Skip to main content

Resources

Report

2026 State of Agentic AI Adoption

Read now

White paper

From First Prompt to Final Fix: How Snyk Secures AI-Driven Development

Read now

Report

Unifying Control for Agentic AI With Evo By Snyk

Read now

Article

From SKILL.md to Shell Access in Three Lines of Markdown: Threat Modeling Agent Skills

Read now
Type
Topic

Showing 73 - 96 of 353 resources

Article

How chat memory manipulation can ruin your AI system

Discover how chat memory manipulation can disrupt AI performance, lead to data drift, and compromise user trust. Learn key risks, real-world examples, and how to safeguard your AI systems.

security incident management
Article

API Security in Telemedicine: Protecting Sensitive Patient Data

Explore how secure APIs are essential for telemedicine, addressing data privacy, compliance, and protecting sensitive patient information across platforms.

Article

How to Dockerize MCP Servers in JavaScript

Learn how to Dockerize your JavaScript MCP server. This guide covers creating a Dockerfile and setting up GitHub Actions for automated building, publishing, and signing.

Article

Balancing Efficiency and Security: API Protection in E-commerce

Learn essential strategies to secure retail APIs, protect customer data, and enhance e-commerce trust by mitigating API vulnerabilities and risks.

Article

AI Bill of Materials (AIBOM) for Python Developers: Mapping Your AI Dependencies with Snyk

Snyk's new experimental AIBOM tool helps Python developers by providing automated discovery & cataloging of AI dependencies across your projects.

Article

Protecting Financial APIs: Strategies for Preventing Data Breaches

Explore the key challenges and essential strategies for securing financial APIs, from data privacy and compliance to reducing risks in complex environments.

Article

Understanding AISPM: Securing the AI Lifecycle

Learn what AISPM is, why it matters, and how it helps organizations secure AI systems, reduce risk, and support safe, scalable innovation.

Article

What is Bias in AI? Challenges, Prevention, & Examples

Learn what bias in AI is, why it matters, and how to detect and prevent it with real-world examples and best practices.

Article

Stop Data Exfiltration Before It Starts: 9 Proven Strategies

Learn 9 strategies to detect and prevent data exfiltration from insider threats to AI-powered attacks before sensitive data leaves your environment.

Article

From Innovation to Protection: Ensuring Data Security in Healthcare

Secure patient data and Health Tech innovations against evolving cyber threats. Discover strategies for continuous security, from embedding automated testing in your CI/CD pipelines to performing regular risk assessments.

Article

Breaking Down Silos: Collaboration Between Developers and Security Teams

Bridge the gap between developers and security teams. Learn how shared tools, aligned goals, and collaboration can drive secure, high-quality applications faster.

Article

AI Intrusion & Anomaly Detection: Approaches, Tools, and Strategies

Explore AI intrusion detection systems (IDS) and anomaly detection strategies. Learn how ML and deep learning secure AI models against emerging threats and what tools and approaches to use.

Article

Helping Gemini Code Assist to Generate Secure Code

Learn how Snyk's MCP server integrates with Gemini Code Assist to automatically scan and fix security vulnerabilities in AI-generated code, ensuring secure development workflows.

Article

9 MCP Servers for Computer-Aided Drafting (CAD) with AI

Explore 9 Model Context Protocol (MCP) servers transforming Computer-Aided Drafting (CAD) with AI. Automate tasks from sketching to assembly modeling across platforms like AutoCAD, Fusion 360, FreeCAD, and Onshape, and learn how to secure your AI-generated designs.

Article

OpenRouter in Python: Use Any LLM with One API Key

Simplify AI development by using OpenRouter to access dozens of LLMs with a single API key in Python. Learn the bare-bones implementation and explore features like model routing, streaming, and vision models, all while building securely with Snyk.

Article

From Development to Deployment: Building an AI-Driven Secure Web Application Ecosystem

Discover the critical challenges of securing modern web applications, from handling complex APIs to combating advanced, AI-driven threats. Learn how to integrate robust, AI-powered security measures effectively at every stage of the development lifecycle.

Article

Modern Technology Environments Demand Modern Application Security Testing

Legacy security testing tools fail to protect modern applications. Learn the hallmarks of a modern, developer-first DAST solution built for today's complex CI/CD pipelines and APIs.

Article

How Cryptojacking Works and How to Defend Against It

Learn what cryptojacking is, how it works, and how to detect and prevent hidden crypto mining attacks across code, cloud, and container environments.

Article

Guardians of the Gateway: How API Security Testing Tools Protect Your Data

Explore how API security testing tools enhance digital defenses, ensuring robust protection and operational continuity.

Article

Between You and the Data: Defending Against Man-in-the-Middle Attacks

Learn how Man in the Middle (MITM) attacks work, how to detect them, and how to prevent interception risks across your code, infrastructure, and apps.

Article

Beyond the Basics: Advanced Insights into XSS Vulnerabilities

Explore XSS attacks and empower your development teams with AI-powered prevention strategies. Uncover their mechanisms and learn how to secure web applications and protect user data.

Article

Security That Thinks: How AI Is Rewriting the Rules of SecOp

Discover how AI SecOps enhances detection, reduces noise, and automates response, plus steps to implement it with the right models, data, and tools.

Article

Scaling LLMs Securely Starts with the Right Ops Framework

Learn what LLMOps is, how it differs from MLOps, and what it takes to build, scale, and secure large language models in real-world production.

Prevent code injection vulnerabilities with Snyk
Article

Decoding SQL Injection: Strategies for Secure Web Applications

Explore the intricacies of SQL Injection: learn its workings, impacts, and robust strategies to shield your web applications from this threat.