerson |
Jan. 03, 2018 |
1230 |
- |
5 tips to supercharge app security from code to cloud |
Sonya Moisset |
Aug. 08, 2023 |
2759 |
- |
The dangers of setattr: Avoiding Mass Assignment vulnerabilities in Python |
Jack Hair |
Feb. 15, 2023 |
1334 |
- |
Understanding DNS attacks: Identifying and patching vulnerabilities |
Nihad Hassan |
Oct. 26, 2022 |
2002 |
- |
Shifting Docker security left |
Brian Vermeer |
Apr. 17, 2019 |
924 |
- |
Announcing Snyk for .NET, Go and PHP |
Aner Mazur |
Dec. 21, 2017 |
733 |
- |
Which of the OWASP Top 10 Caused the World’s Biggest Data Breaches? |
Guy Podjarny |
May. 10, 2017 |
2799 |
17 |
Protect container images directly from your registries |
Liron Lifshitz-Yadin |
Apr. 30, 2019 |
465 |
- |
Build a software bill of materials (SBOM) for open source supply chain security |
Liran Tal |
Mar. 14, 2022 |
2599 |
- |
Enterprise security: Digital transformation and risk management with Anheuser-Busch Inbev and Manulife |
Brian Piper |
Feb. 03, 2022 |
875 |
- |
Buildkit mount cache race: Build-time race condition container breakout (CVE-2024-23651) |
Rory McNamara |
Jan. 31, 2024 |
1022 |
- |
Serverless Security at Serverless Conf |
Guy Podjarny |
Apr. 28, 2017 |
155 |
- |
Ghostcat breach affects all Tomcat versions |
Brian Vermeer |
Feb. 26, 2020 |
491 |
1 |
Helping Python developers shift security left with a new PyCharm plugin |
Daniel Berman |
Sep. 08, 2020 |
750 |
1 |
AWS re:Inforce 2022 recap |
Shilpi Bhattacharjee |
Aug. 08, 2022 |
2487 |
- |
Providing Comprehensive Application Security from Code to Production: New Snyk and Hdiv Security Partnership |
Carey Stanton |
Oct. 26, 2021 |
406 |
- |
Snyk and Bitbucket best practices cheat sheet |
Marco Morales |
Mar. 03, 2022 |
915 |
- |
XS leaks: What they are and how to avoid them |
Gino Diño |
Jul. 17, 2023 |
2287 |
1 |
36% of developers switched from Oracle JDK to an alternate OpenJDK distribution, over the last year |
Brian Vermeer |
Feb. 05, 2020 |
736 |
3 |
SAS and Snyk discuss the future of AI for development and security teams |
Brian Piper |
Oct. 09, 2023 |
848 |
- |
Snyk Open Source adds C/C++ security scanning for unmanaged dependencies |
Michal Brutvan |
Apr. 05, 2022 |
768 |
- |
How Onna Technologies uses Snyk & Sysdig to secure the SDLC while saving time and money |
Brian Piper |
Sep. 12, 2022 |
1297 |
- |
Suspicious Maintainer Unveils Threads of npm Supply Chain Attack |
Liran Tal |
Jul. 16, 2024 |
1524 |
- |
Turn the senior around: an alternative way to lead engineering teams |
Shai Mendel |
Nov. 30, 2020 |
1085 |
- |
How to prevent Trojan Source attacks with Snyk Code |
Frank Fischer |
Nov. 17, 2021 |
957 |
- |
Cloud security fundamentals part 1: Know your environment |
Drew Wright |
Oct. 07, 2022 |
1098 |
- |
New Year's security resolutions for 2024 from Snyk DevRel, SecRel, and friends |
Micah Silverman |
Jan. 18, 2024 |
1188 |
- |
The State of Open Source Security Survey |
Simon Maple |
Nov. 06, 2018 |
292 |
- |
Buildkit build-time container teardown arbitrary delete (CVE-2024-23652) |
Rory McNamara |
Jan. 31, 2024 |
879 |
- |
Launching the Snyk Community Outreach Internship Program |
Peter McKay |
Nov. 16, 2020 |
302 |
- |
Staying ahead of security vulnerabilities with security patches |
Liran Tal |
Jul. 31, 2019 |
1140 |
- |
