Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Showing 1 - 20 of 323 articles

What Is Threat Modeling and Why Is It Essential for DevSecOps?

Learn how continuous threat modeling strengthens DevSecOps by identifying, prioritizing, and mitigating risks across evolving code, data, and pipelines.

Secure at Inception: The New Imperative for AI-Driven Development

Traditional security is too slow for AI-driven development. Learn about "Secure at Inception," a new approach that proactively prevents vulnerabilities in AI-generated code and clears backlogs with AI-Accelerated Remediation.

Patching Detected Vulnerabilities with Factory AI and Snyk Studio

Factory AI Droids and Snyk MCP streamline vulnerability patching. Learn how specialized AI agents integrate for automated security fixes and DevSecOps.

Defending Against Glassworm: The Invisible Malware That's Rewriting Supply Chain Security

Defend against Glassworm, the invisible malware rewriting supply chain security. Learn how anti-trojan-source detects and prevents these Unicode attacks, protecting your VS Code extensions and credentials.

What Users Want When Vibe Coding

Vibe coding promises speed but delivers tech debt & security risks. Developers need guardrails, not just velocity, to avoid production disasters, cost explosions, and skill erosion. Learn what users truly want for AI-assisted coding.

What Is Threat Modeling and Why Is It Essential for DevSecOps?

Learn how continuous threat modeling strengthens DevSecOps by identifying, prioritizing, and mitigating risks across evolving code, data, and pipelines.

AI in Ethical Hacking: Revolutionizing Cybersecurity Testing

AI in ethical hacking revolutionizes cybersecurity testing. Discover how AI transforms vulnerability assessment, penetration testing, and threat intelligence with cutting-edge tools and methodologies.

Evals for LLMs: Understanding Evaluation Systems for AI Models

Learn how Eval frameworks act like pen-tests for LLMs—helping cybersecurity teams assess resilience to adversarial attacks, ensure accuracy, manage risks, and integrate security into the AI lifecycle.

The Highs and Lows of Vibe Coding

"Vibe coding" with AI builds billion-dollar startups fast, but it also creates massive security risks. With 40% of AI code vulnerable and major data leaks emerging, explore the highs and lows of this trend and the path to securing it.

The Frictionless Developer Security Experience: Securing at the Speed of AI

Traditional security creates friction, slowing developers down. Learn how a frictionless approach embeds fast, AI-powered security and automated fixes into the dev workflow. Empower your teams to build securely without sacrificing development velocity.

From Models to Compound AI Systems: Building the Future of AI

AI systems combine multiple AI models and tools to tackle complex tasks, for enhanced performance, versatility, & reliability.

Let AI Detect and Patch Your Vulnerable Code: Claude Desktop and Snyk MCP Server

Integrate Claude Desktop with Snyk's official MCP Server to enhance security in your development workflow. Learn how to set up, configure, and use Snyk's security scanning tools to detect and patch vulnerabilities, streamlining DevSecOps and securing your code.

Context Engineering: Building Intelligent AI Systems Through Strategic Information Management

Discover how context engineering shapes AI behavior, enhances user experience, and drives intelligent automation.

Introducing open source security runtime monitoring

$800K+ Up for Grabs: 12 AI Hacking Competitions That Could Launch Your Security Career

Survey the best AI security competitions in Q4 2025 and beyond. Discover 12 AI hacking competitions with over $800,000 in prizes, organized by difficulty, to launch your security career.

Preventing Path Traversal Vulnerabilities in MCP Server Function Handlers

Learn how to secure your MCP servers with best practices and Snyk Code's SAST tool to detect and fix security issues before they become a problem.

prioritize the security backlog

Unlocking Digital Health: Mastering Asset Discovery in Healthtech

Explore the vital role of asset discovery in safeguarding Healthtech, ensuring robust security and compliance.

What is the MIT License?

Learn more about the MIT License - one of the simplest open source license agreements - and integrate license compliance into your existing workflows.

Ethical Hacking: Skills & Training

Both technical and non-technical skills are required for ethical hacking, find out what you need to learn, and where to learn it!

Ethical Hacking: Certifications

Ethical hacking certifications are a key part of learning. Find out which certifications are popular and how to prepare for ethical hacking exams.

Cybersecurity audit types explained

Learn the different types of security audits, when you should use each of them, and where to integrate audits into existing security pipelines.