Skip to main content

Resources

Ebook

5 Critical Capabilities for Progressing Your DevSecOps Program

Read now

Report

Why the Fastest Technology Organizations Choose Snyk

Read now

Cheat sheet

What You Need to Know About OWASP

Read now
Type
Topic

Showing 1 - 12 of 279 resources

Article

Static Application Security Testing (SAST) Tools

Learn more about Static Application Security Testing (SAST), its pros and cons, and how it can help you to keep your source code secure.

Article

Getting started with capture the flag

If you're new to CTFs or looking to sharpen your skills, understanding how they work is key to success. This article breaks down the importance of CTFs in cybersecurity—how they help you develop critical security skills, understand real-world vulnerabilities, and improve your ability to defend systems effectively.

Article

Risk-Based Vulnerability Management (RBVM): What is it & how to implement

Risk-based vulnerability management (RBVM) is a relatively new AppSec practice that empowers organizations to see their risk in context and prioritize the most critical fixes.

Buyer's Guide

Developer Security Tools Buyer’s Guide

This guide discusses all aspects of developer security tools that buyers should consider when looking for a new developer-first security tool.

Article

Tensor Steganography and AI Cybersecurity

Tensor steganography exploits two key characteristics of deep learning models: the massive number of parameters (weights) in neural networks and the inherent imprecision of floating-point numbers. Learn about this novel technique that combines traditional steganography principles with deep-learning model structures.

AppSec
Article

Security Risks with Python Package Naming Convention: Typosquatting and Beyond

Beware of typosquatting and misleading Python package names—one small mistake in pip install can expose your system to backdoors, trojans, and malicious code. Learn how attackers exploit package naming conventions and discover best practices to secure your open-source supply chain.

Cheat Sheet

What You Need to Know About ISO 27001

eBook

Developer security best practices in a fast growing technology company

Secure your software development lifecycle with AI-powered remediation, risk-based prioritization, and CI/CD security. Discover how Snyk helps tech teams build fast while staying secure.

Cheat Sheet

What You Need to Know About OWASP

Cheat Sheet

What you need to know about CRA

Cheat Sheet

What You Need to Know About PCI DSS 4.0

eBook

5 Critical Capabilities for Progressing Your DevSecOps Program