Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Affichage 41 - 60 sur 209 articles

How to Prepare for Tomorrow’s Zero-Day Vulnerabilities Today

Zero-day vulnerabilities are all too common in today’s applications. Learn how to identify and fix zero-day vulnerabilities proactively with a developer-first approach to security.

Understanding SOC 2 Audits: Checklist & Process

A SOC 2 audit can give your organization a competitive advantage. But what does the audit entail? Here’s A 4-step SOC 2 Audit checklist.

Tests de sécurité des applications statiques (SAST)

Découvrez les tests de sécurité des applications statiques (SAST), leurs avantages et leurs inconvénients, et leur intérêt dans la sécurisation de votre code source.

5 Key Learnings on How to Get Started in DevSecOps

During DevSecCon’s recent community call on How to Get Started in DevSecOps, security experts from the DevSecCon community shared actionable advice, practical steps, and insights for navigating this critical field. Here are the top five takeaways from this call.

API Security Testing: How to test your API security

API or application programming interface helps applications communicate with each other. Learn how to keep your API's secure with API security testing.

Top 10 Node.js Security Best Practices

Read about five major Node.js security risks and the top ten best practices you can implement to address them and stay secure while building applications.

Cycle de développement logiciel sécurisé (SDLC sécurisé)

Learn more about Secure Software Development Lifecycle (SSDLC), and how to integrate security at every stage of the SDLC to enhance software integrity and protect against vulnerabilities.

Apache License 2.0 Explained

Learn more about the Apache License 2.0 uses, benefits, and requirements for use in your open source projects while maintaining compliance.

Qu’est-ce qu’une licence MIT ?

Apprenez-en davantage sur la licence MIT (l’un des accords de licence open source les plus simples) et intégrez la conformité des licences dans vos workflows existants.

Présentation de l’analyse du code statique

Découvrez comment l’analyse du code statique peut vous aider à éviter la moitié des incidents de sécurité qui se retrouvent fréquemment en production.

Software Development Life Cycle (SDLC): Phases and Methodologies

Learn more about SDLC (Software Development Life Cycle) phases and methodologies that define the entire software development procedure step-by-step.

What is CI/CD? CI/CD pipeline and tools explained

Learn more about CI/CD continuous integration and continuous delivery, CI/CD pipeline, and framework. CI/CD as the foundation for DevSecOps.

Outil d’analyse des vulnérabilités : présentation et fonctionnement

Découvrez les outils d’analyse des vulnérabilités : types, catégories, fonctionnement et méthode pour choisir le meilleur en 2023.

Vulnerability Assessment: Tools and Steps to Improve Security Posture

Learn more about vulnerability assessment to stay secure and efficiently evaluate the state of security weaknesses and flaws in your systems and environments.

Guide complet de la sécurité des applications

La sécurité des applications est l’ensemble des mesures prises pendant le cycle de vie du développement d’une application pour réduire les vulnérabilités, améliorer la sécurité et protéger les données sensibles.

9 Password Storage Best Practices

Secure password storage is a challenge for every organization — whether a small startup or a major corporation.

Implementing Shift Left Security Effectively

Learn more about shift left security, the dangers of keeping security right, and some best practices and tools for getting started.

Agile SDLC: Benefits and implementation

The Agile methodology relies on short, targeted tasks and frequent status check-ins with decision-makers to accelerate software projects

Understanding Security Automation

Learn more about security automation, a practical necessity for any successful software operation. Identify incoming cyberthreats and prioritize remediation actions.

Software Security Explained

Learn more about software security, proper tools and processes to identify and remediate software bugs. Connection to application security, secure SDLC and more.