What you should know about PHP code security |
Liran Tal |
Sep. 04, 2024 |
1773 |
- |
Actionable and aggregated Slack notifications |
Anna Debenham |
Aug. 23, 2018 |
301 |
- |
Import an existing infrastructure into Terraform |
Stephane Jourdan |
Jul. 02, 2020 |
1089 |
- |
Secure your software supply chain with the new Snyk Vulnerability Intelligence for SBOM ServiceNow integration |
Sarah Conway |
Nov. 07, 2023 |
531 |
- |
Sum a List of numbers in Java |
Brian Vermeer |
May. 22, 2020 |
817 |
- |
Snyk documentation: Our journey so far |
David Bailey |
Feb. 29, 2024 |
978 |
- |
Snyk and ServiceNow collaborate on new SBOM solution |
Sarah Conway |
May. 16, 2023 |
470 |
- |
Celebrating Father’s Day at Snyk |
Snyk Team |
Jun. 17, 2022 |
93 |
- |
CTF secrets revealed: TopLang challenge from SnykCon 2021 explained |
Michael Aquilina |
Jan. 06, 2022 |
2987 |
- |
Remove sensitive data in your files and Azure Repos history |
Simon Maple |
May. 06, 2019 |
199 |
- |
JVM Ecosystem report 2018 - About your Tools |
Simon Maple |
Oct. 17, 2018 |
1278 |
- |
Snyk Open Source in 2021: A year of innovation |
Daniel Berman |
Dec. 21, 2021 |
1298 |
- |
Privileged Docker containers—do you really need them? |
Matt Jarvis |
Nov. 05, 2020 |
1328 |
2 |
Backstage integration with the Snyk API |
Matt Jarvis |
Mar. 17, 2021 |
781 |
- |
Snyk $22M Series B: Thanks to our community! |
Guy Podjarny |
Sep. 25, 2018 |
802 |
- |
Understanding Responsible Disclosures |
Tim Kadlec |
Jan. 31, 2017 |
1577 |
1 |
Agent hijacking: The true impact of prompt injection attacks |
Elliot Ward, Rory McNamara, Mateo Rojas-Carulla, Sam Watts, Eric Allen |
Aug. 28, 2024 |
2758 |
- |
Mimic your mental model with Project Collections |
Waleed Arshad |
Jun. 27, 2023 |
745 |
- |
Best practices for containerizing Python applications with Docker |
Liran Tal |
Nov. 11, 2021 |
4280 |
- |
Rego 103: Types of values and rules |
Jasper Van der Jeugt, Becki Lee |
Nov. 16, 2023 |
3425 |
- |
Building Java container images using Jib |
Eric Smalling |
Aug. 17, 2021 |
3081 |
- |
Introducing new Snyk AppRisk integrations: Enhancing application risk management with development context |
Daniel Berman |
Aug. 01, 2024 |
890 |
- |
A developer-centric approach to software |
Mariah Gresham |
Feb. 18, 2022 |
1108 |
- |
Celebrate International Women’s Day with Snyk |
Hayley Denbraver |
Mar. 08, 2019 |
370 |
- |
Understanding Kubernetes Pod Security Standards |
Gino Diño |
Jun. 20, 2023 |
1389 |
- |
Vulnerability remediation process: reducing your vulnerability backlog with Snyk’s automatic backlog PRs |
Daniel Berman |
Oct. 22, 2020 |
835 |
- |
Avoiding mass assignment vulnerabilities in Node.js |
Benson Kuria Macharia |
Mar. 28, 2023 |
2321 |
- |
Snyk Fetch the Flag CTF 2023 writeup: Honey Baked Messages |
John Hammond |
Nov. 30, 2023 |
298 |
- |
Snyk is now also hosted in the EU providing regional data residency |
Daniel Berman |
Jun. 28, 2022 |
633 |
- |
Bower is dead, long live npm. And Yarn. And webpack. |
Assaf Hefetz |
Dec. 05, 2017 |
1077 |
- |
Essential Node.js backend examples for developers in 2024 |
Liran Tal |
Jun. 12, 2024 |
2643 |
- |
Python language support now beta in Snyk Code |
Frank Fischer |
Apr. 13, 2021 |
458 |
- |
Celebrating Asian American and Pacific Islander Heritage Month |
Snyk Team |
May. 27, 2022 |
