Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Mostrando 161 - 180 de 362 artículos

Vibe Coding a Node.js File Upload API Results in Security Vulnerability

Explore the productivity promises of AI code generation using ChatGPT to build a Node.js file upload API. As security vulnerabilities easily slip in, Snyk can help developers, regardless of their background, catch and fix these risks, ensuring secure application delivery.

Achieving ISO 27001 Compliance: Key Challenges and Best Practices

Learn how to overcome ISO 27001 challenges and embed security into developer workflows with scalable, audit-ready best practices.

The Rise of Agentic AI and What It Means for Us

Agentic AI is an innovative technology that can make decisions and take action on its own to get things done. But what is the impact of Agentic AI on cybersecurity?

The Importance of Code Quality

Code quality is crucial for building high-quality, secure applications. Learn more about code quality, secure development, and Snyk’s code checker.

How to perform static code analysis

Top tips and workflows to help you get started with static analysis to find and fix vulnerabilities in your applications.

Demystifying Traditional (Symbolic) AI

If deep learning is instinct, Symbolic AI is wisdom. Uncover the power of traditional, rule-based AI, why its explainability is critical for security , and how it creates powerful hybrid systems when combined with machine learning.

How to build Node.js MCP Servers that Expose Data Resources to LLMs

MCPs are famous for exposing Tools that augment Large Language Models (LLMs) with the ability to perform actions and invoke generic functions that MCP Servers can implement, but exposing data resources to LLMs is just as important. In this article, we're building an MCP Server in JavaScript to run with a Node.js runtime and define Resources as part of the MCP Server data points.

The evolving role of the modern CISO

Explore the evolving role and responsibilities of the modern CISO. Learn about growth and responsibilities.

8 AI MCP Servers Speeding Up Content Creator Workflows

Discover 8 powerful MCP servers that revolutionize content creation workflows. From video generation to SEO optimization, these AI-powered tools streamline production, boost creativity, and unlock new possibilities for creators.

10 MCP Servers for Entrepreneurs Using AI

Uncover ten MCP servers specifically built to support entrepreneurial functions, covering everything from e-commerce and payments to project management and customer communications.

What You Need to Know About Agent2Agent Protocol

Discover how Google's new Agent2Agent protocol is set to solve AI interoperability and how it enables AI agents to collaborate across enterprise environments, breaking down silos, reducing vendor lock-in, and accelerating automation.

Understanding the AI Bill of Rights: U.S. Framework for Ethical AI | Principles, Compliance, and Key Takeaways

Learn what the AI Bill of Rights is, why it matters, and how to align with its five core principles to build safer, fairer, and more accountable AI.

AI Security Guardrails with Snyk CLI MCP Server

Secure AI-generated code. Snyk CLI MCP Server integrates security into AI coding assistants via MCP for real-time scanning. Keep GenAI speed, add Snyk safety.

StarChat

Discover StarChat, a uniquely tailored internal AI assistant designed to streamline the process of writing StarLang code.

From Vision to Trust: How to Launch an AI Governance Program

Unlock safe AI innovation! Learn how Snyk built its AI governance program from vision to execution, ensuring trust, managing risk, and empowering teams to build securely and responsibly.

Descripción general de DevSecOps

DevSecOps hace referencia a la integración de prácticas de seguridad en un modelo de entrega de software de DevOps. Este enfoque se establece sobre la base de una cultura donde el desarrollo y las operaciones se realizan mediante procesos y herramientas que permiten compartir las responsabilidades para entregar software seguro.

5 Best Practices for Building MCP Servers

Building MCP Servers has become a mainstream gateway to externalize product capabilities to AI applications and AI-driven workflows. Here are 5 best practices for building MCP Servers.

Understanding Prompt Injection: Techniques, Challenges, and Risks

A prompt injection attack is a GenAI security threat where an attacker deliberately crafts and inputs deceptive text into a large language model (LLM) to manipulate its outputs.

From Slack Threads to Structured Knowledge: Implementing RAG at Snyk

Snyk converts Slack conversations into structured knowledge using RAG. Learn how focusing on Q&A and Gemini API extracts valuable insights for a smarter internal knowledge base.

The Role and Impact of AI in Endpoint Security

Discover AI's transformative impact on endpoint security. Learn how AI enhances threat detection, incident response, and tools like EDR/XDR for robust cybersecurity in the evolving threat landscape.