Skip to main content

Ressources

Analyst report

Snyk named a Leader in 2025 Gartner® Magic Quadrant™ for AST

Lire le rapport

Rapport

Secure Every Layer, Empower Every Team: The Unified Snyk Platform

Lire le rapport

Article

Patching Detected Vulnerabilities with Factory AI and Snyk Studio

Lire le rapport
Type
Sujet

Affichage 73 - 96 sur 608 ressources

Article

What Is Prompt Engineering? A Practical Guide for Developers and Teams

Learn what prompt engineering is, how it improves LLM outputs, and the tools and techniques you need to write effective, secure AI prompts.

Article

How To Run Models (LLM) Locally with Docker

Master how to run Large Language Models (LLMs) locally with Docker. This quick-start guide is for developers who want to learn more about the process of setting up models to run locally on their laptop.

Buyer's Guide

Unified AppSec RFP Template for AI-Driven Development | Snyk

Buyer's Guide

DevSecOps Modernization RFP Template: Securing AI-Powered Development

Snyk Code prevents Trojan Source attacks
Article

Preventing XXE Attacks: Strategies for Secure XML Processing

Discover how to safeguard your XML processes against XXE vulnerabilities with advanced prevention techniques.

Article

AI Inference in Cybersecurity: Real-Time Threat Detection at Scale

Discover what AI inference is, how it powers real-time decision-making in machine learning models, and why it's crucial for edge computing and business innovation.

Article

DAST and Compliance: Bridging the Gap Between Regulation and Innovation

Discover how DAST bridges the gap between compliance and innovation, empowering teams to meet regulatory standards while accelerating secure development.

Article

AI Model Theft: Understanding the Threat Landscape and Protective Measures

Model theft attacks occur when an attacker gains access to the model's parameters. Find out how to prevent and mitigate LLM threats and security risks.

Article

Dark AI: Exploring the Shadows of Artificial Intelligence

Explore how dark AI is transforming cybercrime, the threats it poses to data privacy, and how proactive security can help organizations stay ahead.

Video

AI Chat Memory Manipulation

eBook

Unlocking API Security: Strategies for Protecting Your Digital Assets

eBook

Speed Meets Security: Shifting Left with DAST and SAST

Video

Snyk in 30: Scaling Security Education with Snyk Learn

Article

How chat memory manipulation can ruin your AI system

Discover how chat memory manipulation can disrupt AI performance, lead to data drift, and compromise user trust. Learn key risks, real-world examples, and how to safeguard your AI systems.

security incident management
Article

API Security in Telemedicine: Protecting Sensitive Patient Data

Explore how secure APIs are essential for telemedicine, addressing data privacy, compliance, and protecting sensitive patient information across platforms.

Article

How to Dockerize MCP Servers in JavaScript

Learn how to Dockerize your JavaScript MCP server. This guide covers creating a Dockerfile and setting up GitHub Actions for automated building, publishing, and signing.

prioritize the security backlog
Article

Beyond Predictability: Securing Non-deterministic Generative AI in Today's Cyber Landscape

Explore how to secure non-deterministic generative AI systems in an evolving cyber threat landscape. Learn key risks, real-world implications, and expert strategies for resilient AI deployment.

Video

Can Claude Opus 4.1 Improve My Code Security?

Article

Balancing Efficiency and Security: API Protection in E-commerce

Learn essential strategies to secure retail APIs, protect customer data, and enhance e-commerce trust by mitigating API vulnerabilities and risks.

Article

AI Bill of Materials (AIBOM) for Python Developers: Mapping Your AI Dependencies with Snyk

Snyk's new experimental AIBOM tool helps Python developers by providing automated discovery & cataloging of AI dependencies across your projects.

Article

Protecting Financial APIs: Strategies for Preventing Data Breaches

Explore the key challenges and essential strategies for securing financial APIs, from data privacy and compliance to reducing risks in complex environments.

Video

Snyk in 30: See Snyk in Action | Demo Series

eBook

Proving the Payoff: How Security Testing Delivers Tangible ROI

eBook

7 Habits of Highly Successful DAST Super Users