May. 2022 |
Snyk: Developer Security Platform |
2oCog1TGM0w |
May. 2022 |
What is DevSecOps? DevSecOps explained in under 7 mins | 2022 |
VLEF6MU0Wfg |
Jul. 2022 |
Application Security 101 - What you need to know in 8 minutes |
Dp019cWu1cg |
Jul. 2022 |
Snyk Demo in 20 Minutes | 2022 |
9RHM4ybvyT8 |
Dec. 2023 |
Why should developers care about container security? |
n2q0py7HSdM |
Apr. 2024 |
Top 3 JWT Security Best Practices for Your Apps |
VxIK0xwyLbw |
Apr. 2024 |
Are you using JWTs safely in your app? |
EubqlYnjuDU |
Apr. 2024 |
How to find and fix security issues in your projects |
4hZW81a3S4c |
Apr. 2024 |
How to decode and validate a JWT in Python |
nTKTrW98OrY |
Apr. 2024 |
How to validate JWTs |
4UBrTxcuhNw |
Apr. 2024 |
How to safely store JWTs |
bPzhcZBBtic |
Apr. 2024 |
How to Choose the Best Node.js Docker Image |
QSGrqOgFFgk |
Apr. 2024 |
How Node.js Container Images Can Be Problematic |
PBg0al7rHHM |
Apr. 2024 |
How to Find Vulnerabilities in Containers |
_mEzbdw6ziI |
Apr. 2024 |
What is Node.js Alpine Container Image? |
bMfWT9UYCdE |
Apr. 2024 |
How to Choose the Best Node js Docker Image |
lppAnzSCCtI |
Apr. 2024 |
What Node.js Docker Container Image Tags Mean |
AObeJvUcvoQ |
Apr. 2024 |
Why you NEED an Open Source Vulnerability Scanner |
SOa2zw0-K4E |
Apr. 2024 |
Why You Should Use Open Source Vulnerability Scanners |
0rw7WkjnZBU |
Apr. 2024 |
Unmask Threats with Open Source Vulnerability Scanners |
hO-iiiCkvCU |
Apr. 2024 |
How Open Source Vulnerability Scanners Help with Remediation |
FidfSvl1W_U |
Apr. 2024 |
How to use Snyk SBOM and Review Project Open Source Dependencies |
c2952HPC8bM |
Apr. 2024 |
How to Analyze a Vulnerability from Snyk's Vulnerability Database - Snyk VulnDB |
dwxxl9onIF0 |
Apr. 2024 |
How to Use GitHub Actions Environment Variables and Secrets |
5xngh29yx9A |
May. 2024 |
What are the Built-in GitHub Environment Variables? |
cTB4m9cfgnY |
May. 2024 |
Why You Should Use Environment Variables in GitHub Actions |
fhK1jqxig4Q |
May. 2024 |
Why You Should Use Secrets in GitHub Actions |
dNJPA8mFsvM |
May. 2024 |
How to Fork a Repository on GitHub |
XvxWFST1i4A |
May. 2024 |
How to Create Environment Variables in GitHub Actions |
APHhi50K8q0 |
May. 2024 |
10 Node.js runtime features you SHOULD be using in 2024 |
sKZOC5HHX1I |
May. 2024 |
How to Mock in Node.js with the Built-in Test Module |
Fyphycm-N5o |
May. 2024 |
How to Get Test Coverage in Node.js |
Dk_EP2zAJSg |
May. 2024 |
How to Test in Node.js with the New Test Runner |
5XMifgDgGdE |
May. 2024 |
What is Corepack in Node.js? |
ZSKiLrcMyQM |
May. 2024 |
How to Watch for Changes in Node.js |
7lsa9-Oxd58 |
May. 2024 |
Top 5 VS Code SECURITY Extensions |
4jA1uAIdt8U |
May. 2024 |
Top 5 VS Code Security Extensions - 1Password |
-d6XKm9NBxw |
May. 2024 |
Top 5 VS Code Security Extensions - ESLint |
RGmppNPIXxw |
May. 2024 |
Top 5 VS Code Security Extensions - Cloak |
ECanZ6Vaoyc |
May. 2024 |
Top 5 VS Code Security Extensions - Decompiler |
V1aBpfmTuiM |
May. 2024 |
Top 5 VS Code Security Extensions - Snyk |
52E45onJbg4 |
May. 2024 |
How to Build an NPM Package for ESM and CJS |
PrGvhqKgV3Y |
May. 2024 |
How to Provide Types for your Node.js/JavaScript NPM Package |
JFrlqGoUtFU |
May. 2024 |
How to Target ESM for Your npm Package |
UxevOz-Tqt0 |
May. 2024 |
How to Secure Projects with Snyk |
XF4fE_JB0b0 |