1141 |
- |
Introducing Snyk Learn: Free developer security education |
Edgar Kussberg |
Oct. 06, 2021 |
684 |
- |
Architecting a Serverless web application in AWS |
Drew Wright |
May. 09, 2016 |
3036 |
- |
Announcing Snyk for Bitbucket Pipelines |
Guy Podjarny |
Oct. 12, 2016 |
187 |
- |
A developer’s best friend: Lessons learned from our canine companions about AI code security |
Krysta Williams-Timm |
Aug. 26, 2024 |
803 |
- |
10 React security best practices |
Liran Tal |
Jul. 18, 2022 |
1130 |
2 |
Preventing XSS in Django |
Liran Tal |
Mar. 13, 2023 |
1932 |
- |
Snyk Code now secures AI builds with support for LLM sources |
Liqian Lim (林利蒨), Ranko Cupovic |
Jun. 25, 2024 |
571 |
- |
Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months |
Danny Grander |
Nov. 27, 2018 |
752 |
- |
Prioritizing container vulnerabilities with exploit maturity |
Jim Armstrong |
Sep. 09, 2020 |
800 |
- |
Launching Snyk |
Guy Podjarny |
Dec. 03, 2015 |
470 |
- |
Spring4Shell extends to Glassfish and Payara: same vulnerability, new exploit |
Brian Vermeer |
Apr. 08, 2022 |
1015 |
- |
Secure coding with Snyk Code: Ignore functionality with a twist |
Frank Fischer |
Mar. 30, 2021 |
944 |
- |
SAST tools speed comparison: Snyk Code vs SonarQube and LGTM |
Frank Fischer |
Jul. 22, 2021 |
1443 |
- |
Announcing Insights: Helping you focus on top risks for your organization |
Daniel Berman |
Jun. 07, 2023 |
1737 |
- |
Priorities from the OpenSSF Secure Open Source Software Summit 2023 |
Dan Appelquist |
Oct. 04, 2023 |
381 |
- |
Under the C: A glance at C/C++ vulnerabilities in Python land |
Aviad Hahami |
Apr. 28, 2022 |
1289 |
- |
Requiring authentication in Snyk CLI |
Guy Podjarny |
Jan. 12, 2017 |
733 |
- |
How open source C++ code can introduce security risks |
Snyk Security Research Team |
Aug. 22, 2022 |
1353 |
- |
Snyk for your Enterprise |
Aner Mazur |
Sep. 19, 2017 |
380 |
- |
Introducing the Snyk Partner Solutions Directory for discovering Snyk technology integrations |
Cara Sampson |
Apr. 03, 2023 |
996 |
- |
Snyk’s Evolution: A Message From CEO Peter McKay |
Peter McKay |
Apr. 13, 2023 |
549 |
- |
Secure Elixir development with Snyk |
Daniel Berman |
Apr. 27, 2021 |
1025 |
- |
How to install Java on macOS |
Liran Tal |
Apr. 17, 2024 |
2820 |
- |
Navigate 3 trends in financial services with DevSecOps |
Patrick Vandenberg |
Jul. 13, 2020 |
932 |
- |
CISO playbook: 3 things to consider when establishing a security culture |
Simon Maple |
Mar. 09, 2023 |
1249 |
- |
The State of Open Source Security Survey - 2020 |
Alyssa Miller |
Mar. 25, 2020 |
668 |
- |
GitHub Copilot code security: XSS in React |
Liran Tal |
Oct. 19, 2023 |
2044 |
- |
Security breach leaks the personal data of all 6.5 million Israeli voters |
Ran Bar zik |
Feb. 12, 2020 |
595 |
3 |
Announcing the Snyk and Docker Security Guide for Developers |
Jim Armstrong |
Nov. 18, 2020 |
668 |
- |
Tightly control access to your Azure Repos |
Simon Maple |
May. 06, 2019 |
328 |
- |
Setting up SSL/TLS for Kubernetes Ingress |
Peter De Tender |
Nov. 17, 2022 |
2245 |
- |
Exploiting Buffer |
Guy Podjarny |
Apr. 05, 2016 |
1227 |
- |
Never store credentials as code/config in Azure Repos |
Simon Maple |
May. 06, 2019 |
315 |
- |
Snyk CLI cheat sheet |
Brian Vermeer |
Nov. 26, 2020 |
2369 |
- |
