Skip to main content

Recursos

Ebook

5 Critical Capabilities for Progressing Your DevSecOps Program

Leia agora

Relatório

Why the Fastest Technology Organizations Choose Snyk

Leia agora

Cheat sheet

What You Need to Know About OWASP

Leia agora
Tipo
Tópico

Mostrando 1 - 12 de 281 recursos

Article

Getting started with capture the flag

If you're new to CTFs or looking to sharpen your skills, understanding how they work is key to success. This article breaks down the importance of CTFs in cybersecurity—how they help you develop critical security skills, understand real-world vulnerabilities, and improve your ability to defend systems effectively.

Article

Understanding SOC 2 Audits: Checklist & Process

A SOC 2 audit can give your organization a competitive advantage. But what does the audit entail? Here’s A 4-step SOC 2 Audit checklist.

Article

Path Traversal Vulnerability in Deep Java Library (DJL) and Its Impact on Java AI Development

A newly discovered path traversal vulnerability (CVE-2025-0851) in Deep Java Library (DJL) could allow attackers to manipulate file paths, exposing Java AI applications to security risks. Learn how this flaw impacts DJL users and how updating to version 0.31.1 mitigates the threat.

Article

How to prepare for tomorrow’s zero-day vulnerabilities today

Zero-day vulnerabilities are all too common in today’s applications. Learn how to identify and fix zero-day vulnerabilities proactively with a developer-first approach to security.

Article

How to install Python on macOS

Learn how to install Python on macOS step by step. This easy guide covers downloading, installing, and setting up Python on your Mac for beginners and developers.

Article

Static Application Security Testing (SAST) Tools

Learn more about Static Application Security Testing (SAST), its pros and cons, and how it can help you to keep your source code secure.

Article

Risk-Based Vulnerability Management (RBVM): What is it & how to implement

Risk-based vulnerability management (RBVM) is a relatively new AppSec practice that empowers organizations to see their risk in context and prioritize the most critical fixes.

Buyer's Guide

Developer Security Tools Buyer’s Guide

This guide discusses all aspects of developer security tools that buyers should consider when looking for a new developer-first security tool.

Article

Tensor Steganography and AI Cybersecurity

Tensor steganography exploits two key characteristics of deep learning models: the massive number of parameters (weights) in neural networks and the inherent imprecision of floating-point numbers. Learn about this novel technique that combines traditional steganography principles with deep-learning model structures.

AppSec
Article

Security Risks with Python Package Naming Convention: Typosquatting and Beyond

Beware of typosquatting and misleading Python package names—one small mistake in pip install can expose your system to backdoors, trojans, and malicious code. Learn how attackers exploit package naming conventions and discover best practices to secure your open-source supply chain.

Cheat Sheet

What You Need to Know About ISO 27001

eBook

Developer security best practices in a fast growing technology company

Secure your software development lifecycle with AI-powered remediation, risk-based prioritization, and CI/CD security. Discover how Snyk helps tech teams build fast while staying secure.