Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Showing 241 - 260 of 341 articles

Secure Software Development Lifecycle (SSDLC)

Learn more about Secure Software Development Lifecycle (SSDLC), and how to integrate security at every stage of the SDLC to enhance software integrity and protect against vulnerabilities.

JavaScript security

Learn more about JavaScript Security. Find out what is the best defense against common JavaScript security vulnerabilities.

API Security Testing: How to test your API security

API or application programming interface helps applications communicate with each other. Learn how to keep your API's secure with API security testing.

How to Detect and Prevent Configuration Drift

Learn about methods of detection and prevention that are effective in managing configuration drift.

How to find security vulnerabilities in source code

Learn tactical guidance for discovering and remediating source code vulnerabilities and the benefits of a SAST tool like Snyk Code.

Working With AWS Security Tools - Snyk

Learn how AWS’s built-in account security tools and Snyk’s application and service security tools work together to secure your entire AWS ecosystem.

5 DevOps pipeline best practices

Learn more about DevOps pipeline best practices including continuous integration, continuous delivery (CI/CD), automation, and observability.

What is Data Security Posture Management (DSPM)?

Data security posture management (DSPM) is the practice of using automation and management tools to secure data at cloud scale. Learn why your company needs it.

Best Practices for Cybersecurity Audits

Is your business ready for its next cybersecurity audit? Discover the benefits and challenges of the auditing process, plus tips to help you prepare.

Mobile Application Security Testing (MAST) - Challenges & Tools

Mobile application security testing (MAST) is a vital element of mobile app security. Here’s how it works, plus tips for MAST tools and best practices.

Android Application Security - Securing Android Apps for Developers

Risk-Based Vulnerability Management (RBVM): What is it & how to implement

Risk-based vulnerability management (RBVM) is a relatively new AppSec practice that empowers organizations to see their risk in context and prioritize the most critical fixes.

How to secure SaaS applications

Learn how to secure SaaS applications as a vendor and which SaaS security best practices to implement across your organization as a user.

Security posture: Assessing & improving security at scale

Learn what security posture is, how to manage it, its role in compliance/supply chain, and how to measure security posture with 4 key metrics.

iOS Application Security - Securing Swift Apps for Developers

Securing Source Code in Repositories is Essential: How To Get Started

Keeping your source code secure helps safeguard it against data breaches, maintains user trust, and helps to prevent potential financial losses or reputational damage; learn why it's important and how to get started.

How To Measure Application Security: Metrics, Tools & KPIs

How do you know if your application security program is effective? Learn the key metrics to track for your application and tools that can help.

External Attack Surface Management (EASM): Managing Digital Risk

External attack surface management is key to cybersecurity. Discover what EASM is, when you need it, solutions like Snyk, and steps to implement it effectively.

Application Risk Management

Application risk management is critical but increasingly complex. This guide outlines the steps of application risk management and valuable tools for developers.

Code scanning 101

Learn how code scanning works, why it’s essential to software supply chain security, which tools to use, and how to follow code scanning best practices.