Skip to main content

Resources

Featured
Report

2024 State of Open Source Security Report

Read now

Reading list

Buyers guide

Future-proof your development: The SAST/SCA buyer’s guide for the AI era

White paper

DevSecOps is Dead…or is it?

White paper

Discover the path to trusted software

Narrow Your Search

Type
Topic

Showing 121 - 132 of 262 resources

How to perform static code analysis
Article

How to perform static code analysis

Top tips and workflows to help you get started with static analysis to find and fix vulnerabilities in your applications.

wordpress-sync/snyk-code-blog
Article

How Does Threat Modeling Fit Into the Fast World of DevSecOps?

Learn more about threat modeling and how to get security benefits without putting gates in front of the software development process. Take threat modeling a step further “left.”

Static Code Analysis Explained
Article

Static Code Analysis Explained

Learn how Static Code Analysis can help you prevent half of the security incidents that often slip through the cracks in production.

wordpress-sync/security-incidents-by-type
Article

Establishing Application Security Policies that Power Secure Development Processes

Learn how to establish Application Security Policies, a well-developed process that supports the speed of your organization and instills confidence in your customers

Interactive Application Security Testing (IAST)
Article

Interactive Application Security Testing (IAST)

Learn more about (IAST), application security testing method that tests your application for vulnerabilities in execution and why IAST might not even be an option for you.

Dynamic Application Security Testing (DAST)
Article

Dynamic Application Security Testing (DAST)

Learn more about Dynamic application security testing (DAST), a type of black-box testing that checks your application from the outside while the software is actually running.

wordpress-sync/SAST-annoucment-2
Article

Static Application Security Testing (SAST) Tools

Learn more about Static Application Security Testing (SAST), its pros and cons, and how it can help you to keep your source code secure.

wordpress-sync/Blog-Design_Snyk-Code-
Article

Key Components of the DevOps Pipeline

A DevOps pipeline helps teams build, test, and deploy software quickly and efficiently through a combination of tools and practices. Learn how it works and how to apply it.

wordpress-sync/SAST-annoucment-1-1
Article

Secure coding practices every developer should know

Secure coding involves writing code in a high-level language that follows strict principles, with the goal of preventing potential vulnerabilities

wordpress-sync/Dockerheader-3
Article

Docker Security Scanning Guide

Learn more about Docker Security Scanning to help you get started scanning your container images in Docker and other registries.

wordpress-sync/Package-Lock-Cloud-blog
Article

Cloud native security guide for building secure applications

Cloud native Security is the practice of securing cloud-based platforms, infrastructure and applications by building in security throughout the development process

wordpress-sync/Introducing-open-source-security-runtime-monitoring-
Article

Application Security Testing (AST) - Top Questions Answered

Application security testing is a key step in the SSDLC. Learn more about types of application security testing, app sec testing tools, and get started with building secure apps.