Skip to main content

Recursos

Ebook

5 Critical Capabilities for Progressing Your DevSecOps Program

Leer ahora

Cheat sheet

Why the fastest tech organizations choose Snyk

Leer ahora

Cheat sheet

What You Need to Know About OWASP

Leer ahora
Tipo
Tema

Mostrando 97 - 120 de 458 recursos

Video

Can AI Solve This Meme? (Automating with AI)

Article

Achieving Security Coverage and Control Over Application Risk

Stop reacting to vulnerabilities. Build proactive application security with universal asset visibility, smart policies, and risk-based prioritization. Secure your SDLC.

Video

How to Spin Up Prototype Apps Fast! (GitHub Spark)

Video

How Secure is this NEW AI Coding Tool? Bolt by Stackblitz

Video

Understanding CSRF and SSRF Attacks (Demo and Examples)

Article

OWASP Top 10 Code Vulnerabilities and How SAST Can Stop Them

Discover the OWASP Top 10 vulnerabilities and how SAST tools like Snyk Code empower developers to detect and fix them early in the development lifecycle.

Video

Claude AI BLEW MY MIND! (Board Game Challenge)

Video

How to Secure a REST API

Video

How I Completed My First Reverse Shell (TryHackMe)

Video

Most Important Asset for Web Developers (Web Almanac)

Article

Navigating the Challenges of GenAI Adoption for Modern AppSec Teams

With an increase in GenAI adoption, AppSec teams face challenges. Learn what challenges AppSec teams are facing and how they can address risks with Snyk.

Article

14 MCP Servers for UI/UX Engineers

As LLMs' capabilities continue to expand through Anthropic’s Model Context Protocol (MCP), UI/UX engineers have access to a growing ecosystem of specialized tools that can significantly enhance their workflows. This article explores 14 open-source MCP servers for UI/UX professionals.

Video

How Dark Mode Got Me Hacked

Video

Application Security 101: A Simple Guide

Video

How to Build a Discord Bot (Part 1)

Article

The Risks and Impact of Data Leakage: Data Leakage Causes and Prevention

Knowing the risks and impact of data leakage can help protect your organization. Learn more about data leakage, its causes, and how to prevent it here.

Video

How to Build a Discord Bot in 16 Minutes (Part 2)

Video

A Simple Guide to Building a Discord Bot! (Part 3)

Video

A Simple Guide to Building a Discord Bot! (Part 4)

Video

Everything you NEED to know about DevSecOps in 5 Minutes

Article

What is LLMjacking? How AI Attacks Exploit Stolen Cloud Credentials

Attackers can exploit cloud LLMs through stolen credentials. Learn more about LLMjacking and how to protect your organization here.

Video

The Ultimate Guide to Building and Publishing Modern npm Packages (PART 1)

Video

How to Build a Production Ready npm Package (PART 2)

Video

NPM Security & Versioning: How to Keep Your Packages SAFE!