Snyk Career Stories: Starting and growing your career through the Snyk SDR program |
Snyk Team |
Nov. 23, 2021 |
2045 |
- |
What makes Fastify a successful project? |
Oren Hacohen |
Dec. 22, 2020 |
780 |
- |
Security success in the Bay Area with Slack |
Mariah Gresham |
May. 17, 2023 |
878 |
- |
Snyk expands in Asia-Pacific (APAC) with new datacenter in Sydney, Australia |
Daniel Berman |
Nov. 30, 2022 |
715 |
- |
Get Snyk security alerts on Slack |
Johanna Kollmann |
Sep. 28, 2016 |
202 |
- |
Secure your build workflow on Bitbucket Pipes with Snyk |
Noa Korem |
Mar. 05, 2019 |
776 |
- |
How to setup Deno Dev Container on GitHub Codespaces? |
Liran Tal |
Jul. 18, 2024 |
2097 |
- |
The Secret To Building A Truly Successful Freemium Product and more, with Guy Podjarny |
Simon Maple |
Dec. 19, 2018 |
571 |
- |
Welcoming Kathleen Murphy and Zach Nelson to the Snyk Board of Directors |
Peter McKay |
Jan. 24, 2022 |
448 |
- |
How to manage Terraform state? |
Stephane Jourdan |
May. 26, 2020 |
937 |
- |
Magento security requires additional patch to fix sanitization vulnerability |
DeveloperSteve Coochin |
Feb. 24, 2022 |
711 |
- |
Modernizing SAST rules maintenance to catch vulnerabilities faster |
Frank Fischer |
Apr. 19, 2022 |
928 |
- |
Why npm lockfiles can be a security blindspot for injecting malicious modules |
Liran Tal |
Sep. 24, 2019 |
1068 |
259 |
Our Journey to Today |
Guy Podjarny |
Mar. 10, 2021 |
788 |
- |
Command injection in Python: examples and prevention |
Rubaiat Hossain |
Dec. 21, 2023 |
2558 |
- |
Securing your Kubernetes application development with Snyk and Tilt |
Matt Jarvis |
Jan. 11, 2021 |
2412 |
- |
Meet (and join) our newest Snyk Ambassadors! |
Waleed Arshad |
Mar. 28, 2022 |
1783 |
- |
Best practices for managing Java dependencies |
Brian Vermeer |
Aug. 26, 2022 |
1826 |
5 |
How to avoid web cache poisoning attacks |
Najia Gul |
Sep. 11, 2023 |
2155 |
- |
How to secure Python Flask applications |
Gourav Singh Bais |
May. 21, 2024 |
4209 |
- |
Fetch the Flag CTF 2023 sneak peek |
Danielle Bradford |
Sep. 06, 2023 |
187 |
- |
Out of Beta, plus exciting new features |
Guy Podjarny |
Jun. 22, 2016 |
694 |
- |
Secure code review: 8 security code review best practices |
Brian Vermeer, Trisha Gee |
Apr. 20, 2020 |
3180 |
- |
A DevSecOps solution for your apps on AWS from Snyk |
David Lugo |
Nov. 28, 2023 |
900 |
- |
Ignoring vulnerabilities with Snyk |
Daniel Berman |
May. 03, 2022 |
1845 |
- |
Implementing TLS in Java |
Himanish Munjal |
Nov. 09, 2022 |
2166 |
- |
Getting started with Snyk for secure Python development |
Daniel Berman |
Aug. 04, 2021 |
2033 |
- |
Best practices for containerizing Go applications with Docker |
Jekayin-Oluwa Olabemiwo |
Mar. 23, 2022 |
2117 |
- |
Arbitrary code execution in Grunt |
Alyssa Miller |
Sep. 21, 2020 |
872 |
- |
10 Tips for getting that conference CFP accepted |
Liran Tal |
Dec. 03, 2020 |
1148 |
- |
Snyk named as a top cybersecurity company in inaugural Fortune Cyber 60 2023 list |
Snyk Team |
Dec. 18, 2023 |
337 |
- |
3 parameters to measure SAST testing |
Asaf Biton |
Aug. 03, 2021 |
1571 |
- |
5 ways to prevent code injection in JavaScript and Node.js |
Liran Tal |
Apr. 06, 2021 |
2325 |
1 |
New years resolution: Don’t show my security tokens when hacking my demo application on stage |
