Skip to main content

Resources

Featured
Rapport

Snyk's 2023 AI-Generated Code Security Report

Lire le rapport

Reading list

Rapport

State of Open Source Security 2023 Report

Rapport

Snyk Customer Value Study Report

Buyers guide

Developer Security Tools Buyer’s Guide

Affinez votre recherche

Type

Sujet

Affichage 61 - 72 sur 260 ressources

wordpress-sync/blog-hero-pentesting-green
Article

What is technical due diligence (TDD)?

Technical due diligence is an in-depth analysis of the state of a company from a technical perspective, including its products, infrastructure, and more.

wordpress-sync/Docker-blog-header
Article

Qu’est-ce que la sécurité des conteneurs ?

Guide de la sécurité des conteneurs en 2023. Découvrez la sécurité des conteneurs dans les écosystèmes, les conseils de meilleures pratiques et comment sécuriser votre conteneur de la création à l’exécution.

wordpress-sync/hero-safe-containers
Article

Three Steps to Container Image Security

Follow our practical guide to container security, developed in partnership with Docker. 3 Essential steps to run your containers securely.

wordpress-sync/application-security-hero
Article

Web Application Security Explained: Risks & Nine Best Practices

It’s vital for Developers to have knowledge of web application security so they can secure web apps as they’re developed, reducing the burden on security teams.

wordpress-sync/blog-feature-snyk-container-pink
Article

What is container orchestration?

Orchestration refers to automating container deployment, operations, and lifecycle management. This approach automates how we provision, deploy, scale, monitor, replace, and manage storage for our running containers.

wordpress-sync/Kubernetes-Blog-1
Article

Kubernetes Monitoring Guide

Learn everything you need to know about Kubernetes monitoring: tools, best practices, critical metrics you should track, and more.

wordpress-sync/blog-hero-pentesting-green
Article

Black box testing basics

Black box testing is a software testing method that does not require knowledge about how an application is built, in order to simulate an attacker.

wordpress-sync/blog-hero-code-scan-blue-1
Article

Code security auditing 101

A code security audit is a process of analyzing source code with the goal of finding security vulnerabilities, licensing, and other programming issues. §

Mobile application security explained
Article

Mobile application security explained

As the use of mobile apps continues to grow, so does the need for secure mobile application development. Read on for top risks, tools, and tips for mobile app security.

wordpress-sync/blog-hero-iac-drift-purple
Article

The Importance of Policy as Code in Your Compliance Strategy 

Learn why compliance as code should become a key part of your overall security strategy, enabling security at scale based on automated Policy as Code rules.

wordpress-sync/blog-hero-pentesting-green
Article

Understanding gray box testing techniques

Learn about what gray box testing is, how to perform gray box testing, the benefits of gray box testing as well as its drawbacks.

wordpress-sync/Prioritisation-header-8
Article

White box testing basics: Identifying security risks early in the SDLC

This article will help you to understand what white box testing is, the pros and cons, and techniques for white box testing.