Skip to main content

Resources

Featured
Relatório

Snyk's 2023 AI-Generated Code Security Report

Leia agora

Reading list

Relatório

State of Open Source Security 2023 Report

Relatório

Snyk Customer Value Study Report

Buyers guide

Developer Security Tools Buyer’s Guide

Filtre sua pesquisa

Tipo

Tópico

Mostrando 109 - 120 de 260 recursos

wordpress-sync/Blog-iac-header
Article

Infrastructure as Code in a DevSecOps World

Learn more about infrastructure as code (IaC), what it is exactly, and the security implications of using IaC in the real world.

wordpress-sync/Container-scanning-1-3
Article

SAST vs. DAST: what is the difference and how to combine the two?

Dynamic security testing (DAST) uses the opposite approach of SAST. Whereas SAST tools rely on white-box testing, DAST uses a black-box approach.

wordpress-sync/CI-CD-infinity-copy
Article

What is CI/CD? CI/CD pipeline and tools explained

Learn more about CI/CD continuous integration and continuous delivery, CI/CD pipeline, and framework. CI/CD as the foundation for DevSecOps.

wordpress-sync/Node-How-even-quick-async-functions-can-block-the-Event-Loop-starve
Article

Node.js licensing and security considerations

With the Node.js runtime environment becoming more popular, it's important to know about Node.js licensing and security risks for your web applications.

wordpress-sync/Snyk-Funding-1
Article

Copyleft: The rise of open-source software licensing

Learn more about most popular copyleft licenses, terms, conditions, difference of copyleft vs copyright. Find out what’s best for your team.

wordpress-sync/Blog-iac-header
Article

Is an AGPL License the Right Choice for Your Open Source Projects?

Learn more about AGPL license: advantages, terms and conditions, commercial use, and more. Determine whether the AGPL 3, LGPL 3, or standard GPL 3 will suit your project.

wordpress-sync/Compliance
Article

GNU General Public License: GPLv3 explained

Learn everything you need to know about GPL License: new clauses, the difference between GPLv2 and GPLv3, terms and conditions and more.

wordpress-sync/Kubernetes-Blog
Article

Kubernetes Security: Common Issues and Best Practices

Is Kubernetes secure? Learn more about Kubernetes security issues in a cloud native security context with tips to secure your K8 deployments.

wordpress-sync/Screen-Shot-2020-07-26-at-13.14.15
Article

What is the MIT License?

Learn more about the MIT License - one of the simplest open source license agreements - and integrate license compliance into your existing workflows.

wordpress-sync/Compliance
Article

Licenças Open Source: Tipos e Comparação

Saiba mais sobre os diferentes tipos de licenças de código aberto e como elas visam a proteger autores e usuários de software.

wordpress-sync/sequelize-attack
Article

Malicious Code Explained

What is malicious code? Learn more about malicious code and how it impacts application users and developers.

wordpress-sync/Vul-DB-launch-Header
Article

Secure Software Development Lifecycle (SSDLC)