Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

表示中 21 - 40 / 360 記事

Best Practices for DAST Scanning, Execution & Implementation in the SDLC

Master DAST scanning best practices for your SDLC. Learn to define scope, optimize execution in CI/CD, prioritize results, manage false positives, & integrate Snyk API & Web for application security.

Types of CTF challenges

The evolution of CTFs has been a dynamic journey from simple text-based challenges to complex, multifaceted events that test a wide range of cybersecurity skills.

CTF platforms & practice

Capture the Flag (CTF) competitions are a popular way for cybersecurity enthusiasts, students, and professionals to test and expand their skills in a gamified environment. Over the years, several platforms have emerged that offer CTF challenges and practice environments. 

CTF tools

CTFs (Capture the Flag) are competitions where participants try to solve various cybersecurity challenges, such as exploiting vulnerabilities, reverse engineering, digital forensics, and cryptography, to retrieve a "flag." To assist in solving these challenges, there are numerous CTF tools available, and participants typically have a toolkit that caters to the various CTF categories.

CTF strategies & techniques

Capture the Flag (CTF) has become increasingly popular in the field of cybersecurity as a training ground for aspiring ethical hackers and cybersecurity professionals. It involves a series of challenges where participants must use their technical skills and knowledge to solve problems, find hidden flags, and gain points. CTF challenges cover a wide range of topics, including web application security, binary analysis, cryptography, and more.

Gaining transferable security skills with CTFs

Getting Started with Capture the Flag

If you're new to CTFs or looking to sharpen your skills, understanding how they work is key to success. This article breaks down the importance of CTFs in cybersecurity—how they help you develop critical security skills, understand real-world vulnerabilities, and improve your ability to defend systems effectively.

SAST for SQL Injection Detection: A Complete Guide

Static Application Security Testing (SAST) is a cornerstone of a proactive defense against SQL injection (SQLi). Snyk Code uses the power of SAST to detect SQL injection vulnerabilities in source code, prevent attacks early, & strengthen application security before deployment.

API Security Testing: How to test your API security

API or application programming interface helps applications communicate with each other. Learn how to keep your API's secure with API security testing.

Top CI/CD Pipeline Security Best Practices for AI-Powered Development

Fortify your AI development lifecycle. Learn top CI/CD security best practices to protect against prompt injection, data poisoning, and model inversion from code to cloud.

Implementing SAST in Azure DevOps: A Complete Guide for DevSecOps Integration

By integrating SAST directly into our Azure DevOps pipelines, we catch issues like SQL injection, cross-site scripting, and insecure authentication patterns before they reach production.

AI in SDLC: A Complete Guide to AI-Powered Software Development

Discover how AI is transforming the Software Development Life Cycle (SDLC). Learn the benefits, challenges, and real-world use cases of AI-powered software development.

Buffer Overflow Security Analysis: From Prevention to Detection & Defense

Protect your applications from buffer overflow attacks with a multi-layered security approach. Learn how SAST, DAST, runtime protections, and Snyk’s proactive tools help detect, prevent, and remediate memory corruption vulnerabilities in C/C++ and other high-risk environments.

What Is Toxic Flow Analysis in Cybersecurity? Framework, Identification Techniques & Implementation

Toxic Flow Analysis maps how sensitive data moves across systems to uncover hidden risks, strengthen defenses, and improve security posture.

Secure AI Coding With Snyk: Now Supporting Model Context Protocol (MCP)

Snyk’s newfound support for Model Context Protocol (MCP) offers real-time security to AI-powered workflows, expanding secure development across other MCP-supported AI developer tools.

OpenRouter in Python: Use Any LLM with One API Key

Simplify AI development by using OpenRouter to access dozens of LLMs with a single API key in Python. Learn the bare-bones implementation and explore features like model routing, streaming, and vision models, all while building securely with Snyk.

アプリケーションセキュリティの完全ガイド

アプリケーションセキュリティとは、アプリケーション開発ライフサイクルの中で、脆弱性を減らしてセキュリティを高め、機密データを保護するために実行するアクションとして定義されています。

How is AI being used in cybersecurity?

Learn how the emergence of AI is changing organizations' approaches to cybersecurity, leveraging different AI models to improve the efficiency of cybersecurity programs.

5 AI Cloud Security Best Practices: A Comprehensive Guide for Securing AI Systems in the Cloud

Discover the top 5 AI cloud security best practices to protect your AI models, data, and pipelines. Learn how to secure AI systems in the cloud against emerging threats with this comprehensive guide.

How Claude Code Is Raising the Ceiling of Intelligence

Anthropic's Claude Code is evolving into a customizable agent framework. Learn about 7 new features: extended thinking, tool use, MCP, memory, and secure execution.