Skip to main content

Ressourcen

White paper

5 Common AppSec Challenges in FinServ

Jetzt lesen

Ebook

5 Critical Capabilities for Progressing Your DevSecOps Program

Jetzt lesen

Ebook

Optimizing AppSec in the technology sector: Strategies & Challenges

Jetzt lesen
Typ
Thema

Anzeige: 1 - 12 von 298 ressourcen

eBook

From basics to best practices: Building a strong AppSec program

Strategische SAST-Insights, SCA-Tools, Implementierung einer Dev-Kultur mit Security als Säule und Integration von KI-Strategien: So gestalten Sie ein starkes AppSec-Programm und innovative Developer Security.

White Paper

How security teams can engage developers in security programs

So werden Dev-Teams zu Erfolgspartnern Ihres Security-Programms. In diesem Whitepaper zeigen wir, wie sich Security in Dev Cycles integrieren lässt und dabei gängige Herausforderungen adressiert werden können.

eBook

Das Potenzial von GenAI sicher nutzen: Der Guide für CISOs

Article

Sicherheit für die Software-Lieferkette

Alles über Sicherheit in der Software-Lieferkette, ihre Bedeutung und darüber, wie Sie sie mit den Tools von Snyk durchgängig gewährleisten.

Article

AI Glossary

Snyk’s glossary for learning about AI, including its science, common AI use cases, and how it relates to cybersecurity.

Article

What is Cloud Security Architecture? Principles, Framework, and Architecture Assessment

Protect your organization in the cloud with a robust cloud security architecture. Learn more about cloud security architecture and its importance.

Article

In Localhost We Trust: Exploring Vulnerabilities in Cortex.cpp, Jan’s AI Engine

Discover critical security vulnerabilities recently found in Cortex.cpp, the engine behind the local AI platform Jan AI, revealing that self-hosted AI isn't automatically secure. Learn how attackers could exploit these flaws and the importance of prioritizing security in the growing ecosystem of on-premise AI solutions.

Podcast

Authentication, Authorization, And The Future Of AI Security With Alex Salazar

Episode 161

Article

7 Surprising Roadblocks on the Path to DevSecOps Maturity

Understand how your organization's DevSecOps maturity compares to industry benchmarks. Learn about common challenges in risk reduction, security fatigue, and developer adoption. Get the insights.

Article

Adversarial Inputs to Image Classifiers: Understanding the Threat of Adversarial AI

Explore the vulnerabilities of AI image classifiers to adversarial attacks. Understand techniques like C&W, PGDL2, DeepFool, their implications, and the importance of AI security.

Article

The Essential Guide to AI Bills of Materials (AIBOMs)

This guide is your one-stop shop on AI Bill of Materials (AIBOMs). Learn how to build an inventory of your AI model.

Article

AI Attacks & Threats: What are they and how do they work?

Discover more about AI cyber-attacks: what they are, how they work, and how to protect your business against them.