Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Showing 41 - 60 of 209 articles

How to Prepare for Tomorrow’s Zero-Day Vulnerabilities Today

Zero-day vulnerabilities are all too common in today’s applications. Learn how to identify and fix zero-day vulnerabilities proactively with a developer-first approach to security.

Understanding SOC 2 Audits: Checklist & Process

A SOC 2 audit can give your organization a competitive advantage. But what does the audit entail? Here’s A 4-step SOC 2 Audit checklist.

Static Application Security Testing (SAST) Scanning

Learn more about the 7 stages of Static Application Security Testing (SAST) scanning, its pros and cons, and how it can help keep your source code secure.

5 Key Learnings on How to Get Started in DevSecOps

During DevSecCon’s recent community call on How to Get Started in DevSecOps, security experts from the DevSecCon community shared actionable advice, practical steps, and insights for navigating this critical field. Here are the top five takeaways from this call.

API Security Testing: How to test your API security

API or application programming interface helps applications communicate with each other. Learn how to keep your API's secure with API security testing.

Top 10 Node.js Security Best Practices

Read about five major Node.js security risks and the top ten best practices you can implement to address them and stay secure while building applications.

Secure Software Development Lifecycle (SSDLC)

Learn more about Secure Software Development Lifecycle (SSDLC), and how to integrate security at every stage of the SDLC to enhance software integrity and protect against vulnerabilities.

Apache License 2.0 Explained

Learn more about the Apache License 2.0 uses, benefits, and requirements for use in your open source projects while maintaining compliance.

What is the MIT License?

Learn more about the MIT License - one of the simplest open source license agreements - and integrate license compliance into your existing workflows.

Static code analysis explained & best tools

Learn how to use the best Static Code Analysis tools to prevent security incidents that often slip through the cracks in production.

Software Development Life Cycle (SDLC): Phases and Methodologies

Learn more about SDLC (Software Development Life Cycle) phases and methodologies that define the entire software development procedure step-by-step.

What is CI/CD? CI/CD pipeline and tools explained

Learn more about CI/CD continuous integration and continuous delivery, CI/CD pipeline, and framework. CI/CD as the foundation for DevSecOps.

Vulnerability scanner: what is it and how does it work?

Learn more about vulnerability scanners, including the top 3 types and categories, how they work, and how to choose the right vulnerability scanning tool.

Vulnerability Assessment: Tools and Steps to Improve Security Posture

Learn more about vulnerability assessment to stay secure and efficiently evaluate the state of security weaknesses and flaws in your systems and environments.

Complete Guide to Application Security: Tools & Best Practice

Application Security is defined as the actions taken during the development lifecycle of an application to reduce vulnerabilities, improve security, and protect sensitive data.

9 Password Storage Best Practices

Secure password storage is a challenge for every organization — whether a small startup or a major corporation.

Implementing Shift Left Security Effectively

Learn more about shift left security, the dangers of keeping security right, and some best practices and tools for getting started.

Agile SDLC: Benefits and implementation

The Agile methodology relies on short, targeted tasks and frequent status check-ins with decision-makers to accelerate software projects

Understanding Security Automation

Learn more about security automation, a practical necessity for any successful software operation. Identify incoming cyberthreats and prioritize remediation actions.

Software Security Explained

Learn more about software security, proper tools and processes to identify and remediate software bugs. Connection to application security, secure SDLC and more.