Skip to main content

Recursos

Ebook

5 Critical Capabilities for Progressing Your DevSecOps Program

Leia agora

Cheat sheet

Why the fastest tech organizations choose Snyk

Leia agora

Cheat sheet

What You Need to Know About OWASP

Leia agora
Tipo
Tópico

Mostrando 25 - 48 de 466 recursos

Video

Snyk in 30: SAST + DAST Better Together

Article

The Role and Impact of AI in Endpoint Security

Discover AI's transformative impact on endpoint security. Learn how AI enhances threat detection, incident response, and tools like EDR/XDR for robust cybersecurity in the evolving threat landscape.

Article

Navigating AI for Source Code Analysis

Explore AI's role in source code analysis—from detecting bugs and vulnerabilities to optimizing performance. Understand how to use AI tools responsibly for secure and efficient software development.

Article

How To Get Started with AI Compliance and Why It Matters

Master AI compliance! Learn what it is, why it matters, and how to get started with frameworks and best practices to manage risk, security, and trust in AI systems.

Article

Responsible AI Usage: Key Principles, Best Practices & Challenges

Key principles of responsible AI usage include fairness, transparency, and accountability. Best practices when deploying AI are crucial to ensuring ethical and meaningful implementation.

Article

10 MCP Servers for Entrepreneurs Using AI

Uncover ten MCP servers specifically built to support entrepreneurial functions, covering everything from e-commerce and payments to project management and customer communications.

Article

9 MCP Projects for AI Power Users

Explore 9 Model Context Protocol (MCP) projects that transform LLMs into versatile collaborators for power users looking to supercharge their AI workflow.

Article

11 Data Science MCP Servers for Sourcing, Analyzing, and Visualizing Data

Discover eleven MCP servers specifically engineered for data science workflows, spanning everything from dataset discovery and exploration to sophisticated mathematical visualizations.

Article

6 MCP Servers for Using AI to Generate 3D Models

Explore six MCP servers specifically designed for 3D modeling applications, spanning everything from professional architectural tools to open source modelers and 3D printing platforms.

Article

Five Ways Shadow AI Threatens Your Organization

Uncover 5 ways Shadow AI threatens your organization's data, compliance, and security. Learn how to gain control and protect your business from hidden AI risks.

Article

Top 12 AI Security Risks You Can’t Ignore

Discover the most pressing 12 AI security risks and learn how to safeguard your business with best practices, threat detection, and secure software strategies.

Article

8 AI MCP Servers Speeding Up Content Creator Workflows

Discover 8 powerful MCP servers that revolutionize content creation workflows. From video generation to SEO optimization, these AI-powered tools streamline production, boost creativity, and unlock new possibilities for creators.

Article

Shadow AI: Unmasking the hidden risks in your Enterprise

Unmask Shadow AI's hidden enterprise risks, from data leaks and compliance woes to security gaps. Learn why it's a threat and how to implement effective governance strategies for safer AI innovation.

Video

Can Google Gemini Save My Job Again?!

Article

What is AI jailbreaking? Strategies to Mitigate LLM Jailbreaking

LLM Jailbreaking happens when adversarial prompts force unintended actions. Discover the best strategies to mitigate and defend against jailbreaking in GenAI models.

Article

What is AI chip design, and how does it work?

AI chip design automates tasks, boosting engineering productivity and enhancing chip quality outcomes.

Article

What If Everybody Can Code?

AI empowers citizen developers to code, posing new security & Shadow IT challenges. Explore how organizations can securely support widespread coding in this evolving landscape.

Article

MCP Security – What's Old is New Again

MCP security faces old and new threats like injection attacks, supply chain risks, and AI-specific dangers like tool poisoning. Learn to mitigate risks to malicious, vulnerable, and insecure MCP servers.

Article

Ensuring PCI DSS Compliance: The Role of SAST, DAST, and API Security Testing

Achieve PCI DSS compliance with best practices and tools like Snyk API & Web or Snyk Learn. Secure payment data and build trust while simplifying audits and testing.

Article

5 Best MCP Servers for Developers

Here are Snyk’s Top 5 recommendations for MCP Servers that developers will get the most value from.

Article

A Beginner's Guide to Visually Understanding MCP Architecture

A beginner's guide to understanding Model Context Protocol (MCP) architecture visually. Explore MCP Hosts, Clients, Servers, transport types, and how MCP extends LLMs beyond function calling & REST APIs.

Article

How to Add a New MCP Server to VS Code

Unlock the power of AI in VS Code! Learn how to integrate MCP Servers, like GitHub's, to extend GitHub Copilot's capabilities with custom tools. This guide covers setup, configuration with .vscode/mcp.json, and using agent mode for enhanced developer workflows.

Article

Exploiting MCP Servers Vulnerable to Command Injection

Learn how vulnerable MCP servers in AI and LLM workflows, especially for developers, can lead to dangerous command injection attacks and how to mitigate the risks.

Video

Easy Website Design for Devs: Bolt + Figma