Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Mostrando 41 - 60 de 314 artículos

Next-Level CI/CD: Embedding Security in Your DevOps Journey

Discover how to integrate robust security into your CI/CD pipeline to safeguard against emerging threats and ensure compliance.

Shadow AI: Unmasking the hidden risks in your Enterprise

Unmask Shadow AI's hidden enterprise risks, from data leaks and compliance woes to security gaps. Learn why it's a threat and how to implement effective governance strategies for safer AI innovation.

AI asset management: Key functions, challenges, and benefits

AI asset management refers to the application of AI and machine learning to the management of financial assets. What are the challenges of AI introduction for the financial industry?

OpenRouter in Python: Use Any LLM with One API Key

Simplify AI development by using OpenRouter to access dozens of LLMs with a single API key in Python. Learn the bare-bones implementation and explore features like model routing, streaming, and vision models, all while building securely with Snyk.

5 Key Learnings on How to Get Started in DevSecOps

During DevSecCon’s recent community call on How to Get Started in DevSecOps, security experts from the DevSecCon community shared actionable advice, practical steps, and insights for navigating this critical field. Here are the top five takeaways from this call.

5 Best MCP Servers for Developers

Here are Snyk’s Top 5 recommendations for MCP Servers that developers will get the most value from.

11 Data Science MCP Servers for Sourcing, Analyzing, and Visualizing Data

Discover eleven MCP servers specifically engineered for data science workflows, spanning everything from dataset discovery and exploration to sophisticated mathematical visualizations.

Snyk Code prevents Trojan Source attacks

Preventing XXE Attacks: Strategies for Secure XML Processing

Discover how to safeguard your XML processes against XXE vulnerabilities with advanced prevention techniques.

AI Inference in Cybersecurity: Real-Time Threat Detection at Scale

Discover what AI inference is, how it powers real-time decision-making in machine learning models, and why it's crucial for edge computing and business innovation.

DAST and Compliance: Bridging the Gap Between Regulation and Innovation

Discover how DAST bridges the gap between compliance and innovation, empowering teams to meet regulatory standards while accelerating secure development.

AI Model Theft: Understanding the Threat Landscape and Protective Measures

Model theft attacks occur when an attacker gains access to the model's parameters. Find out how to prevent and mitigate LLM threats and security risks.

Dark AI: Exploring the Shadows of Artificial Intelligence

Explore how dark AI is transforming cybercrime, the threats it poses to data privacy, and how proactive security can help organizations stay ahead.

Securing the software supply chain with AI

Discover how AI is both a threat and a solution for securing software supply chains. Learn about emerging AI attack vectors, AI-powered defenses, AIBOMs, and how Snyk can help.

security incident management

API Security in Telemedicine: Protecting Sensitive Patient Data

Explore how secure APIs are essential for telemedicine, addressing data privacy, compliance, and protecting sensitive patient information across platforms.

How to Dockerize MCP Servers in JavaScript

Learn how to Dockerize your JavaScript MCP server. This guide covers creating a Dockerfile and setting up GitHub Actions for automated building, publishing, and signing.

prioritize the security backlog

Beyond Predictability: Securing Non-deterministic Generative AI in Today's Cyber Landscape

Explore how to secure non-deterministic generative AI systems in an evolving cyber threat landscape. Learn key risks, real-world implications, and expert strategies for resilient AI deployment.

Balancing Efficiency and Security: API Protection in E-commerce

Learn essential strategies to secure retail APIs, protect customer data, and enhance e-commerce trust by mitigating API vulnerabilities and risks.

What is LLMjacking? How AI Attacks Exploit Stolen Cloud Credentials

Attackers can exploit cloud LLMs through stolen credentials. Learn more about LLMjacking and how to protect your organization here.

AI Risk Assessment Strategies, Best Practices and Tools

As AI adoption accelerates, so do the risks. This article explores crucial AI risk assessment strategies, from identifying threats to implementing best practices and leveraging essential tools for secure and responsible AI.

Understanding AISPM: Securing the AI Lifecycle

Learn what AISPM is, why it matters, and how it helps organizations secure AI systems, reduce risk, and support safe, scalable innovation.