Skip to main content

Ressourcen

White paper

From First Prompt to Final Fix: How Snyk Secures AI-Driven Development

Jetzt lesen

Report

Unifying Control for Agentic AI With Evo By Snyk

Jetzt lesen

Artikel

From SKILL.md to Shell Access in Three Lines of Markdown: Threat Modeling Agent Skills

Jetzt lesen
Typ
Thema

Anzeige 49 - 72 von 357 ressourcen

Article

From Models to Compound AI Systems: Building the Future of AI

AI systems combine multiple AI models and tools to tackle complex tasks, for enhanced performance, versatility, & reliability.

Article

Let AI Detect and Patch Your Vulnerable Code: Claude Desktop and Snyk MCP Server

Integrate Claude Desktop with Snyk's official MCP Server to enhance security in your development workflow. Learn how to set up, configure, and use Snyk's security scanning tools to detect and patch vulnerabilities, streamlining DevSecOps and securing your code.

Article

Context Engineering: Building Intelligent AI Systems Through Strategic Information Management

Discover how context engineering shapes AI behavior, enhances user experience, and drives intelligent automation.

Article

Secure at Inception: Das neue Mandat für KI-gestützte Software-Entwicklung

Klassische Sicherheitsverfahren können mit KI-gestützter Entwicklung nicht Schritt halten. Gefragt ist eine proaktive Methodik, wie Snyk sie mit „Secure at Inception“ bietet. Erfahren Sie, wie Sie damit KI-generierten Code-Schwachstellen vorbeugen und Backlogs durch agiles Fixing mit KI abbauen.

Introducing open source security runtime monitoring
Article

$800K+ Up for Grabs: 12 AI Hacking Competitions That Could Launch Your Security Career

Survey the best AI security competitions in Q4 2025 and beyond. Discover 12 AI hacking competitions with over $800,000 in prizes, organized by difficulty, to launch your security career.

Article

Preventing Path Traversal Vulnerabilities in MCP Server Function Handlers

Learn how to secure your MCP servers with best practices and Snyk Code's SAST tool to detect and fix security issues before they become a problem.

prioritize the security backlog
Article

Unlocking Digital Health: Mastering Asset Discovery in Healthtech

Explore the vital role of asset discovery in safeguarding Healthtech, ensuring robust security and compliance.

Article

Protecting the Heart of Healthcare: Cybersecurity Strategies and Solutions

Explore the essentials of healthcare cybersecurity and learn how to protect sensitive patient data from cyber threats effectively.

Article

Top 5 Tips to Choose the Right DAST Tool

Choosing the right DAST tool is crucial for safeguarding your web apps and APIs from evolving threats, especially with the accelerated pace of AI-powered development. Learn more about the 5 essential factors to consider when selecting a DAST tool.

Article

Navigating the New Frontier: AI Cloud Security Risks and Mitigation Strategies

Discover the top AI cloud security risks & learn proven mitigation strategies. Explore how to implement secure AI cloud infrastructure to protect data, models, and systems effectively with Snyk.

Article

The Hidden Costs of Ignoring API Security

Discover the hidden costs of ignoring API security, from breaches and fines to lost trust and revenue, and learn how a proactive approach can save your business.

Article

From Patient Portals to EHRs: Securing the Healthcare Ecosystem

Explore the vital role of security in healthcare technology, ensuring data protection and regulatory compliance.

Article

What is AI Explainability? Real-World Applications of Explainable AI

Find out more about AI explainability and how Tools like Snyk's AI BOM help organizations understand the explainability landscape of their AI implementations.

Article

Smarter AppSec: How AI is Revolutionizing Web Application Scanning

Explore how AI is revolutionizing web application scanning. Learn to secure modern apps with smarter, developer-first SAST and DAST tools that find and prioritize real threats, helping developers fix vulnerabilities faster.

Article

Slopsquatting: New AI Hallucination Threats and Mitigation Strategies

Discover how slopsquatting is emerging as a serious AI hallucination threat and learn practical mitigation strategies to protect your content and ensure AI accuracy with Snyk.

Article

Generative AI vs. Predictive AI: A Practical Guide for Security Professionals

Get a practical roadmap for implementing Generative and Predictive AI in cybersecurity. This guide provides decision factors, budgets, timelines, and phased plans to help you choose the right AI strategy for your organization's security needs.

Article

Generative AI vs Predictive AI: Understanding the types of AI

Explore Generative vs. Predictive AI in cybersecurity. Learn how one creates new content for simulations while the other forecasts threats. Combine both AI types to build an adaptive defense and stay ahead of modern attacks.

Article

5 Tips for Agentic Coding with Gemini CLI

Unlock secure agentic coding with Gemini CLI. Learn five tips, including using GEMINI.md for project context, integrating Snyk for security scans, and leveraging custom commands to automate your workflow.

Article

AI TRiSM: A Comprehensive Framework for Responsible AI Implementation

Discover what AI TRiSM is, why it matters, and how it ensures trust, risk, and security in artificial intelligence. Learn key strategies to manage AI responsibly.

Article

Package Hallucination: Impacts and Mitigation

Malicious actors can exploit errors in generative AI tools, and packages can hallucinate. Learn how to identify and mitigate package hallucination attacks with Snyk

Article

Transforming Healthtech Security Through Automation

Explore how automation enhances cybersecurity and operational efficiency in Healthtech, ensuring robust data protection.

Article

What Is Prompt Engineering? A Practical Guide for Developers and Teams

Learn what prompt engineering is, how it improves LLM outputs, and the tools and techniques you need to write effective, secure AI prompts.

Article

How To Run Models (LLM) Locally with Docker

Master how to run Large Language Models (LLMs) locally with Docker. This quick-start guide is for developers who want to learn more about the process of setting up models to run locally on their laptop.

Snyk Code prevents Trojan Source attacks
Article

Preventing XXE Attacks: Strategies for Secure XML Processing

Discover how to safeguard your XML processes against XXE vulnerabilities with advanced prevention techniques.