Brian Vermeer |
Jan. 12, 2022 |
721 |
- |
Snyk finds PyPi malware that steals Discord and Roblox credential and payment info |
Raul Onitza-Klugman |
Aug. 16, 2022 |
1689 |
- |
AngularJS Security Fundamentals |
Liran Tal |
Mar. 17, 2020 |
3025 |
2 |
Announcing the 2017 State of Open Source Security Report |
Tim Kadlec |
Nov. 16, 2017 |
386 |
- |
A definitive guide to Ruby gems dependency management |
Liran Tal |
Aug. 05, 2022 |
2618 |
1 |
Python now fully supported in Snyk Code |
Frank Fischer |
Jun. 03, 2021 |
493 |
- |
Celebrating four years of developer-first integrations at Atlassian Team ‘21 |
Sarah Conway |
Apr. 26, 2021 |
750 |
- |
Enriched content on Snyk’s publicly available vulnerability database |
Dan Mckean |
Apr. 08, 2019 |
511 |
- |
Security vs. Development: A game of priorities |
Andrew MacKenzie |
Nov. 06, 2023 |
1009 |
- |
Finding meaning amidst so much unknown |
Simon Maple |
Apr. 22, 2020 |
781 |
- |
How MongoDB built a successful security champions program |
Sarah Wills |
Nov. 02, 2021 |
744 |
- |
Identifying Insecure C Code with Valgrind and Fixing with Snyk Code |
Liran Tal |
Sep. 24, 2024 |
1373 |
- |
Meet the new host for The Secure Developer podcast |
Mariah Gresham |
May. 09, 2024 |
469 |
- |
How to mitigate security issues in GenAI code and LLM integrations |
Liran Tal |
Sep. 11, 2024 |
2394 |
- |
Snyk Receives “Best CEO” Award |
Dipti Salopek |
Dec. 12, 2019 |
329 |
- |
Announcing new Snyk AppRisk integration with Orca Security |
Daniel Berman |
Sep. 11, 2024 |
809 |
- |
Want to avoid a data breach? Employ secrets detection |
Liran Tal |
Sep. 16, 2024 |
2539 |
- |
Application security automation for GitHub repositories with Snyk |
Omer Levi Hevroni |
Mar. 31, 2021 |
941 |
- |
Promise queues and batching concurrent tasks in Deno |
Liran Tal |
Sep. 25, 2024 |
3378 |
- |
AWS re:Invent 2022: How Neiman Marcus transitioned to developer-first security |
Megan Moore |
Dec. 12, 2022 |
1231 |
- |
5 reasons why developers at FinServ institutions are outpacing their security teammates |
Katie DeMatteis |
Sep. 09, 2024 |
822 |
- |
Dive into AI and LLM learning with the new Snyk Learn learning path |
Michael Biocchi |
Sep. 18, 2024 |
310 |
- |
Welcoming Gary Olson: Snyk’s new Chief Revenue Officer |
Peter McKay |
Mar. 04, 2024 |
444 |
- |
How SAS secures their AI-generated code |
Gerald Crescione |
Apr. 15, 2024 |
1874 |
- |
The journey to AppSec gold: Lessons we can learn from the Olympians |
Krysta Williams-Timm |
Aug. 15, 2024 |
714 |
- |
Simplify Snyk and AWS integration with our latest AWS Quick Start |
Jay Yeras |
Sep. 22, 2020 |
424 |
- |
Tools for infrastructure drift detection |
William Beuil |
Mar. 15, 2022 |
2480 |
- |
Security Horror Story: Accidentally exposing PII data |
Brian Vermeer |
Oct. 25, 2021 |
1008 |
- |
3 best practices to make the most of Snyk AppRisk Essentials |
Daniel Berman |
Sep. 19, 2024 |
1801 |
- |
10 best practices to build a Java container with Docker |
Brian Vermeer |
Aug. 24, 2022 |
4147 |
- |
Secure development in Visual Studio with Snyk Open Source |
Daniel Berman |
Jun. 09, 2021 |
689 |
- |
Infosec Europe session: 4 tips for safer AI adoption |
Gerald Crescione |
Aug. 01, 2024 |
1103 |
- |
How to prevent log injection vulnerability in JavaScript and Node.js applications |
