Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Showing 21 - 40 of 309 articles

AI Attacks & Threats: What are they and how do they work?

Discover more about AI cyber-attacks: what they are, how they work, and how to protect your business against them.

From Patient Portals to EHRs: Securing the Healthcare Ecosystem

Explore the vital role of security in healthcare technology, ensuring data protection and regulatory compliance.

What is AI Explainability? Real-World Applications of Explainable AI

Find out more about AI explainability and how Tools like Snyk's AI BOM help organizations understand the explainability landscape of their AI implementations.

Smarter AppSec: How AI is Revolutionizing Web Application Scanning

Explore how AI is revolutionizing web application scanning. Learn to secure modern apps with smarter, developer-first SAST and DAST tools that find and prioritize real threats, helping developers fix vulnerabilities faster.

Slopsquatting: New AI Hallucination Threats and Mitigation Strategies

Discover how slopsquatting is emerging as a serious AI hallucination threat and learn practical mitigation strategies to protect your content and ensure AI accuracy with Snyk.

Generative AI vs. Predictive AI: A Practical Guide for Security Professionals

Get a practical roadmap for implementing Generative and Predictive AI in cybersecurity. This guide provides decision factors, budgets, timelines, and phased plans to help you choose the right AI strategy for your organization's security needs.

Generative AI vs Predictive AI: Understanding the types of AI

Explore Generative vs. Predictive AI in cybersecurity. Learn how one creates new content for simulations while the other forecasts threats. Combine both AI types to build an adaptive defense and stay ahead of modern attacks.

The Rise of API Security: Why It Matters More Than Ever

Discover why API security is essential in the age of AI-driven development. Learn how to manage risk, ensure compliance, and empower developers with real-time, AI-powered defense to safeguard vital data.

5 Tips for Agentic Coding with Gemini CLI

Unlock secure agentic coding with Gemini CLI. Learn five tips, including using GEMINI.md for project context, integrating Snyk for security scans, and leveraging custom commands to automate your workflow.

AI TRiSM: A Comprehensive Framework for Responsible AI Implementation

Discover what AI TRiSM is, why it matters, and how it ensures trust, risk, and security in artificial intelligence. Learn key strategies to manage AI responsibly.

Package Hallucination: Impacts and Mitigation

Malicious actors can exploit errors in generative AI tools, and packages can hallucinate. Learn how to identify and mitigate package hallucination attacks with Snyk

Transforming Healthtech Security Through Automation

Explore how automation enhances cybersecurity and operational efficiency in Healthtech, ensuring robust data protection.

What Is Prompt Engineering? A Practical Guide for Developers and Teams

Learn what prompt engineering is, how it improves LLM outputs, and the tools and techniques you need to write effective, secure AI prompts.

How To Run Models (LLM) Locally with Docker

Master how to run Large Language Models (LLMs) locally with Docker. This quick-start guide is for developers who want to learn more about the process of setting up models to run locally on their laptop.

Unified Security: Protecting Applications with SAST and DAST

Discover how combining SAST and DAST provides full application security, bridging gaps in visibility and ensuring protection from code to runtime vulnerabilities.

Next-Level CI/CD: Embedding Security in Your DevOps Journey

Discover how to integrate robust security into your CI/CD pipeline to safeguard against emerging threats and ensure compliance.

Shadow AI: Unmasking the hidden risks in your Enterprise

Unmask Shadow AI's hidden enterprise risks, from data leaks and compliance woes to security gaps. Learn why it's a threat and how to implement effective governance strategies for safer AI innovation.

AI asset management: Key functions, challenges, and benefits

AI asset management refers to the application of AI and machine learning to the management of financial assets. What are the challenges of AI introduction for the financial industry?

OpenRouter in Python: Use Any LLM with One API Key

Simplify AI development by using OpenRouter to access dozens of LLMs with a single API key in Python. Learn the bare-bones implementation and explore features like model routing, streaming, and vision models, all while building securely with Snyk.

5 Key Learnings on How to Get Started in DevSecOps

During DevSecCon’s recent community call on How to Get Started in DevSecOps, security experts from the DevSecCon community shared actionable advice, practical steps, and insights for navigating this critical field. Here are the top five takeaways from this call.