Skip to main content

Resources

Ebook

5 Critical Capabilities for Progressing Your DevSecOps Program

Read now

Cheat sheet

Why the fastest tech organizations choose Snyk

Read now

Cheat sheet

What You Need to Know About OWASP

Read now
Type
Topic

Showing 145 - 168 of 494 resources

Video

How Dark Mode Got Me Hacked

Video

Application Security 101: A Simple Guide

Video

How to Build a Discord Bot (Part 1)

Article

The Risks and Impact of Data Leakage: Data Leakage Causes and Prevention

Knowing the risks and impact of data leakage can help protect your organization. Learn more about data leakage, its causes, and how to prevent it here.

Video

How to Build a Discord Bot in 16 Minutes (Part 2)

Video

A Simple Guide to Building a Discord Bot! (Part 3)

Video

A Simple Guide to Building a Discord Bot! (Part 4)

Video

Everything you NEED to know about DevSecOps in 5 Minutes

Article

What is LLMjacking? How AI Attacks Exploit Stolen Cloud Credentials

Attackers can exploit cloud LLMs through stolen credentials. Learn more about LLMjacking and how to protect your organization here.

Video

The Ultimate Guide to Building and Publishing Modern npm Packages (PART 1)

Video

How to Build a Production Ready npm Package (PART 2)

Video

NPM Security & Versioning: How to Keep Your Packages SAFE!

Video

Vibe Coding with Claude Code (Claude Agentic AI Tool)

Video

Can Vibe Coding Build Secure Apps? (GitHub Copilot Agent Mode)

Error rendering ComposeContentTags

Article

What is MCP in AI? Everything you wanted to ask

MCP (Model Context Protocol) is Anthropic’s specification for how LLMs (large language models) would communicate, share data, and leverage external resources beyond the model’s data.

Video

The CRITICAL Next.js Vulnerability you NEED to be aware of...

Video

Security Terms You Need to Know | XSS, CSRF, VPN, Malware, CVE

Video

Exploiting Vulnerabilities in Cursor AI Code

Article

What is Cloud Security Architecture? Principles, Framework, and Architecture Assessment

Protect your organization in the cloud with a robust cloud security architecture. Learn more about cloud security architecture and its importance.

Podcast

Authentication, Authorization, And The Future Of AI Security With Alex Salazar

Episode 161

Article

AI Data Security: Risks, Frameworks, and Best Practices

Learn about the top data security risks of AI, along with frameworks for understanding protection and best practices for choosing AI tools.

eBook

Beyond the Vulnerability Backlog: Building Risk-Based AppSec Programs

Article

7 Surprising Roadblocks on the Path to DevSecOps Maturity

Understand how your organization's DevSecOps maturity compares to industry benchmarks. Learn about common challenges in risk reduction, security fatigue, and developer adoption. Get the insights.