Liran Tal |
Sep. 26, 2024 |
1504 |
- |
Securing a DevOps pipeline with Snyk, Bitbucket, and AWS |
Marco Morales |
Jan. 04, 2022 |
456 |
- |
SurveyMonkey talks with Snyk about developer security during hypergrowth |
Megan Moore |
May. 05, 2022 |
1381 |
- |
Meet Snyk for Government: Our developer security solution with FedRAMP ATO |
Danny Allan |
Sep. 17, 2024 |
502 |
- |
Operating security ownership at scale: Twilio’s perspective |
Brian Piper |
Aug. 30, 2021 |
885 |
- |
Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System |
Jim Armstrong |
Sep. 27, 2024 |
1224 |
- |
Going beyond reachability to prioritize what matters most |
Jamie Smith |
Oct. 01, 2024 |
1149 |
- |
Proactive AppSec continuous vulnerability management for developers and security teams |
Liran Tal |
Oct. 02, 2024 |
1804 |
- |
Snyk named a 2024 Gartner Peer Insights™ Customers’ Choice for Application Security Testing for the 3rd consecutive year |
Nina McClure |
Oct. 02, 2024 |
723 |
- |
The mysterious supply chain concern of string-width-cjs npm package |
Liran Tal |
Oct. 03, 2024 |
1455 |
- |
SnykLaunch Oct 2024: Enhanced PR experience, extended visibility, AI-powered security, holistic risk management |
Anthony Larkin |
Oct. 08, 2024 |
1489 |
- |
A look into your engineering interview at Snyk |
Philip Beevers |
Oct. 09, 2024 |
750 |
- |
Foundations of trust: Securing the future of AI-generated code |
Danny Allan |
Oct. 10, 2024 |
888 |
- |
Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code |
Liran Tal |
Oct. 10, 2024 |
875 |
- |
Automatically fix code vulnerabilities with AI |
Micah Silverman |
Oct. 14, 2024 |
1132 |
- |
How Snyk is prioritizing developer experience |
Anthony Larkin |
Oct. 16, 2024 |
860 |
- |
Snyk announces commitment to Service for America, bringing security education access to all |
Michael Biocchi |
Oct. 17, 2024 |
394 |
- |
Ensuring comprehensive security testing in DevOps pipelines |
Jim Armstrong |
Oct. 17, 2024 |
1317 |
- |
Introducing: Extensive AppSec visibility with Snyk Analytics |
Nastasha Casale |
Oct. 17, 2024 |
952 |
- |
Elevating Views of Risk: Holistic Application Risk Management with Snyk |
Daniel Berman |
Oct. 22, 2024 |
1601 |
- |
Women - Kickstart your Application Security Career! |
Vandana Verma Sehgal |
Oct. 22, 2024 |
1020 |
- |
Find, auto-fix, and prioritize intelligently, with Snyk's AI-powered code security tools |
Liqian Lim (林利蒨) |
Oct. 24, 2024 |
2083 |
- |
Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV) |
Liran Tal |
Oct. 23, 2024 |
1469 |
- |
Best Practices for Continuous Vulnerability Management |
Liran Tal |
Oct. 29, 2024 |
1698 |
- |
Top 5 SAST Auto-fixing Tools and How They Compare |
Liqian Lim (林利蒨) |
Oct. 29, 2024 |
966 |
- |
Lottie Player npm package compromised for crypto wallet theft |
Liran Tal |
Oct. 31, 2024 |
825 |
2 |
If you don’t know about HTTP Archive’s Web Almanac yet, you should! |
Brian Clark |
Nov. 01, 2024 |
710 |
- |
Snyk Recharge days: Making time to take time |
Adriana Bokel Herde |
May. 17, 2023 |
710 |
- |
GitFlops: The Dangers of Terraform Automation Platforms |
Elliot Ward |
Nov. 07, 2024 |
1831 |
- |
Extending Developer Security with Dev-First Dynamic Testing |
Manoj Nair |
Nov. 12, 2024 |
1565 |
- |
How ASPM boosts visibility to manage application risk |
Daniel Berman |
