Skip to main content

Ressources

Analyst report

Snyk named a Leader in 2025 Gartner® Magic Quadrant™ for AST

Lire le rapport

Article

Corriger les vulnérabilités détectées grâce à Factory AI et Snyk Studio

Lire le rapport

Vidéo

L’essor de l’IA agentique

View now

White paper

Secure Every Layer, Empower Every Team: The Unified Snyk Platform

Lire le rapport
Type
Sujet

Affichage 265 - 288 sur 633 ressources

Video

Why you NEED an Open Source Vulnerability Scanner

Article

What is a Data Poisoning Attack?

It’s important to protect AI models from data poisoning, an attack that injects corrupt data. Learn key strategies to detect, prevent, and mitigate risks.

Article

ChatGPT and Secure Coding: Benefits and Security Vulnerabilities of ChatGPT-Generated Code

Using ChatGPT for coding has benefits but can also introduce security vulnerabilities. Learn more about ChatGPT and secure coding and how to offset risk here.

Article

Leveraging Generative AI with DevSecOps for Enhanced Security

Learn about the top advantages of secure AI coding tools for stronger DevSecOps practices with Snyk.

Article

What is RAG, and How to Secure It

Learn how Retrieval-Augmented Generation improves LLMs with your data. Understand critical RAG security risks & discover best practices to protect your AI.

Video

How to Choose the Best and Secure Node.js Docker Image

Video

Top 3 JWT Security Best Practices for Your Apps

Video

Is AI Coding Safe? ChatGPT vs DeepSeek

Article

AI Attacks and Adversarial AI in Machine Learning

Bad actors can alter machine learning systems through adversarial AI attacks. Learn about common attack types and how to safeguard your systems here.

Video

ChatGPT's NEW Model Almost Got Me FIRED...

Video

Can AI Solve This Meme? (Automating with AI)

Article

Achieving Security Coverage and Control Over Application Risk

Stop reacting to vulnerabilities. Build proactive application security with universal asset visibility, smart policies, and risk-based prioritization. Secure your SDLC.

Video

How to Spin Up Prototype Apps Fast! (GitHub Spark)

Video

How Secure is this NEW AI Coding Tool? Bolt by Stackblitz

Video

Understanding CSRF and SSRF Attacks (Demo and Examples)

Article

OWASP Top 10 Code Vulnerabilities and How SAST Can Stop Them

Discover the OWASP Top 10 vulnerabilities and how SAST tools like Snyk Code empower developers to detect and fix them early in the development lifecycle.

Video

Claude AI BLEW MY MIND! (Board Game Challenge)

Video

How to Secure a REST API

Video

How I Completed My First Reverse Shell (TryHackMe)

Video

Most Important Asset for Web Developers (Web Almanac)

Article

Navigating the Challenges of GenAI Adoption for Modern AppSec Teams

With an increase in GenAI adoption, AppSec teams face challenges. Learn what challenges AppSec teams are facing and how they can address risks with Snyk.

Article

14 MCP Servers for UI/UX Engineers

As LLMs' capabilities continue to expand through Anthropic’s Model Context Protocol (MCP), UI/UX engineers have access to a growing ecosystem of specialized tools that can significantly enhance their workflows. This article explores 14 open-source MCP servers for UI/UX professionals.

Video

How Dark Mode Got Me Hacked

Video

Application Security 101: A Simple Guide