Skip to main content

Narrow Your Search

Type

Topic

Reset filters

Showing 13 - 24 of 25 resources

10 Java Best Practices Cheat Sheet
Cheat Sheet

10 Java Best Practices Cheat Sheet

AWS Misconfigurations Cheat Sheet
Cheat Sheet

AWS Misconfigurations Cheat Sheet

Supply Chain Cheat Sheet
Cheat Sheet

Supply Chain Cheat Sheet

Secure your container supply chain with your existing workflows
Cheat Sheet

Secure your container supply chain with your existing workflows

Find out how teams can find and fix vulnerabilities across code, dependencies, container images, and IaC using Snyk Container.

Secure your software supply chain
Cheat Sheet

Secure your software supply chain

Discover how Snyk can manage supply chain security, from enabling secure design to tracking dependencies to fixing vulnerabilities.

7 Best Practices for Static Application Security Testing
Cheat Sheet

7 Best Practices for Static Application Security Testing

Static application security testing (SAST) plays a pivotal role in ensuring application security by detecting vulnerabilities in source code prior to compilation and deployment. Download this cheatsheet and learn how to streamline your security workflow.

8 Tips for Securing Your CI/CD Pipeline
Cheat Sheet

8 Tips for Securing Your CI/CD Pipeline

In this cheatsheet, we'll cover tips for different types of scanning you can implement, and implementation examples in two of the most popular CI/CD platforms in use today — Jenkins and GitHub Actions.

Best Practices for AI in the SDLC
Cheat Sheet

Best Practices for AI in the SDLC

AI has become a hot topic thanks to the recent headlines around the large language model (LLM) AI with a simple interface: ChatGPT. Although there are many efficiencies gained when AI is used in the development process, there are new security threats that are introduced. Download this cheatsheet today to learn best practices for how to leverage AI in your SDLC, securely.

6 Steps for Scaling Risk-Based AppSec Programs
Cheat Sheet

6 Steps for Scaling Risk-Based AppSec Programs

Looking to strengthen your application security posture at scale? Learn how to define, manage, and scale your application security program with end-to-end visibility across your applications, coverage, and governance through these 6 key steps.

Top Considerations for Addressing Risks in the OWASP Top 10 for LLMs
Cheat Sheet

Top Considerations for Addressing Risks in the OWASP Top 10 for LLMs

In this cheatsheet, we’ll look at what OWASP considers the top 10 highest risk issues that applications face using this new technology.

Driving Developer Adoption of Security Tools
Cheat Sheet

Driving Developer Adoption of Security Tools

Download this cheatsheet to learn how to drive developer adoption of security tools.

10 Security Considerations when Migrating to AWS Cheat Sheet
Cheat Sheet

10 Security Considerations when Migrating to AWS Cheat Sheet

Learn about 10 different ways AWS security considerations you should keep in mind to make the move easy and secure.