Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Showing 1 - 20 of 189 articles

AI Data Security: Risks, Frameworks, and Best Practices

Learn about the top data security risks of AI, along with frameworks for understanding protection and best practices for choosing AI tools.

AI Glossary

Snyk’s glossary for learning about AI, including its science, common AI use cases, and how it relates to cybersecurity.

7 Surprising Roadblocks on the Path to DevSecOps Maturity

Understand how your organization's DevSecOps maturity compares to industry benchmarks. Learn about common challenges in risk reduction, security fatigue, and developer adoption. Get the insights.

The Importance of Policy as Code in Your Compliance Strategy 

Learn why compliance as code should become a key part of your overall security strategy, enabling security at scale based on automated Policy as Code rules.

Preventing Broken Access Control in Python Flask Applications

If you code your Python Flask applications for modern SaaS-like business applications, it is surely a vulnerability. Learn how to prevent broken access control in Python Flask Applications.

What is ASPM? (Application Security Posture Management)

Application security posture management (ASPM) overview - Learn how to strengthen app security using holistic visibility, automation & robust security measures.

Guide to Software Composition Analysis: 5 key challenges of SCA

The code driving many—in fact, most—applications today includes open source components.

Cloud Compliance Explained

What is cloud compliance, and how do you bring your cloud environment into compliance with different standards and controls whilst following best practices?

White box testing basics: Identifying security risks early in the SDLC

This article will help you to understand what white box testing is, the pros and cons, and techniques for white box testing.

Benefits of security analytics

Learn more about security analytics, a proactive security approach that detects advanced security threats with artificial intelligence and machine learning.

Software Security Explained

Learn more about software security, proper tools and processes to identify and remediate software bugs. Connection to application security, secure SDLC and more.

Understanding Security Automation

Learn more about security automation, a practical necessity for any successful software operation. Identify incoming cyberthreats and prioritize remediation actions.

Agile SDLC: Benefits and implementation

The Agile methodology relies on short, targeted tasks and frequent status check-ins with decision-makers to accelerate software projects

Implementing Shift Left Security Effectively

Learn more about shift left security, the dangers of keeping security right, and some best practices and tools for getting started.

9 Password Storage Best Practices

Secure password storage is a challenge for every organization — whether a small startup or a major corporation.

Complete Guide to Application Security: Tools & Best Practice

Application Security is defined as the actions taken during the development lifecycle of an application to reduce vulnerabilities, improve security, and protect sensitive data.

Vulnerability Assessment: Tools and Steps to Improve Security Posture

Learn more about vulnerability assessment to stay secure and efficiently evaluate the state of security weaknesses and flaws in your systems and environments.

Vulnerability scanner: what is it and how does it work?

Learn more about vulnerability scanners, including the top 3 types and categories, how they work, and how to choose the right vulnerability scanning tool.

What is CI/CD? CI/CD pipeline and tools explained

Learn more about CI/CD continuous integration and continuous delivery, CI/CD pipeline, and framework. CI/CD as the foundation for DevSecOps.

Software Development Life Cycle (SDLC): Phases and Methodologies

Learn more about SDLC (Software Development Life Cycle) phases and methodologies that define the entire software development procedure step-by-step.