Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

表示中 41 - 60 / 299 記事

AI Attacks and Adversarial AI in Machine Learning

Bad actors can alter machine learning systems through adversarial AI attacks. Learn about common attack types and how to safeguard your systems here.

AI Bill of Materials (AIBOM) for Python Developers: Mapping Your AI Dependencies with Snyk

Snyk's new experimental AIBOM tool helps Python developers by providing automated discovery & cataloging of AI dependencies across your projects.

Protecting Financial APIs: Strategies for Preventing Data Breaches

Explore the key challenges and essential strategies for securing financial APIs, from data privacy and compliance to reducing risks in complex environments.

What is Bias in AI? Challenges, Prevention, & Examples

Learn what bias in AI is, why it matters, and how to detect and prevent it with real-world examples and best practices.

Human in the Loop: Leveraging Human Expertise in AI Systems

Human-in-the-Loop (HITL) is a design approach where humans are actively involved in the training & curating the output of AI systems. Learn more about HITL automation in AI and ML.

Developer-First Security: Building Fast and Secure in CI/CD Pipelines

Learn how integrating security into CI/CD pipelines empowers developers to deliver secure, high-quality applications without compromising speed or agility.

developer-first SAST

Addressing the Hidden Risks of Single-Page Applications

Single-Page Applications are changing the way we interact online, but at what cost to security? Explore the unique security challenges of SPAs and how to safeguard them effectively.

Prevent code injection vulnerabilities with Snyk

Decoding SQL Injection: Strategies for Secure Web Applications

Explore the intricacies of SQL Injection: learn its workings, impacts, and robust strategies to shield your web applications from this threat.

Balancing Act: The Six Keys to Successfully Navigating Security and App Development Team Tensions

Tired of the friction between developers and security? Learn six keys to bridge the gap, from better training to developer-first tools. Turn roadblocks into collaboration and build secure applications faster.

From Innovation to Protection: Ensuring Data Security in Healthcare

Secure patient data and Health Tech innovations against evolving cyber threats. Discover strategies for continuous security, from embedding automated testing in your CI/CD pipelines to performing regular risk assessments.

Breaking Down Silos: Collaboration Between Developers and Security Teams

Bridge the gap between developers and security teams. Learn how shared tools, aligned goals, and collaboration can drive secure, high-quality applications faster.

AI Intrusion & Anomaly Detection: Approaches, Tools, and Strategies

Explore AI intrusion detection systems (IDS) and anomaly detection strategies. Learn how ML and deep learning secure AI models against emerging threats and what tools and approaches to use.

Helping Gemini Code Assist to Generate Secure Code

Learn how Snyk's MCP server integrates with Gemini Code Assist to automatically scan and fix security vulnerabilities in AI-generated code, ensuring secure development workflows.

アプリケーションセキュリティの完全ガイド

アプリケーションセキュリティとは、アプリケーション開発ライフサイクルの中で、脆弱性を減らしてセキュリティを高め、機密データを保護するために実行するアクションとして定義されています。

9 MCP Servers for Computer-Aided Drafting (CAD) with AI

Explore 9 Model Context Protocol (MCP) servers transforming Computer-Aided Drafting (CAD) with AI. Automate tasks from sketching to assembly modeling across platforms like AutoCAD, Fusion 360, FreeCAD, and Onshape, and learn how to secure your AI-generated designs.

From Development to Deployment: Building an AI-Driven Secure Web Application Ecosystem

Discover the critical challenges of securing modern web applications, from handling complex APIs to combating advanced, AI-driven threats. Learn how to integrate robust, AI-powered security measures effectively at every stage of the development lifecycle.

Modern Technology Environments Demand Modern Application Security Testing

Legacy security testing tools fail to protect modern applications. Learn the hallmarks of a modern, developer-first DAST solution built for today's complex CI/CD pipelines and APIs.

How Cryptojacking Works and How to Defend Against It

Learn what cryptojacking is, how it works, and how to detect and prevent hidden crypto mining attacks across code, cloud, and container environments.

Guardians of the Gateway: How API Security Testing Tools Protect Your Data

Explore how API security testing tools enhance digital defenses, ensuring robust protection and operational continuity.

Between You and the Data: Defending Against Man-in-the-Middle Attacks

Learn how Man in the Middle (MITM) attacks work, how to detect them, and how to prevent interception risks across your code, infrastructure, and apps.