Skip to main content

Ressourcen

White paper

5 Common AppSec Challenges in FinServ

Jetzt lesen

Ebook

5 Critical Capabilities for Progressing Your DevSecOps Program

Jetzt lesen

Ebook

Optimizing AppSec in the technology sector: Strategies & Challenges

Jetzt lesen
Typ
Thema

Anzeige 49 - 60 von 293 ressourcen

Article

Getting Started with Capture the Flag

If you're new to CTFs or looking to sharpen your skills, understanding how they work is key to success. This article breaks down the importance of CTFs in cybersecurity—how they help you develop critical security skills, understand real-world vulnerabilities, and improve your ability to defend systems effectively.

Article

How to Prepare for Tomorrow’s Zero-Day Vulnerabilities Today

Zero-day vulnerabilities are all too common in today’s applications. Learn how to identify and fix zero-day vulnerabilities proactively with a developer-first approach to security.

Article

How to Install Python on macOS

Learn how to install Python on macOS step by step. This easy guide covers downloading, installing, and setting up Python on your Mac for beginners and developers.

Article

5 Key Learnings on How to Get Started in DevSecOps

During DevSecCon’s recent community call on How to Get Started in DevSecOps, security experts from the DevSecCon community shared actionable advice, practical steps, and insights for navigating this critical field. Here are the top five takeaways from this call.

Article

Static Application Security Testing (SAST)

In diesem Artikel erfahren Sie alles über statische Anwendungssicherheitstests (Static Application Security Testing, SAST), ihre Vor- und Nachteile und den Schutz Ihres Quellcodes.

Article

Malware in LLM Python Package Supply Chains

The gptplus and claudeai-eng supply chain attack represents a sophisticated malware campaign that remained active and undetected on PyPI for an extended period. These malicious packages posed as legitimate tools for interacting with popular AI language models (ChatGPT and Claude) while secretly executing data exfiltration and system compromise operations.

Article

Understanding SOC 2 Audits: Checklist & Process

A SOC 2 audit can give your organization a competitive advantage. But what does the audit entail? Here’s A 4-step SOC 2 Audit checklist.

Article

Risk-Based Vulnerability Management (RBVM): What is it & how to implement

Risk-based vulnerability management (RBVM) is a relatively new AppSec practice that empowers organizations to see their risk in context and prioritize the most critical fixes.

Article

Tensor Steganography and AI Cybersecurity

Tensor steganography exploits two key characteristics of deep learning models: the massive number of parameters (weights) in neural networks and the inherent imprecision of floating-point numbers. Learn about this novel technique that combines traditional steganography principles with deep-learning model structures.

Cheat Sheet

What You Need to Know About ISO 27001

eBook

Developer security best practices in a fast growing technology company

Secure your software development lifecycle with AI-powered remediation, risk-based prioritization, and CI/CD security. Discover how Snyk helps tech teams build fast while staying secure.

Cheat Sheet

What You Need to Know About OWASP