Want to impress your boss with your security knowledge? Stay up to date by learning why application security is important and how you can improve.
Coming out of a busy week at RSA 2020, one of the best aspects of attending was the chance to meet with so many passionate customers and fans of Snyk and listen to their feedback. What was clear this year was a growing excitement around Snyk’s accomplishments — a palpable sense of momentum for our […]
We’re pleased to announce improved support for Python in Snyk Open Source, allowing developers to remediate vulnerabilities in dependencies with the help of automated fix pull requests! The Python Packaging Index (PyPI) had more than 14 billion downloads during 2018, a staggering number by any account (because of a mid-year error in the PyPI statistics […]
On February 7th, 2020 I received an anonymous tip through the “leak inbox” of the Israeli CyberCyber podcast.
Keeping code safe in the era of cybercrime is no small feat, and many age-old tactics remain just as effective today as they were 20 years ago. When it comes to web hacking, modern browsers have made significant strides in security. Things like a content security policy can prevent many of the oldest tricks that […]
We’re excited to share that you can now scan container images stored in JFrog Artifactory with Snyk Container. Snyk Container helps you find and fix vulnerabilities in your container images and integrates with Artifactory as a container registry to enable you to import your projects and monitor your containers for vulnerabilities, as is fully described […]
Local storage has caught the attention of developers as a lightweight solution for data storage that doesn’t involve databases or even the server. That’s neat, but is it always a good idea to use it? Here are a few thoughts from the folks at Snyk.
Back in 2017, the Atlanta-based credit monitoring company Equifax was hacked. Equifax had been using an outdated version of the Java Apache Struts library in their system, making it possible to infiltrate their system through a known vulnerability. As a result of this breach, the company exposed the personal details of 143 million Americans. Recently […]
Azure Pipelines allows users to focus more time on writing their applications by making it easy to automate their builds, tests, and deployments. Specifically, Tasks for Azure Pipelines enables users to customize and automate an Azure Pipelines CI/CD workflow with a group of ready-to-use tasks that can be inserted into pipelines from the Azure Pipelines […]
It’s an exciting time for our team with the recent launch of Snyk Container and just coming back from KubeCon. The best validation though comes when users and customers find Snyk’s products valuable to their business. Coveo, which uses artificial intelligence technology to personalize millions of digital experiences, started using Snyk for license management last […]
How exploits in the wild translate into greater risk, how we can evaluate that risk, and discuss how to prioritize and quickly handle your vulnerabilities accordingly.