Nov. 12, 2024 |
1144 |
- |
Exploring intent-based Android security vulnerabilities on Google Play |
Raul Onitza-Klugman |
May. 18, 2021 |
1495 |
- |
5 Disaster Recovery Testing Methodologies |
Liran Tal |
Sep. 23, 2022 |
610 |
- |
Understanding command injection vulnerabilities in Go |
Liran Tal |
Nov. 14, 2024 |
1891 |
1 |
5 Best Practices for Container security |
Liran Tal |
Jul. 19, 2022 |
985 |
- |
Snyk named a Customer Favorite in The Forrester Wave™: Software Composition Analysis Software, Q4 2024 Report |
Peter McKay |
Nov. 13, 2024 |
460 |
- |
Mitigating and remediating intent-based Android security vulnerabilities |
Raul Onitza-Klugman |
Jun. 02, 2021 |
1655 |
- |
Phony PyPi package imitates known developer |
Elliot Ward |
Oct. 05, 2022 |
1031 |
2 |
An Introduction to capture the flag |
Sonya Moisset |
Sep. 13, 2023 |
828 |
- |
6 Kubernetes Tools That Can Help Secure Containers at Runtime |
Liran Tal |
Jun. 08, 2022 |
481 |
- |
Women in security: Inspiring leaders of today and tomorrow |
Jonaki Egenolf |
Nov. 19, 2024 |
433 |
- |
How to prioritize vulnerabilities based on risk |
Daniel Berman |
Nov. 19, 2024 |
1153 |
- |
A commitment to future generations: Snyk’s 2024 Student Edition Capture The Flag Recap |
Michael Biocchi |
Nov. 21, 2024 |
332 |
- |
Why a solid DevOps foundation is vital for effective DevSecOps |
Ben Desjardins |
Nov. 27, 2024 |
1117 |
- |
Measuring AppSec success: Key KPIs that demonstrate value |
Daniel Berman |
Nov. 26, 2024 |
1479 |
- |
6 Reasons to use source code analysis |
Liran Tal |
May. 10, 2021 |
666 |
- |
Seven steps to close coverage gaps with ASPM |
Daniel Berman |
Dec. 03, 2024 |
1023 |
- |
2024 Open Source Security Report: Slowing Progress and New Challenges for DevSecOps |
Jamie Smith |
Dec. 03, 2024 |
973 |
- |
Empowering women in security: The impact of mentorship |
Erin Cullen |
Nov. 27, 2024 |
696 |
- |
Snyk-generated SBOMs now include license details for the open source libraries in your projects |
Jamie Smith |
Dec. 09, 2024 |
906 |
- |
How to mitigate SSRF vulnerabilities in Go |
Liran Tal |
Dec. 10, 2024 |
910 |
- |
Snyk’s risk-based approach to prioritization |
Daniel Berman |
Dec. 11, 2024 |
1082 |
- |
Ultralytics AI Pwn Request Supply Chain Attack |
Stephen Thoemmes |
Dec. 11, 2024 |
1375 |
- |
10 SDLC best practices to implement today |
Jamie Smith |
Jan. 14, 2022 |
1304 |
- |
Microservices security: 6 best practice tips |
Jamie Smith |
Feb. 10, 2022 |
1226 |
- |
Vulnerability vs Weakness: Understanding Key Differences in AppSec |
Daniel Berman |
Nov. 17, 2023 |
1934 |
- |
7 Best practices for disaster recovery testing |
Liran Tal |
Sep. 23, 2022 |
805 |
- |
Ethical Hacking: Top Tools |
Vandana Verma Sehgal |
Jun. 01, 2023 |
1601 |
- |
Top 10 DevOps Tools |
Jamie Smith |
Mar. 21, 2021 |
1423 |
- |
Security Vulnerability: types and remediation |
Rory McNamara |
Feb. 11, 2021 |
1352 |
- |
Top 8 AWS Security Best Practices |
Liran Tal |
Oct. 18, 2022 |
1835 |
- |
Hiring a virtual CISO to help your security team |
Manoj Nair |
Mar. 09, 2022 |
1019 |
- |
DevOps Security best practices |
Jamie Smith |
Mar. 16, 2021 |
1487 |
- |
The 4 best DevSecOps tools for a secure DevOps workflow |
Liran Tal |
Jan. 23, 2024 |
1583 |
- |
Essential AI Tools to Boost Developer Productivity and Security |
