Skip to main content

Ressources

Article

Secure at Inception: The New Imperative for AI-Driven Development

Lire le rapport

White paper

How Snyk API & Web Achieves An Industry-Leading False Positive Rate

Lire le rapport
Type
Sujet

Affichage 457 - 480 sur 593 ressources

White Paper

DevSecOps is Dead…or is it?

Découvrez les insuffisances du DevSecOps et un nouveau cadre permettant d’associer sécurité et objectifs de développement.

Video

The anatomy of a successful DevSecOps program

Our on-demand webinar discussed the state of DevSecOps in 2024.

Article

Improving your Java application with Records

Java Records revolutionizes the way you create data-centric classes in Java, offering a concise and secure approach. Embrace Java Records and unlock efficient and maintainable Java development.

Video

Securing AI-Generated Code in Banking

Article

Getting started with Practical Rego

Read this guide introducing Rego, a declarative policy language, for programmers familiar with imperative languages like Python or Java. It covers key concepts, common pitfalls, and best practices for writing effective Rego policies.

Article

JavaScript Static Analysis with ESLint and Biome

Biome, a new tool in the JavaScript ecosystem, combines code formatting and quality linting. It offers speed and performance advantages over traditional tools like ESLint and Prettier, making it a compelling alternative. With its integration into development environments like VS Code and potential adoption by major projects, Biome is poised to reshape the way JavaScript developers approach code quality and formatting.

Article

Oops I built a feature and created an Open Redirect Vulnerability in a Deno app

Build your first Deno web application with a step-by-step guide. Learn how to implement a redirect feature while avoiding common security pitfalls like open redirect vulnerabilities. Secure your Deno app with best practices and discover how to set up a Deno development environment in GitHub Codespaces.

Article

How Snyk Helps with the OWASP Software Assurance Maturity Model

Read how the OWASP Software Assurance Maturity Model (SAMM) and Snyk can work together to provide an effective approach to measuring, managing, and improving your software security. Learn about the key benefits, practical implementation steps, and the specific tools offered by Snyk to support your organization's security journey.

Video

Unsolved Problems in AppSec

Video

Understanding, Creating & Curating SBOMs

Video

Prioritizing your AppSec Issues

Video

AI Guardrails for AppSec

Video

Snyk in 30: AppSec

Video

Snyk in 30: Supply Chain

Video

Snyk in 30: SAST

Video

Snyk in 30: Platform

Cheat Sheet

Snyk for Financial Services Organizations Cheat Sheet

Découvrez comment sécuriser les logiciels financiers à l’aide d’outils conçus en priorité pour les développeurs.

Article

Getting started with JavaScript static analysis

Static analysis tools are a must-have for JavaScript developers. They automatically scan your code for errors, security vulnerabilities, and formatting issues. This helps you write better code faster and improve your overall development process.

Report

AI Code, Security, and Trust in Modern Development

Cheat Sheet

CICD GitHub Actions Java Tutorial

Video

TCM top 10 Vulns youtube video

Article

Decoding CVEs: A practical guide to assessing and mitigating security risks

Let's explore the world of Common Vulnerabilities and Exposures (CVEs) with step-by-step examples of evaluating if a CVE impacts your project and pragmatic strategies for effective mitigation. This guide will empower you to tackle security vulnerabilities head-on. Don't let CVE warnings go unnoticed — learn how to address them confidently and efficiently.

Article

Top 10 npm power-user commands every JavaScript developer should know

Master essential npm commands to streamline your JavaScript development. Whether it's dependency management or security enhancements, you can boost efficiency and protect your projects. Learn how to leverage npm ls, npm why, npm run, and more to elevate your npm skills today.

Article

How Snyk uncovers libuv CVE-2024-24806 SSRF vulnerabilities in the Node.js project

Node.js is a powerful and widely used runtime that allows developers to build scalable and high-performance applications using JavaScript. However, many developers might not realize that Node.js relies heavily on several third-party open-source components to function effectively. Key among these components are libuv, OpenSSL, and V8