Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

表示中 81 - 100 / 195 記事

Is TypeScript All We Need for Application Security?

What are the security controls and fallacies in TypeScript security? Securing TypeScript applications involves a multi-layered approach.

Understanding Server-Side Template Injection in Golang

SSTI can open the door to escalating security risks such as file inclusion, Cross-Site Scripting (XSS), or even Code Injection Attacks.

Can Machine Learning Find Path Traversal Vulnerabilities in Go? Snyk Code Can!

Explore how Snyk’s machine learning-powered security tools tackle path traversal vulnerabilities in Golang code. Learn how to secure your Go applications and challenge yourself to detect and exploit vulnerabilities like a pro!

DevSecOps の概要

DevSecOps とは、セキュリティの手法を DevOps ソフトウェアデリバリーモデルに統合することをいいます。その基盤は、プロセスとツールを通じて、開発者と運用者が安全なソフトウェアを提供する責任を共有する文化です。

AI Data Security: Risks, Frameworks, and Best Practices

Learn about the top data security risks of AI, along with frameworks for understanding protection and best practices for choosing AI tools.

Getting Started with Capture the Flag

If you're new to CTFs or looking to sharpen your skills, understanding how they work is key to success. This article breaks down the importance of CTFs in cybersecurity—how they help you develop critical security skills, understand real-world vulnerabilities, and improve your ability to defend systems effectively.

Cloud Security Architecture - Secure by Design

The leading cloud platforms like Amazon Web Services (AWS), Google Cloud (GCP), and Microsoft Azure have thousands of security professionals working to secure their public cloud infrastructure around the clock, but they are not solely responsible for securing cloud deployments.

Enterprise Application Security

Learn how to protect complex applications from common threats with our guide to enterprise application security. Discover best practices, tools, and successful examples.

Cloud Compliance Tools Guide

When choosing a cloud compliance tool, consider capabilities such as policy as code and historical reporting to help maintain and verify your compliance.

Enterprise security tools: types and key considerations

Security tooling is a financial investment and an investment of time and resources to deploy, maintain, and manage. Therefore, organizations must carefully evaluate and prioritize their security needs to choose the best tools for their unique needs.

What is enterprise-grade security?

By embracing an enterprise-grade approach, businesses can ensure end-to-end security throughout their software development journey

Understanding gray box testing techniques

Learn about what gray box testing is, how to perform gray box testing, the benefits of gray box testing as well as its drawbacks.

Securing the software supply chain with AI

Discover how AI is both a threat and a solution for securing software supply chains. Learn about emerging AI attack vectors, AI-powered defenses, AIBOMs, and how Snyk can help.

Decoding CVEs: A practical guide to assessing and mitigating security risks

Let's explore the world of Common Vulnerabilities and Exposures (CVEs) with step-by-step examples of evaluating if a CVE impacts your project and pragmatic strategies for effective mitigation. This guide will empower you to tackle security vulnerabilities head-on. Don't let CVE warnings go unnoticed — learn how to address them confidently and efficiently.

Top 10 npm power-user commands every JavaScript developer should know

Master essential npm commands to streamline your JavaScript development. Whether it's dependency management or security enhancements, you can boost efficiency and protect your projects. Learn how to leverage npm ls, npm why, npm run, and more to elevate your npm skills today.

How Snyk uncovers libuv CVE-2024-24806 SSRF vulnerabilities in the Node.js project

Node.js is a powerful and widely used runtime that allows developers to build scalable and high-performance applications using JavaScript. However, many developers might not realize that Node.js relies heavily on several third-party open-source components to function effectively. Key among these components are libuv, OpenSSL, and V8

How to secure Node.js applications from Open Redirect vulnerabilities

Secure your Node.js applications from Open Redirect vulnerabilities. Learn how to prevent malicious redirection attacks, protect user data, and maintain a strong security posture. Discover best practices, tools like Snyk, and actionable tips to safeguard your Node.js apps.

The Importance of Code Quality

Code quality is crucial for building high-quality, secure applications. Learn more about code quality, secure development, and Snyk’s code checker.

Top 10 application security acronyms

Read all about AppSec acronyms you need to know to be able to freely discuss the results of a recent penetration test or static analysis of the code.

A deep dive into cyber threat intelligence

As companies continue to adopt cloud native technologies, nearly 60% have increased concerns about their security posture.