Skip to main content

Resources

Report

What’s Lurking in Your AI? - Download Snyk’s AISPM Deep Dive

Read now

Ebook

The Gorilla Guide to Security & Governance for AI

Read now
Type
Topic

Showing 1 - 24 of 580 resources

Article

Preventing Path Traversal Vulnerabilities in MCP Server Function Handlers

Learn how to secure your MCP servers with best practices and Snyk Code's SAST tool to detect and fix security issues before they become a problem.

Report

Cloud Native Application Security Report | Snyk

Report

Infrastructure as Code Security Insights | Snyk

prioritize the security backlog
Article

Unlocking Digital Health: Mastering Asset Discovery in Healthtech

Explore the vital role of asset discovery in safeguarding Healthtech, ensuring robust security and compliance.

Cheat Sheet

AI Code Guardrails: A Practical Guide for Secure Rollout

Discover how to secure AI-assisted coding with practical guardrails that reduce vulnerabilities, prevent data leaks, and ensure scalable adoption.

Video

Snyk in 30: Compliance & Reporting for EMEA

Video

Snyk in 30: Compliance & Reporting

Video

Securing Vibe Coding: Addressing the Security Challenges of AI-Generated Code

Video

OWASP Top 10 for LLMs

Video

Building a Security Champions Program

Video

AI Live Hack

Article

Protecting the Heart of Healthcare: Cybersecurity Strategies and Solutions

Explore the essentials of healthcare cybersecurity and learn how to protect sensitive patient data from cyber threats effectively.

Video

The AI-Enhanced Security Champion: Building Your First Line of Defense in the Age of AI

Video

Spec Driven Development with Amazon Kiro & Claude

White Paper

The Future of Software Craft in the Age of AI | Snyk

eBook

Securing the MCP Servers Ecosystem

Video

You Won't Believe These Results from Replit

Cheat Sheet

Conditional Access for AI Tools: A Playbook for Financial Services

Article

Top 5 Tips to Choose the Right DAST Tool

Choosing the right DAST tool is crucial for safeguarding your web apps and APIs from evolving threats, especially with the accelerated pace of AI-powered development. Learn more about the 5 essential factors to consider when selecting a DAST tool.

Video

Snyk in 30: Risk-Based Compliance

Article

Navigating the New Frontier: AI Cloud Security Risks and Mitigation Strategies

Discover the top AI cloud security risks & learn proven mitigation strategies. Explore how to implement secure AI cloud infrastructure to protect data, models, and systems effectively with Snyk.

Article

The Hidden Costs of Ignoring API Security

Discover the hidden costs of ignoring API security, from breaches and fines to lost trust and revenue, and learn how a proactive approach can save your business.

Cheat Sheet

GenAI Coding Security RFP Template

As GenAI coding tools spread across development teams, security risks are rising just as quickly. This template equips security and procurement teams with the right questions to evaluate vendors on real-time detection, safe fixes, policy enforcement, developer enablement, and scalability—so you can adopt GenAI with speed and trust.

Cheat Sheet

6 Best Practices for Secure Innovation in the Age of AI