Skip to main content

Blog Archive

Topic
Audience

Showing 145 - 168 of 590 posts

Application Security

Introducing the Snyk App for Compass: A complete view of software component risk

October 5, 2023

Application Security

Snyk Partner Speak video series with HashiCorp

October 4, 2023

AI

10 best practices for securely developing with AI

September 27, 2023

Application Security

Snyk is named a Strong Performer as a first-time entrant in the Forrester Wave™: Static Application Security Testing (SAST) Q3 2023

September 20, 2023

Application Security

Security implications of cross-origin resource sharing (CORS) in Node.js

September 13, 2023

Application Security

How to avoid web cache poisoning attacks

September 11, 2023

AI

Top considerations for addressing risks in the OWASP Top 10 for LLMs

September 7, 2023

Application Security

7 AppSec tips from Snowflake’s Director of Product Security

August 31, 2023

Application Security

How to implement SSL/TLS pinning in Node.js

August 29, 2023

Application Security

Streamline dependency updates with Mergify and Snyk

August 23, 2023

Application Security

Does GitOps enhance application security?

August 21, 2023

optimizing prioritization

Application Security

Introducing Snyk’s new Risk Score for risk-based prioritization

August 17, 2023

AI

What are AI hallucinations and why should developers care?

August 16, 2023

Cloud Security

Manage security issues in Jira with Snyk Security in Jira Cloud

August 9, 2023

Application Security

.NET developers alert: Moq NuGET package exfiltrates user emails from git

August 9, 2023

Application Security

5 tips to supercharge app security from code to cloud

August 8, 2023

Application Security

Limitations of a single AI model

August 7, 2023

Application Security

New SEC cybersecurity rules put more onus on the CISO, not so much on directors

August 3, 2023

Application Security

Discussions on improving security through chaos engineering

August 3, 2023

Application Security

How Snyk can help secure supply chains per "A Guide to Implementing the Software Bill of Materials (SBOM) for Software Management"’ by Japan's METI

August 1, 2023

Application Security

How secure is WebAssembly? 5 security concerns unique to WebAssembly

July 28, 2023

Application Security

4 Enterprise-level security best practices

July 20, 2023

Application Security

8 tips for securing your CI/CD pipeline with Snyk

July 20, 2023

AI

Best practices for using AI in the SDLC

July 19, 2023

Subscribe to our newsletter

Get all latest content from Snyk directly to your mailbox.