Skip to main content

Ressourcen

Analyst report

Snyk named a Leader in 2025 Gartner® Magic Quadrant™ for AST

Jetzt lesen

Artikel

Fixing erkannter Schwachstellen mit Factory AI und Snyk Studio

Jetzt lesen

Video

Der Vormarsch agentischer KI

View now

White paper

Secure Every Layer, Empower Every Team: The Unified Snyk Platform

Jetzt lesen
Typ
Thema

Anzeige 289 - 312 von 632 ressourcen

Article

The Risks and Impact of Data Leakage: Data Leakage Causes and Prevention

Knowing the risks and impact of data leakage can help protect your organization. Learn more about data leakage, its causes, and how to prevent it here.

Video

How to Build a Discord Bot in 16 Minutes (Part 2)

Video

A Simple Guide to Building a Discord Bot! (Part 3)

Video

A Simple Guide to Building a Discord Bot! (Part 4)

Video

Everything you NEED to know about DevSecOps in 5 Minutes

Article

What is LLMjacking? How AI Attacks Exploit Stolen Cloud Credentials

Attackers can exploit cloud LLMs through stolen credentials. Learn more about LLMjacking and how to protect your organization here.

Video

The Ultimate Guide to Building and Publishing Modern npm Packages (PART 1)

Video

How to Build a Production Ready npm Package (PART 2)

Video

NPM Security & Versioning: How to Keep Your Packages SAFE!

Video

Vibe Coding with Claude Code (Claude Agentic AI Tool)

Video

Can Vibe Coding Build Secure Apps? (GitHub Copilot Agent Mode)

Fehler beim Rendern ComposeContentTags

Article

What is MCP in AI? Everything you wanted to ask

MCP (Model Context Protocol) is Anthropic’s specification for how LLMs (large language models) would communicate, share data, and leverage external resources beyond the model’s data.

Video

The CRITICAL Next.js Vulnerability you NEED to be aware of...

Video

Security Terms You Need to Know | XSS, CSRF, VPN, Malware, CVE

Video

Exploiting Vulnerabilities in Cursor AI Code

Article

What is Cloud Security Architecture? Principles, Framework, and Architecture Assessment

Protect your organization in the cloud with a robust cloud security architecture. Learn more about cloud security architecture and its importance.

Podcast

Authentication, Authorization, And The Future Of AI Security With Alex Salazar

Episode 161

Article

AI Data Security: Risks, Frameworks, and Best Practices

Learn about the top data security risks of AI, along with frameworks for understanding protection and best practices for choosing AI tools.

eBook

Beyond the Vulnerability Backlog: Building Risk-Based AppSec Programs

Article

7 Surprising Roadblocks on the Path to DevSecOps Maturity

Understand how your organization's DevSecOps maturity compares to industry benchmarks. Learn about common challenges in risk reduction, security fatigue, and developer adoption. Get the insights.

Video

Webinar: Breaking Down Financial Services' Biggest AppSec Hurdles

Explore the biggest AppSec challenges in financial services and discover practical strategies to streamline compliance, secure development at scale, and bridge the gap between security and dev teams in this on-demand webinar.

eBook

Optimizing AppSec in the technology sector: Strategies & Challenges

Article

Preventing Broken Access Control in Python Flask Applications

If you code your Python Flask applications for modern SaaS-like business applications, it is surely a vulnerability. Learn how to prevent broken access control in Python Flask Applications.