Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Mostrando 41 - 60 de 367 artigos

What Is Toxic Flow Analysis in Cybersecurity? Framework, Identification Techniques & Implementation

Toxic Flow Analysis maps how sensitive data moves across systems to uncover hidden risks, strengthen defenses, and improve security posture.

Secure AI Coding With Snyk: Now Supporting Model Context Protocol (MCP)

Snyk’s newfound support for Model Context Protocol (MCP) offers real-time security to AI-powered workflows, expanding secure development across other MCP-supported AI developer tools.

OpenRouter in Python: Use Any LLM with One API Key

Simplify AI development by using OpenRouter to access dozens of LLMs with a single API key in Python. Learn the bare-bones implementation and explore features like model routing, streaming, and vision models, all while building securely with Snyk.

Guia completo para a segurança de aplicativos

A segurança de aplicativos é definida como as ações tomadas durante o ciclo de vida de desenvolvimento de um aplicativo para reduzir vulnerabilidades, melhorar a segurança e proteger dados confidenciais.

How is AI being used in cybersecurity?

Learn how the emergence of AI is changing organizations' approaches to cybersecurity, leveraging different AI models to improve the efficiency of cybersecurity programs.

5 AI Cloud Security Best Practices: A Comprehensive Guide for Securing AI Systems in the Cloud

Discover the top 5 AI cloud security best practices to protect your AI models, data, and pipelines. Learn how to secure AI systems in the cloud against emerging threats with this comprehensive guide.

How Claude Code Is Raising the Ceiling of Intelligence

Anthropic's Claude Code is evolving into a customizable agent framework. Learn about 7 new features: extended thinking, tool use, MCP, memory, and secure execution.

From Gatekeeper to Guardrail: Embracing the Role of Governance for the AI Era

AI code assistants demand a new AppSec governance model. Shift from late-stage "gatekeepers" to real-time "guardrails" with Policy-as-Code and developer-first security. Learn how to secure Al-generated code from inception.

Gemini Nano Banana Cheat Sheet for JavaScript Developers

Explore this cheat sheet for JavaScript/TypeScript developers on integrating Google's Gemini Nano Banana model. Master the AI SDK, prompt engineering, image generation, Data URL conversion, and security best practices with Snyk Studio.

Understanding Toxic Flows in MCP and the Hidden Risk of AI-Native Systems

A deep dive into toxic flows in MCP and how AI agents can unintentionally create attack paths across tools, data, and systems.

The Dissemination of the Term Vibe Coding

Vibe coding accelerates development but risks security. Learn how Andrej Karpathy's viral term describes Al-driven, minimal-oversight coding, and why it leads to XSS, SQL injection, and data leaks. Read the security implications and best practices.

NPM Security Best Practices: How to Protect Your Packages After the 2025 Shai Hulud Attack

Harden your npm environment against supply chain attacks like Shai-Hulud. Learn 12 essential best practices for developers and maintainers, covering post-install scripts, 2FA, provenance, and deterministic installs.

What is ASPM? (Application Security Posture Management)

Application security posture management (ASPM) overview - Learn how to strengthen app security using holistic visibility, automation & robust security measures.

Why AI-Native Apps Break Traditional AppSec Models

AI-native apps break traditional AppSec. Learn why dynamic models, agents, and model-layer risks demand a modern, AI-aligned security approach.

Como corrigir vulnerabilidades com a Factory AI e o Snyk Studio

Os Droids da Factory AI e o Snyk MCP simplificam o processo de correção de vulnerabilidades. Saiba como os agentes de IA especializados se integram para correções de segurança automáticas e DevSecOps.

Detecting & Patching Vulnerabilities with Continue and Snyk MCP

Integrate security directly into your AI coding workflow. Learn how to use the open-source Continue AI coding assistant with Snyk Studio's Model Context Protocol (MCP) to automatically detect, fix, and verify high-severity vulnerabilities like SQL Injection, all without leaving your IDE.

6 Key Components of a Robust AI Compliance Strategy

Ensure safe AI adoption and development with a robust AI compliance strategy. Explore the key components and how to prepare for evolving regulations here.

AI Threat Hunting: Transforming Cybersecurity Through Intelligent Automation

Discover how AI-driven threat hunting transforms cybersecurity by detecting hidden threats, automating analysis, and strengthening defense strategies against evolving cyberattacks.

Personalization in Vibe Coding

The rise of vibe coding and personalized AI agents is transforming development, but the 'Vibe Coding Hangover' introduces critical security and maintainability risks. Discover how to move from unreviewed, risky code to responsible, secure AI-assisted development.

What Is Threat Modeling and Why Is It Essential for DevSecOps?

Learn how continuous threat modeling strengthens DevSecOps by identifying, prioritizing, and mitigating risks across evolving code, data, and pipelines.