Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Mostrando 81 - 100 de 314 artículos

Helping Gemini Code Assist to Generate Secure Code

Learn how Snyk's MCP server integrates with Gemini Code Assist to automatically scan and fix security vulnerabilities in AI-generated code, ensuring secure development workflows.

9 MCP Servers for Computer-Aided Drafting (CAD) with AI

Explore 9 Model Context Protocol (MCP) servers transforming Computer-Aided Drafting (CAD) with AI. Automate tasks from sketching to assembly modeling across platforms like AutoCAD, Fusion 360, FreeCAD, and Onshape, and learn how to secure your AI-generated designs.

From Development to Deployment: Building an AI-Driven Secure Web Application Ecosystem

Discover the critical challenges of securing modern web applications, from handling complex APIs to combating advanced, AI-driven threats. Learn how to integrate robust, AI-powered security measures effectively at every stage of the development lifecycle.

Modern Technology Environments Demand Modern Application Security Testing

Legacy security testing tools fail to protect modern applications. Learn the hallmarks of a modern, developer-first DAST solution built for today's complex CI/CD pipelines and APIs.

How Cryptojacking Works and How to Defend Against It

Learn what cryptojacking is, how it works, and how to detect and prevent hidden crypto mining attacks across code, cloud, and container environments.

Guardians of the Gateway: How API Security Testing Tools Protect Your Data

Explore how API security testing tools enhance digital defenses, ensuring robust protection and operational continuity.

Between You and the Data: Defending Against Man-in-the-Middle Attacks

Learn how Man in the Middle (MITM) attacks work, how to detect them, and how to prevent interception risks across your code, infrastructure, and apps.

The Essential Guide to AI Bills of Materials (AIBOMs)

This guide is your one-stop shop on AI Bill of Materials (AIBOMs). Learn how to build an inventory of your AI model.

Beyond the Basics: Advanced Insights into XSS Vulnerabilities

Explore XSS attacks and empower your development teams with AI-powered prevention strategies. Uncover their mechanisms and learn how to secure web applications and protect user data.

Security That Thinks: How AI Is Rewriting the Rules of SecOp

Discover how AI SecOps enhances detection, reduces noise, and automates response, plus steps to implement it with the right models, data, and tools.

Scaling LLMs Securely Starts with the Right Ops Framework

Learn what LLMOps is, how it differs from MLOps, and what it takes to build, scale, and secure large language models in real-world production.

Building Interactive MCP Servers Experience on the Terminal using Python Fast Agent AI Framework

Learn to create AI-enabled chat experiences on the terminal using Fast Agent, a Python open-source framework. Integrate MCP servers for features like file system access and URL fetching to enhance your agentic workflows.

AWS AI Security: How to Identify, Prevent & Mitigate AI-Specific Risks

Learn how to secure AI workloads on AWS by identifying, addressing & mitigating model risks, data leakage, prompt injection, and compliance across the full AI lifecycle.

High velocity, low risk: How tech leaders can secure innovation without slowing down

Struggling with security in high-speed development? Learn how to embed developer-first security into your SDLC. Empower your team to secure innovation and reduce business risk without sacrificing velocity.

Building a Security News Summary with CrewAI AI Agent

Learn how to create an AI agent using the CrewAI framework to curate and summarize critical security vulnerabilities from the Snyk database. Automate your security news feed and stay informed effortlessly.

Data Quality in AI: Challenges, Implementation, Audits, & Best Practices

Discover how to improve AI performance with better data quality, including key metrics, tools, best practices, and common pitfalls to avoid.

AI for Offensive Security: How Smart Offense is Changing the Face of Cybersecurity

Explore how AI is revolutionizing offensive security, empowering red teams with advanced tools for reconnaissance, exploit generation, and social engineering.

license compliance

SOC 2 Without the Headaches: A Developer-Friendly Guide to Attestation

Learn how to simplify SOC 2 compliance with integrated security testing, streamlined audits, and workflows that support fast, secure development.

Can Machine Learning Find Path Traversal Vulnerabilities in Go? Snyk Code Can!

Explore how Snyk’s machine learning-powered security tools tackle path traversal vulnerabilities in Golang code. Learn how to secure your Go applications and challenge yourself to detect and exploit vulnerabilities like a pro!

Leveraging Generative AI with DevSecOps for Enhanced Security

Learn about the top advantages of secure AI coding tools for stronger DevSecOps practices with Snyk.