Skip to main content

Resources

Ebook

5 Critical Capabilities for Progressing Your DevSecOps Program

Read now

Cheat sheet

Why the fastest tech organizations choose Snyk

Read now

Cheat sheet

What You Need to Know About OWASP

Read now
Type
Topic

Showing 73 - 96 of 458 resources

Video

How to Create YOUR OWN (Secure) VS Code Color Theme!

Video

9 Docker Pro Tips that will LEVEL UP your Skills

Article

What Is Shadow AI? Preventing and Managing AI Risks

Explore the growing risks of shadow AI in software development. Learn about the common AI tools used in shadow AI, the associated risks, and how to implement the necessary security measures.

Article

The Future of Web Application Security: 4 Trends for Organizations to Stay Ahead

Explore the future of web application security—AI-driven defense, automation, Zero Trust, and proactive strategies to stay ahead of evolving threats.

Video

Why You Should be AFRAID of PDF Files - PDF.js CVE-2024-4367

Video

How to Securely Publish a VS Code Extension

Article

What is an AI Accelerator, and How Does it Work?

Discover how AI accelerators improve AI performance, from training models to real-time inference. Learn about the key types of AI accelerators, their benefits, and the challenges of integration. Explore how Snyk can help secure your AI-generated code and ensure safe deployment.

Video

How to prevent SSRF Attacks in Node.js

Video

How to Build a Secure NPM Package for ESM and CJS

Video

Top 5 VS Code SECURITY Extensions

eBook

DevSecOps Is Just The Beginning: Why Modern Security Teams Need a Transformation (And How They Can Do It)

Learn how to embed security into developer workflows, align your approach with how software is built today, and empower your teams to secure at speed and scale.

Video

Can OpenAI's GPT 4.1 Write Secure Code?

Video

10 Node.js runtime features you SHOULD be using in 2024

Video

How to Use GitHub Actions Environment Variables and Secrets

Video

Why you NEED an Open Source Vulnerability Scanner

Article

What is a Data Poisoning Attack?

It’s important to protect AI models from data poisoning, an attack that injects corrupt data. Learn key strategies to detect, prevent, and mitigate risks.

Article

ChatGPT and Secure Coding: Benefits and Security Vulnerabilities of ChatGPT-Generated Code

Using ChatGPT for coding has benefits but can also introduce security vulnerabilities. Learn more about ChatGPT and secure coding and how to offset risk here.

Article

Leveraging Generative AI with DevSecOps for Enhanced Security

Learn about the top advantages of secure AI coding tools for stronger DevSecOps practices with Snyk.

Article

What is RAG, and How to Secure It

Learn how Retrieval-Augmented Generation improves LLMs with your data. Understand critical RAG security risks & discover best practices to protect your AI.

Video

How to Choose the Best and Secure Node.js Docker Image

Video

Top 3 JWT Security Best Practices for Your Apps

Video

Is AI Coding Safe? ChatGPT vs DeepSeek

Article

AI Attacks and Adversarial AI in Machine Learning

Bad actors can alter machine learning systems through adversarial AI attacks. Learn about common attack types and how to safeguard your systems here.

Video

ChatGPT's NEW Model Almost Got Me FIRED...