Skip to main content

リソース

Ebook

5 Critical Capabilities for Progressing Your DevSecOps Program

今すぐ読む

Ebook

Optimizing AppSec in the technology sector: Strategies & Challenges

今すぐ読む
種類
トピック

表示中 49 - 60 / 291 リソース

Article

5 Key Learnings on How to Get Started in DevSecOps

During DevSecCon’s recent community call on How to Get Started in DevSecOps, security experts from the DevSecCon community shared actionable advice, practical steps, and insights for navigating this critical field. Here are the top five takeaways from this call.

Article

静的アプリケーションセキュリティテスト (SAST)

静的アプリケーションセキュリティテスト (SAST)、その長所と短所、およびソースコードを安全に保つのに役立つ方法の詳細をご覧ください。

Article

Malware in LLM Python Package Supply Chains

The gptplus and claudeai-eng supply chain attack represents a sophisticated malware campaign that remained active and undetected on PyPI for an extended period. These malicious packages posed as legitimate tools for interacting with popular AI language models (ChatGPT and Claude) while secretly executing data exfiltration and system compromise operations.

Article

Understanding SOC 2 Audits: Checklist & Process

A SOC 2 audit can give your organization a competitive advantage. But what does the audit entail? Here’s A 4-step SOC 2 Audit checklist.

Article

Risk-Based Vulnerability Management (RBVM): What is it & how to implement

Risk-based vulnerability management (RBVM) is a relatively new AppSec practice that empowers organizations to see their risk in context and prioritize the most critical fixes.

Article

Tensor Steganography and AI Cybersecurity

Tensor steganography exploits two key characteristics of deep learning models: the massive number of parameters (weights) in neural networks and the inherent imprecision of floating-point numbers. Learn about this novel technique that combines traditional steganography principles with deep-learning model structures.

Cheat Sheet

What You Need to Know About ISO 27001

eBook

Developer security best practices in a fast growing technology company

Secure your software development lifecycle with AI-powered remediation, risk-based prioritization, and CI/CD security. Discover how Snyk helps tech teams build fast while staying secure.

Cheat Sheet

What You Need to Know About OWASP

Cheat Sheet

What you need to know about CRA

eBook

5 Critical Capabilities for Progressing Your DevSecOps Program

Cheat Sheet

Best Practices for SOC2