Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Anzeige: 41 - 60 von 209 artikel

How to Prepare for Tomorrow’s Zero-Day Vulnerabilities Today

Zero-day vulnerabilities are all too common in today’s applications. Learn how to identify and fix zero-day vulnerabilities proactively with a developer-first approach to security.

Understanding SOC 2 Audits: Checklist & Process

A SOC 2 audit can give your organization a competitive advantage. But what does the audit entail? Here’s A 4-step SOC 2 Audit checklist.

Static Application Security Testing (SAST)

In diesem Artikel erfahren Sie alles über statische Anwendungssicherheitstests (Static Application Security Testing, SAST), ihre Vor- und Nachteile und den Schutz Ihres Quellcodes.

5 Key Learnings on How to Get Started in DevSecOps

During DevSecCon’s recent community call on How to Get Started in DevSecOps, security experts from the DevSecCon community shared actionable advice, practical steps, and insights for navigating this critical field. Here are the top five takeaways from this call.

API Security Testing: How to test your API security

API or application programming interface helps applications communicate with each other. Learn how to keep your API's secure with API security testing.

Top 10 Node.js Security Best Practices

Read about five major Node.js security risks and the top ten best practices you can implement to address them and stay secure while building applications.

Der Secure Software Development Lifecycle (SSDLC)

Learn more about Secure Software Development Lifecycle (SSDLC), and how to integrate security at every stage of the SDLC to enhance software integrity and protect against vulnerabilities.

Apache License 2.0 Explained

Learn more about the Apache License 2.0 uses, benefits, and requirements for use in your open source projects while maintaining compliance.

Worum handelt es sich bei der MIT-Lizenz?

Erfahren Sie mehr über die MIT-Lizenz - eine der unkompliziertesten Open-Source-Lizenzvereinbarungen - und integrieren Sie die Lizenzeinhaltung in Ihre vorhandenen Abläufe.

Kurzüberblick zur statischen Codeanalyse

Hier erfahren Sie, wie Sie mittels statischer Codeanalyse die Hälfte aller Sicherheitsprobleme vermeiden, die ansonsten in die Produktion gelangen würden.

Software Development Life Cycle (SDLC): Phases and Methodologies

Learn more about SDLC (Software Development Life Cycle) phases and methodologies that define the entire software development procedure step-by-step.

What is CI/CD? CI/CD pipeline and tools explained

Learn more about CI/CD continuous integration and continuous delivery, CI/CD pipeline, and framework. CI/CD as the foundation for DevSecOps.

Was sind Schwachstellen-Scanner und wie funktionieren sie?

Hier erfahren Sie alles, was Sie 2023 über Schwachstellen-Scanner, die verschiedenen Typen, ihre Funktionsweise und die Auswahl des richtigen Angebots wissen sollten.

Vulnerability Assessment: Tools and Steps to Improve Security Posture

Learn more about vulnerability assessment to stay secure and efficiently evaluate the state of security weaknesses and flaws in your systems and environments.

Anwendungssicherheit: Der Guide

Jede Aktion zur Beseitigung von Schwachstellen, alle Maßnahmen zur Stärkung des Security-Status und zum Schutz sensibler Daten, in sämtlichen Phasen des App-Lifecycle: Das ist Anwendungssicherheit.

9 Password Storage Best Practices

Secure password storage is a challenge for every organization — whether a small startup or a major corporation.

Implementing Shift Left Security Effectively

Learn more about shift left security, the dangers of keeping security right, and some best practices and tools for getting started.

Agile SDLC: Benefits and implementation

The Agile methodology relies on short, targeted tasks and frequent status check-ins with decision-makers to accelerate software projects

Understanding Security Automation

Learn more about security automation, a practical necessity for any successful software operation. Identify incoming cyberthreats and prioritize remediation actions.

Software Security Explained

Learn more about software security, proper tools and processes to identify and remediate software bugs. Connection to application security, secure SDLC and more.