Skip to main content

Resources

Featured
Rapport

Snyk's 2023 AI-Generated Code Security Report

Lire le rapport

Reading list

Rapport

State of Open Source Security 2023 Report

Rapport

Snyk Customer Value Study Report

Buyers guide

Developer Security Tools Buyer’s Guide

Affinez votre recherche

Type

Sujet

Affichage 49 - 60 sur 260 ressources

ASPM Playbook Chapter Five
eBook

ASPM Playbook Chapter Five

ASPM Playbook Chapter Four
eBook

ASPM Playbook Chapter Four

CISOs Guide to Safely Unleashing Power of Gen AI
White Paper

CISOs Guide to Safely Unleashing Power of Gen AI

Developer Security Tools Buyer’s Guide
Buyer's Guide

Developer Security Tools Buyer’s Guide

This guide discusses all aspects of developer security tools that buyers should consider when looking for a new developer-first security tool.

wordpress-sync/blog-hero-security-video
Article

The Importance of Code Quality

Code quality is crucial for building high-quality, secure applications. Learn more about code quality, secure development, and Snyk’s code checker.

wordpress-sync/blog_header_Top-10-Application-Security-Acronyms
Article

Top 10 application security acronyms

Read all about AppSec acronyms you need to know to be able to freely discuss the results of a recent penetration test or static analysis of the code.

wordpress-sync/2021-annoucment-PR
Article

A deep dive into cyber threat intelligence

As companies continue to adopt cloud native technologies, nearly 60% have increased concerns about their security posture.

Docker Security - Challenges & Best Practice
Article

Docker Security - Challenges & Best Practice

Docker security is the practice of protecting containers, applications, host systems, and anything else related to Docker. Learn more with our full guide.

AWS security: Complete guide to Amazon cloud security
Article

AWS security: Complete guide to Amazon cloud security

What is AWS security? How secure is AWS? Explore Snyk’s top tips to help you secure your AWS deployments, and maintain visibility of your AWS resources in development and production.

Top 10 Node.js Security Best Practices
Article

Top 10 Node.js Security Best Practices

Read about five major Node.js security risks and the top ten best practices you can implement to address them and stay secure while building applications.

wordpress-sync/Blog-Headers-java-logging
Article

Java Security Explained

Learn about the basics of cybersecurity in the Java Security ecosystem, including cryptography, application authentication, and more.

wordpress-sync/learn-threat-intelligence-hero
Article

Threat Intelligence Lifecycle | Phases & Best Practices Explained

Learn about the different phases of the threat intelligence lifecycle, as well as best practices for each phase.