Skip to main content

Resources

White paper

5 Common AppSec Challenges in FinServ

Read now

Ebook

5 Critical Capabilities for Progressing Your DevSecOps Program

Read now

Ebook

Optimizing AppSec in the technology sector: Strategies & Challenges

Read now
Type
Topic

Showing 37 - 48 of 295 resources

Article

Understanding Security Automation

Learn more about security automation, a practical necessity for any successful software operation. Identify incoming cyberthreats and prioritize remediation actions.

Article

Software Security Explained

Learn more about software security, proper tools and processes to identify and remediate software bugs. Connection to application security, secure SDLC and more.

Article

Benefits of security analytics

Learn more about security analytics, a proactive security approach that detects advanced security threats with artificial intelligence and machine learning.

Article

White box testing basics: Identifying security risks early in the SDLC

This article will help you to understand what white box testing is, the pros and cons, and techniques for white box testing.

Article

Cloud Compliance Explained

What is cloud compliance, and how do you bring your cloud environment into compliance with different standards and controls whilst following best practices?

Article

Guide to Software Composition Analysis: 5 key challenges of SCA

The code driving many—in fact, most—applications today includes open source components.

Article

What is ASPM? (Application Security Posture Management)

Application security posture management (ASPM) overview - Learn how to strengthen app security using holistic visibility, automation & robust security measures.

Article

The Importance of Policy as Code in Your Compliance Strategy 

Learn why compliance as code should become a key part of your overall security strategy, enabling security at scale based on automated Policy as Code rules.

Article

OpenCart Vulnerability Research (v4.0.2.3/3.0.3.9)

Discover the security vulnerabilities in OpenCart's admin and customer functionalities, including XSS, Zip Slip, and SQL Injection exploits. Learn how these flaws impact e-commerce systems and how attackers can exploit them for remote code execution.

Article

How to prevent prototype pollution vulnerabilities in JavaScript

Safeguard your JavaScript applications from prototype pollution vulnerabilities. Learn how to prevent attackers from infiltrating object prototypes with malicious code, jeopardizing your data and application security. Read about effective strategies, leverage Snyk's potent tools, and shield your JavaScript projects from this critical threat.

Article

Getting started with JavaScript static analysis

Static analysis tools are a must-have for JavaScript developers. They automatically scan your code for errors, security vulnerabilities, and formatting issues. This helps you write better code faster and improve your overall development process.

Article

Proxmox VE CVE-2024-21545 - Tricking the API into giving you the keys

Read about a critical vulnerability (CVE-2024-21545) in Proxmox VE that allows attackers to gain full control of the system. By exploiting a flaw in the API handling, attackers with limited permissions can steal sensitive files and forge session tokens for a complete system takeover.