Liqian Lim (林利蒨) |
Mar. 01, 2024 |
1385 |
- |
What is the BSD License? Top 10 questions answered |
Jamie Smith |
Sep. 22, 2020 |
969 |
- |
4 Advantages of using AI code review |
Rory McNamara |
Nov. 29, 2023 |
1152 |
- |
Python Code Review Tools |
Liran Tal |
Aug. 12, 2022 |
1276 |
- |
Why you should implement an automated code review process |
Liran Tal |
Dec. 20, 2021 |
1222 |
- |
Unlocking the power of multi-cloud security |
Vandana Verma Sehgal |
Apr. 25, 2023 |
1147 |
- |
Supply Chain Security Risks & Best Practice |
Liran Tal |
Apr. 04, 2023 |
1102 |
- |
What are security misconfigurations and how can you prevent them? |
Rory McNamara |
Nov. 01, 2021 |
932 |
- |
Getting started at a new organization |
Manoj Nair |
Jan. 27, 2022 |
791 |
- |
OWASP API Security Top 10 Risks |
Liran Tal |
Sep. 23, 2022 |
1816 |
- |
8 proven code review best practices for developers |
Liran Tal |
Jan. 14, 2022 |
1316 |
- |
OWASP Top 10 Vulnerabilities |
Liran Tal |
Oct. 15, 2020 |
2504 |
- |
How to implement DevSecOps in 4 steps |
Jamie Smith |
Jun. 22, 2023 |
1316 |
- |
Software Supply Chain Security Tools: Types, Features & Considerations |
Jamie Smith |
Aug. 02, 2023 |
1306 |
- |
5 application security assessment steps |
Daniel Berman |
Aug. 31, 2021 |
1029 |
- |
5 potential risks of open source software |
Liran Tal |
Jun. 29, 2021 |
1436 |
- |
C++ in the wild: Which industries use C++? |
Liran Tal |
Apr. 29, 2022 |
1070 |
- |
Developer-first supply chain security |
Jamie Smith |
Sep. 19, 2023 |
1330 |
- |
Top 5 Docker Security Vulnerabilities |
Liran Tal |
Oct. 31, 2022 |
1036 |
- |
Asset-first application security: What is it and how can it help |
Daniel Berman |
Nov. 03, 2023 |
1156 |
- |
The Importance of Container Monitoring |
Jamie Smith |
Mar. 02, 2022 |
1013 |
- |
Cloud security challenges |
Rory McNamara |
May. 19, 2022 |
2423 |
- |
Defense in Depth |
Daniel Berman |
Feb. 29, 2024 |
1430 |
- |
Top AWS Security Risks & Prevention |
Rory McNamara |
Mar. 02, 2023 |
1256 |
- |
Top 8 DevSecOps Best Practices - Build Securely |
Liran Tal |
Sep. 26, 2022 |
1074 |
- |
15 Application Security Best Practices |
Daniel Berman |
Oct. 08, 2020 |
1573 |
- |
Secrets Management: Tools & Best Practice |
Jamie Smith |
Jun. 26, 2023 |
1318 |
- |
Product Security vs. Application Security: What’s the Difference? |
Rory McNamara |
Jul. 21, 2023 |
1390 |
- |
6 tips for managing your open source components |
Liran Tal |
Apr. 26, 2022 |
1364 |
- |
4 Enterprise-level security best practices |
Manoj Nair |
Jul. 20, 2023 |
617 |
- |
4 steps of the Vulnerability Remediation Process |
Liran Tal, Jamie Smith |
Feb. 16, 2021 |
1699 |
- |
7 best Java code review tools for developers |
Liran Tal |
Jan. 14, 2022 |
1375 |
- |
AppSec Maturity Models |
Rory McNamara |
Mar. 08, 2024 |
1120 |
- |
Cybersecurity Hygiene 101 |
Liran Tal |
Mar. 02, 2023 |
1594 |
- |
High profile AWS breaches & how to avoid them |
Jamie Smith |
Jun. 07, 2023 |
1197 |
- |
5 cloud application security best practices |
Jamie Smith |
Jun. 27, 2021 |
842 |
- |
API Security Guide |
Liran Tal |
Apr. 25, 2023 |
1338 |
- |
Did you make the *security* naughty or nice list this year? |
Mariah Gresham |
Dec. 18, 2024 |
590 |
- |
4 tips for securing GenAI-assisted development |
Sarah Conway |
Dec. 18, 2024 |
859 |
- |