May. 2024 |
Supporting ESM and CJS in an npm Package |
RAPDzXGDL-8 |
May. 2024 |
Using Exports for Both ESM and CJS in an npm Package |
bZximzM3E2o |
May. 2024 |
How to prevent SSRF Attacks in Node.js |
fC6CFSN9BPI |
May. 2024 |
How to Validate URL or URI in Node.js/JavaScript with Zod |
AZDXGAgx0bA |
May. 2024 |
How to Validate Schemas in JavaScript Node.js |
I7EzN-NT9Co |
May. 2024 |
How to Limit Trusted Domains for Requests in JavaScript and Node.js |
GoqRYwO6Wrc |
Jun. 2024 |
How to Make Sure Your JavaScript and Node.js Dependencies are Updated |
N3L5gJFKFcY |
Jun. 2024 |
Using a Firewall to Prevent SSRF in Node.js |
64fVSo1aQME |
Jun. 2024 |
How to Publish a VS Code Extension |
pj3uetwbo00 |
Jun. 2024 |
How to Create Azure DevOps Organization and VS Code Personal Access Token (Visual Studio Code) |
eIssVMtdWJI |
Jun. 2024 |
How to Create a Publisher Account for Your VS Code Extension (Visual Studio Code) |
Hul3vtC9toU |
Jun. 2024 |
How to Prepare Your VS Code Extension for Publishing (Visual Studio Code) |
7Kxml4g_GMg |
Jul. 2024 |
How Does a Browser Polyfill Work? |
NQPLUKzV1o4 |
Jul. 2024 |
How the Supply Chain Attack for Polyfill.io Started |
30_0Bmyj4-o |
Jul. 2024 |
Supply Chain Attack on the Polyfill.io Service |
fqTuAa5nUJo |
Jul. 2024 |
How to Address the Supply Chain Attack on the Polyfill.io Service |
gm_tduEPlrM |
Jul. 2024 |
Best Practices for Supply Chain Security in Response to Polyfill.io Attack |
aCVRecUssL8 |
Jul. 2024 |
The Ultimate Guide to Choose the Best Open Source Packages |
b9B_PfWaXT0 |
Jul. 2024 |
How to Monitor Security of Open Source Packages with Snyk |
8wfMHTE-G4c |
Jul. 2024 |
How to Evaluate Popularity of Open Source Packages |
byJAJPCvhVs |
Jul. 2024 |
How to Evaluate Maintainability of Open Source Packages |
lNT3BfUXYsA |
Jul. 2024 |
How to Evaluate Security of Open Source Packages |
KwZ-TI4e6C0 |
Jul. 2024 |
How to Evaluate Community of Open Source Packages |
6qn8PxPzMcs |
Jul. 2024 |
4 Hidden AI Coding Risks and How to Address Them |
-2S1njN_Urs |
Jul. 2024 |
AI Generated Code Risk: Absence of Policies |
oSSnt6pGXnY |
Jul. 2024 |
AI Generated Code Risk: IP Infringement |
n-UxPswSn7A |
Jul. 2024 |
Why Not to Trust AI Generated Code: Explainability and Transparency |
9OITw6xVchg |
Jul. 2024 |
How AI Generated SQL Injection |
ep9FTkdgc9g |
Jul. 2024 |
A Risk of AI Generated Code: Security Vulnerabilities |
3mlCiwfIaeo |
Jul. 2024 |
GitHub Copilot Makes You Vulnerable |
-5N8TVA1EO0 |
Jul. 2024 |
A Major Flaw with AI Coding Tools - GitHub Copilot, etc. |
KMMt3-fVCLk |
Aug. 2024 |
How Broken Windows Theory Applies to AI |
mKwB__MwqEg |
Aug. 2024 |
GitHub Copilot Created a SQL Injection |
XIHVf-GqQwE |
Aug. 2024 |
Advice for Using AI - Part 1 |
BIOGUxiUJeU |
Aug. 2024 |
Advice for Using AI - Part 2 |
Yk4Q-oPLRR0 |
Aug. 2024 |
More Ways GitHub Copilot Makes You Vulnerable |
EIdsJsKAkvM |
Aug. 2024 |
How You Should Use AI Coding Tools |
TuRU4DC2pIU |
Aug. 2024 |
An Example of Using AI to Code |
x-eanYKvNKE |
Aug. 2024 |
Testing GitHub Copilot Chat Code Output Security |
2v9AzJxIAhM |
Aug. 2024 |
How to Get Better Results from GitHub Copilot |
EYJJ2tAmDac |
Aug. 2024 |
Using GitHub Copilot Chat to Write Secure Code |
hKlUXvVMCR0 |
Aug. 2024 |
How AI Almost Got Me FIRED: Part 1 |
gNQS14JUlyg |
Aug. 2024 |
This AI Code Must Be Secure Or I'm Fired |
nCwwayOpJtQ |
