Skip to main content

Resources

Report

2026 State of Agentic AI Adoption

Read now

White paper

From First Prompt to Final Fix: How Snyk Secures AI-Driven Development

Read now

Report

Unifying Control for Agentic AI With Evo By Snyk

Read now

Article

From SKILL.md to Shell Access in Three Lines of Markdown: Threat Modeling Agent Skills

Read now
Type
Topic

Showing 49 - 72 of 353 resources

Introducing open source security runtime monitoring
Article

$800K+ Up for Grabs: 12 AI Hacking Competitions That Could Launch Your Security Career

Survey the best AI security competitions in Q4 2025 and beyond. Discover 12 AI hacking competitions with over $800,000 in prizes, organized by difficulty, to launch your security career.

Article

Preventing Path Traversal Vulnerabilities in MCP Server Function Handlers

Learn how to secure your MCP servers with best practices and Snyk Code's SAST tool to detect and fix security issues before they become a problem.

prioritize the security backlog
Article

Unlocking Digital Health: Mastering Asset Discovery in Healthtech

Explore the vital role of asset discovery in safeguarding Healthtech, ensuring robust security and compliance.

Article

Protecting the Heart of Healthcare: Cybersecurity Strategies and Solutions

Explore the essentials of healthcare cybersecurity and learn how to protect sensitive patient data from cyber threats effectively.

Article

Top 5 Tips to Choose the Right DAST Tool

Choosing the right DAST tool is crucial for safeguarding your web apps and APIs from evolving threats, especially with the accelerated pace of AI-powered development. Learn more about the 5 essential factors to consider when selecting a DAST tool.

Article

Navigating the New Frontier: AI Cloud Security Risks and Mitigation Strategies

Discover the top AI cloud security risks & learn proven mitigation strategies. Explore how to implement secure AI cloud infrastructure to protect data, models, and systems effectively with Snyk.

Article

The Hidden Costs of Ignoring API Security

Discover the hidden costs of ignoring API security, from breaches and fines to lost trust and revenue, and learn how a proactive approach can save your business.

Article

From Patient Portals to EHRs: Securing the Healthcare Ecosystem

Explore the vital role of security in healthcare technology, ensuring data protection and regulatory compliance.

Article

What is AI Explainability? Real-World Applications of Explainable AI

Find out more about AI explainability and how Tools like Snyk's AI BOM help organizations understand the explainability landscape of their AI implementations.

Article

Smarter AppSec: How AI is Revolutionizing Web Application Scanning

Explore how AI is revolutionizing web application scanning. Learn to secure modern apps with smarter, developer-first SAST and DAST tools that find and prioritize real threats, helping developers fix vulnerabilities faster.

Article

Slopsquatting: New AI Hallucination Threats and Mitigation Strategies

Discover how slopsquatting is emerging as a serious AI hallucination threat and learn practical mitigation strategies to protect your content and ensure AI accuracy with Snyk.

Article

Generative AI vs. Predictive AI: A Practical Guide for Security Professionals

Get a practical roadmap for implementing Generative and Predictive AI in cybersecurity. This guide provides decision factors, budgets, timelines, and phased plans to help you choose the right AI strategy for your organization's security needs.

Article

Generative AI vs Predictive AI: Understanding the types of AI

Explore Generative vs. Predictive AI in cybersecurity. Learn how one creates new content for simulations while the other forecasts threats. Combine both AI types to build an adaptive defense and stay ahead of modern attacks.

Article

5 Tips for Agentic Coding with Gemini CLI

Unlock secure agentic coding with Gemini CLI. Learn five tips, including using GEMINI.md for project context, integrating Snyk for security scans, and leveraging custom commands to automate your workflow.

Article

AI TRiSM: A Comprehensive Framework for Responsible AI Implementation

Discover what AI TRiSM is, why it matters, and how it ensures trust, risk, and security in artificial intelligence. Learn key strategies to manage AI responsibly.

Article

Package Hallucination: Impacts and Mitigation

Malicious actors can exploit errors in generative AI tools, and packages can hallucinate. Learn how to identify and mitigate package hallucination attacks with Snyk

Article

Transforming Healthtech Security Through Automation

Explore how automation enhances cybersecurity and operational efficiency in Healthtech, ensuring robust data protection.

Article

What Is Prompt Engineering? A Practical Guide for Developers and Teams

Learn what prompt engineering is, how it improves LLM outputs, and the tools and techniques you need to write effective, secure AI prompts.

Article

How To Run Models (LLM) Locally with Docker

Master how to run Large Language Models (LLMs) locally with Docker. This quick-start guide is for developers who want to learn more about the process of setting up models to run locally on their laptop.

Snyk Code prevents Trojan Source attacks
Article

Preventing XXE Attacks: Strategies for Secure XML Processing

Discover how to safeguard your XML processes against XXE vulnerabilities with advanced prevention techniques.

Article

AI Inference in Cybersecurity: Real-Time Threat Detection at Scale

Discover what AI inference is, how it powers real-time decision-making in machine learning models, and why it's crucial for edge computing and business innovation.

Article

DAST and Compliance: Bridging the Gap Between Regulation and Innovation

Discover how DAST bridges the gap between compliance and innovation, empowering teams to meet regulatory standards while accelerating secure development.

Article

AI Model Theft: Understanding the Threat Landscape and Protective Measures

Model theft attacks occur when an attacker gains access to the model's parameters. Find out how to prevent and mitigate LLM threats and security risks.

Article

Dark AI: Exploring the Shadows of Artificial Intelligence

Explore how dark AI is transforming cybercrime, the threats it poses to data privacy, and how proactive security can help organizations stay ahead.