Skip to main content

Resources

Featured
Relatório

2024 State of Open Source Security Report

Leia agora

Reading list

Buyers guide

Future-proof your development: The SAST/SCA buyer’s guide for the AI era

White paper

DevSecOps is Dead…or is it?

White paper

Discover the path to trusted software

Filtre sua pesquisa

Tipo

Tópico

Mostrando 97 - 108 de 263 recursos

Static Code Analysis Explained
Article

Static Code Analysis Explained

Learn how Static Code Analysis can help you prevent half of the security incidents that often slip through the cracks in production.

wordpress-sync/security-incidents-by-type
Article

Establishing Application Security Policies that Power Secure Development Processes

Learn how to establish Application Security Policies, a well-developed process that supports the speed of your organization and instills confidence in your customers

wordpress-sync/snyk-code-blog
Article

Understanding Security Automation

Learn more about security automation, a practical necessity for any successful software operation. Identify incoming cyberthreats and prioritize remediation actions.

Interactive Application Security Testing (IAST)
Article

Interactive Application Security Testing (IAST)

Learn more about (IAST), application security testing method that tests your application for vulnerabilities in execution and why IAST might not even be an option for you.

Dynamic Application Security Testing (DAST)
Article

Dynamic Application Security Testing (DAST)

Learn more about Dynamic application security testing (DAST), a type of black-box testing that checks your application from the outside while the software is actually running.

wordpress-sync/SAST-annoucment-2
Article

Static Application Security Testing (SAST) Tools

Learn more about Static Application Security Testing (SAST), its pros and cons, and how it can help you to keep your source code secure.

wordpress-sync/Blog-Design_Snyk-Code-
Article

Key Components of the DevOps Pipeline

A DevOps pipeline helps teams build, test, and deploy software quickly and efficiently through a combination of tools and practices. Learn how it works and how to apply it.

wordpress-sync/dev-process-changed
Article

Software Security Explained

Learn more about software security, proper tools and processes to identify and remediate software bugs. Connection to application security, secure SDLC and more.

Vulnerability Scanner: what is it and how does it work?
Article

Vulnerability Scanner: what is it and how does it work?

Learn more about vulnerability scanners: types, categories, how they work and how to chose the right scanner in 2023.

wordpress-sync/ssdlc-2
Article

Software Development Life Cycle (SDLC): Phases and Methodologies

Learn more about SDLC (Software Development Life Cycle), SDLC phases and methodologies to help keep everyone on the same page and working towards a common goal.

wordpress-sync/prioritize-vulns-header-2
Article

Vulnerability Assessment: Tools and Steps to Improve Security Posture

Learn more about vulnerability assessment to stay secure and efficiently evaluate the state of security weaknesses and flaws in your systems and environments.

wordpress-sync/SAST-annoucment-1-1
Article

Secure coding practices every developer should know

Secure coding involves writing code in a high-level language that follows strict principles, with the goal of preventing potential vulnerabilities