Aug. 2024 |
Auto Fix Vulnerable Code with Snyk |
LZvugzTvVzU |
Aug. 2024 |
Testing AI Code Security |
C_O5JwhUNWo |
Aug. 2024 |
Secure AI Code with Codeium and Snyk |
l2Mj7ntzCoM |
Aug. 2024 |
How AI Almost Got Me FIRED: Part 2 |
q-OgeS6Djpw |
Aug. 2024 |
Why Not to Trust AI Generated Code |
5n0UY3v-ygo |
Aug. 2024 |
Fixing Vulnerabilities in AI Generated Code |
qGi9NcGj-g0 |
Aug. 2024 |
How Some AI Respond to Security Prompts |
dQzWdgDxCG0 |
Aug. 2024 |
Can AI Generate Code without Vulnerabilities? |
-AmjADs6pkw |
Aug. 2024 |
AI Generate Code with NoSQL Injection |
e6ScZH7n_s4 |
Aug. 2024 |
How AI Almost Got Me FIRED: Part 3 |
6sAs5WDFXcI |
Aug. 2024 |
Warning: AI Might Be Training on Your Code |
b40UyK4B1A8 |
Aug. 2024 |
Get Started with AI Coding Tool: Cody |
SJ0voBFXwVk |
Aug. 2024 |
Advice When Using AI Coding Tools |
x5Q2xrDMdME |
Aug. 2024 |
Can Mixtral LLM Create a Secure App? |
Pz7W1DiJtPc |
Sep. 2024 |
Can AI Provide Secure Code? |
z92jTSMPs78 |
Sep. 2024 |
How AI Impacts Reconnaissance and Bug Bounties |
4nNhLzGTuVI |
Sep. 2024 |
What Are The Risks of AI in Security Research? |
DAeJ6uHTofE |
Sep. 2024 |
Can Using AI Be an Advantage for Pentesters? |
HvzioWGepuo |
Sep. 2024 |
Sharing an Embarassing Moment with AI |
jhULDAf9s-k |
Sep. 2024 |
The Promising Uses of AI for Security Research? |
00ydP-YFTqI |
Sep. 2024 |
Does Using AI Make You Lazy? |
jJgFuKCt8QA |
Sep. 2024 |
Why ASPM is the Future of AppSec |
b0vlkL8mEMk |
Sep. 2024 |
What ASPM Solves |
XEnpfhhB8x0 |
Sep. 2024 |
What Snyk's ASPM Provides |
JSmnAN62sug |
Sep. 2024 |
What You Get with Snyk and Accenture |
E_Gpw6l6XrQ |
Sep. 2024 |
Snyk AppRisk Pro and Accenture |
AR_Lsv2t8cI |
Sep. 2024 |
What You Get With Snyk and Accenture ASPM |
Ij-zvFuhFUc |
Sep. 2024 |
How AI Almost Got Me FIRED: Part 4 |
VtVFnCNug3Y |
Sep. 2024 |
Can AI Build a Secure App? Part 1 |
IgymUt93hYI |
Sep. 2024 |
Can AI Build a Secure App? Part 2 |
sz3gS3NlOVs |
Sep. 2024 |
Can Perplexity Build a Secure App? |
g0EEvLs4W9Y |
Sep. 2024 |
How Can AI Help with Application Security? |
n5iRAs3CWa8 |
Sep. 2024 |
Perplexity AI and Secure App Code |
Qqz1d7moBqk |
Sep. 2024 |
Exploiting AI Generated Code |
LT-mYYmUqIU |
Sep. 2024 |
Successful Exploit for Cross Site Scripting |
Skmv9R1OHac |
Sep. 2024 |
Exploit Attempt for a Cross Site Scripting Vulnerability |
tRAcL3DnJdY |
Sep. 2024 |
Testing a NoSQL Injection Vulnerability |
r-svBCpPz5c |
Sep. 2024 |
Fix Cross Site Scripting Vulnerability with Snyk |
T2KySR2aan8 |
Sep. 2024 |
Stealing Data via Cross Site Scripting |
komOds9hSwY |
Sep. 2024 |
Cursor AI: The VS Code Competitor |
59quOZDF2Lk |
Oct. 2024 |
The Reason Cursor AI Isn't an Extension |
GtvdnQeUHWI |
Oct. 2024 |
Migrating from VS Code to Cursor AI |
ABLHgcxiorw |
Oct. 2024 |
I Was Smarter than the AI |
wcMkBm-GoQc |
Oct. 2024 |
Using Cursor AI to Fix Errors |
hCuMH8EJDew |
Oct. 2024 |
Using Cursor AI to Build a Secure App |
RV6NZZnFFnU |
Oct. 2024 |
Exploiting Vulnerabilities in Cursor AI Code |
Ce2QLFTjWB4 |
Oct. 2024 |
Cursor AI is Helpful with Exploit Education |
aiXplhoQIrI |
Oct. 2024 |
Learning About Security with Cursor AI and Snyk |
vDrJssBDmCo |
Oct. 2024 |
Finding Exploits with Cursor AI |
MBH8y6BSVYE |
Oct. 2024 |
Cross site Scripting XSS Payload Exploits from Cursor AI |
C3GPa0fctMM |
Oct. 2024 |
Testing Exploits from Cursor AI |
jjTPAo3_K-A |