Skip to main content

Ressources

Ebook

5 Critical Capabilities for Progressing Your DevSecOps Program

Lire le rapport
Type
Sujet

Affichage 385 - 408 sur 458 ressources

eBook

From basics to best practices: Building a strong AppSec program

Découvrez les secrets de la création d’un programme AppSec solide qui vous aidera à mettre en place un développement plus moderne, sécurisé et innovant : outils de SAST et SCA, développement d’une culture axée sur la sécurité et intégration de stratégies d’IA.

Analyst Report

Snyk named a Leader in The Forrester Wave ™: Software Composition Analysis Q4 2024

In our evaluation of software composition analysis (SCA) software providers, Forrester identified the most significant ones and researched, analyzed, and scored them. This report shows how each provider measures up and helps you select the right one for your needs.

White Paper

Navigating the Software Supply Chain

Snyk’s new Software Supply Chain Security guide that addresses security for Open Source Libraries, AI-generated code, & more

White Paper

Building a security champions program

Ce guide dévoile les 7 étapes à suivre pour établir un programme d’ambassadeurs de la sécurité efficace.

White Paper

Zero to hero: A blueprint for establishing a security champions program

Téléchargez notre nouveau guide pour découvrir comment créer un programme d’ambassadeurs de la sécurité efficace et adapté aux besoins de votre PME.

White Paper

Discover the path to trusted software

Cheat Sheet

7 Best Practices for Static Application Security Testing

Static application security testing (SAST) plays a pivotal role in ensuring application security by detecting vulnerabilities in source code prior to compilation and deployment. Download this cheatsheet and learn how to streamline your security workflow.

Cheat Sheet

8 Tips for Securing Your CI/CD Pipeline

In this cheatsheet, we'll cover tips for different types of scanning you can implement, and implementation examples in two of the most popular CI/CD platforms in use today — Jenkins and GitHub Actions.

Cheat Sheet

Best Practices for AI in the SDLC

AI has become a hot topic thanks to the recent headlines around the large language model (LLM) AI with a simple interface: ChatGPT. Although there are many efficiencies gained when AI is used in the development process, there are new security threats that are introduced. Download this cheatsheet today to learn best practices for how to leverage AI in your SDLC, securely.

White Paper

Expert Insights for Tackling Software Supply Chain Security in 2023

In this whitepaper, we will examine some of the major themes from the podcast, giving security professionals and developers a way forward in the often-confusing and intimidating space.

White Paper

Top SAST and SCA Considerations for Security Professionals

Download this guide to learn about the critical aspects of a well-rounded AppSec program that security professionals should consider when choosing (SAST) and (SCA) tools.

Cheat Sheet

6 Steps for Scaling Risk-Based AppSec Programs

Looking to strengthen your application security posture at scale? Learn how to define, manage, and scale your application security program with end-to-end visibility across your applications, coverage, and governance through these 6 key steps.

White Paper

How to Perform an Application Security Gap Analysis

Curious to learn how an Application Security Gap Analysis can help you identify areas of weakness within your AppSec program? In this guide we'll walk through the steps to run an Application Security Gap Analysis.

Report

Reporting AppSec Risk up to Your CISO

Level up your security reporting with meaningful insights on the health and growth of your application security program, while ensuring risks posing the greatest threat to the business are resolved quickly and without disruption to developer workflows.

Cheat Sheet

Top Considerations for Addressing Risks in the OWASP Top 10 for LLMs

In this cheatsheet, we’ll look at what OWASP considers the top 10 highest risk issues that applications face using this new technology.

White Paper

Zero-Day Vulnerability Playbook

In this guide, we’ll cover the basics of zero-days and then provide a playbook that your team can use to prepare for any zero-days on the horizon.

Cheat Sheet

Driving Developer Adoption of Security Tools

Download this cheatsheet to learn how to drive developer adoption of security tools.

Buyer's Guide

Buyer's Guide for Generative AI Code Security

Download this guide to explore the processes and tools necessary for effectively leveraging and securing AI-generated code

White Paper

CISOs Guide to Cultivating Developer Security

This white paper summarizes our learnings from discussions with a variety of organizations that have DevSecOps programs at varying stages of maturity.

White Paper

The Importance of DevSecOps

Is your organization ready to adopt DevSecOps? Learn the key techniques to embrace a culture of DevSecOps.

White Paper

How to build a security champions program

Download our playbook to learn how to create a security champions program that works for your organization

Buyer's Guide

Developer Security Tools Buyer’s Guide

This guide discusses all aspects of developer security tools that buyers should consider when looking for a new developer-first security tool.

Pomelo logo
Case Study

How Pomelo stays secure amidst rapid growth with Snyk

Report

State of Open Source Security 2023 Report

D’après notre étude, la sécurité open source reste un chantier inabouti dans la plupart des entreprises : l’adoption des meilleures pratiques et outils de sécurité open source y est encore limitée.