[go: up one dir, main page]

You need to enable JavaScript to run this app.
Skip to main content

Articles

Stay informed on security insights and best practices from Snyk’s leading experts.

Showing 1 - 20 of 314 articles

From Models to Compound AI Systems: Building the Future of AI

AI systems combine multiple AI models and tools to tackle complex tasks, for enhanced performance, versatility, & reliability.

Let AI Detect and Patch Your Vulnerable Code: Claude Desktop and Snyk MCP Server

Integrate Claude Desktop with Snyk's official MCP Server to enhance security in your development workflow. Learn how to set up, configure, and use Snyk's security scanning tools to detect and patch vulnerabilities, streamlining DevSecOps and securing your code.

Context Engineering: Building Intelligent AI Systems Through Strategic Information Management

Discover how context engineering shapes AI behavior, enhances user experience, and drives intelligent automation.

Secure at Inception: The New Imperative for AI-Driven Development

Traditional security is too slow for AI-driven development. Learn about "Secure at Inception," a new approach that proactively prevents vulnerabilities in AI-generated code and clears backlogs with AI-Accelerated Remediation.

Introducing open source security runtime monitoring

$800K+ Up for Grabs: 12 AI Hacking Competitions That Could Launch Your Security Career

Survey the best AI security competitions in Q4 2025 and beyond. Discover 12 AI hacking competitions with over $800,000 in prizes, organized by difficulty, to launch your security career.

Preventing Path Traversal Vulnerabilities in MCP Server Function Handlers

Learn how to secure your MCP servers with best practices and Snyk Code's SAST tool to detect and fix security issues before they become a problem.

prioritize the security backlog

Unlocking Digital Health: Mastering Asset Discovery in Healthtech

Explore the vital role of asset discovery in safeguarding Healthtech, ensuring robust security and compliance.

What is the MIT License?

Learn more about the MIT License - one of the simplest open source license agreements - and integrate license compliance into your existing workflows.

Ethical Hacking: Skills & Training

Both technical and non-technical skills are required for ethical hacking, find out what you need to learn, and where to learn it!

Ethical Hacking: Certifications

Ethical hacking certifications are a key part of learning. Find out which certifications are popular and how to prepare for ethical hacking exams.

Cybersecurity audit types explained

Learn the different types of security audits, when you should use each of them, and where to integrate audits into existing security pipelines.

Understanding Cloud Security - Essential to Your Cybersecurity

Public cloud providers prioritize security since their business model requires maintaining public trust, yet the perimeters that bound traditional on-site IT infrastructure disappear in the cloud.

How is AI being used in cybersecurity?

Learn how the emergence of AI is changing organizations' approaches to cybersecurity, leveraging different AI models to improve the efficiency of cybersecurity programs.

SAST vs. SCA testing: Strengths, Limitations, Implementation Best Practices & Integration

Learn about SAST vs. SCA testing and how to leverage them to release secure software and produce truly secure applications.

Protecting the Heart of Healthcare: Cybersecurity Strategies and Solutions

Explore the essentials of healthcare cybersecurity and learn how to protect sensitive patient data from cyber threats effectively.

Static Application Security Testing (SAST) Scanning

Learn more about the 7 stages of Static Application Security Testing (SAST) scanning, its pros and cons, and how it can help keep your source code secure.

Complete Guide to Application Security: Tools & Best Practice

Application Security is defined as the actions taken during the development lifecycle of an application to reduce vulnerabilities, improve security, and protect sensitive data.

How chat memory manipulation can ruin your AI system

Discover how chat memory manipulation can disrupt AI performance, lead to data drift, and compromise user trust. Learn key risks, real-world examples, and how to safeguard your AI systems.

Top 5 Tips to Choose the Right DAST Tool

Choosing the right DAST tool is crucial for safeguarding your web apps and APIs from evolving threats, especially with the accelerated pace of AI-powered development. Learn more about the 5 essential factors to consider when selecting a DAST tool.

Guide to Software Composition Analysis: 5 key challenges of SCA

The code driving many—in fact, most—applications today includes open source components.