Skip to main content

Resources

Featured
Report

2024 State of Open Source Security Report

Jetzt lesen

Reading list

Buyers guide

Future-proof your development: The SAST/SCA buyer’s guide for the AI era

White paper

DevSecOps is Dead…or is it?

White paper

Discover the path to trusted software

Suche eingrenzen

Typ
Thema

Anzeige 1 - 12 von 262 ressourcen

Top 10 Node.js Security Best Practices
Article

Top 10 Node.js Security Best Practices

Read about five major Node.js security risks and the top ten best practices you can implement to address them and stay secure while building applications.

wordpress-sync/Vul-DB-launch-Header
Article

Der Secure Software Development Lifecycle (SSDLC)

Learn more about Secure Software Development Lifecycle (SSDLC), and how to integrate security at every stage of the SDLC to enhance software integrity and protect against vulnerabilities.

wordpress-sync/blog-hero-snyk-open-source-blue
Article

Apache License 2.0 Explained

Learn more about the Apache License 2.0 uses, benefits, and requirements for use in your open source projects while maintaining compliance.

wordpress-sync/Screen-Shot-2020-07-26-at-13.14.15
Article

Worum handelt es sich bei der MIT-Lizenz?

Erfahren Sie mehr über die MIT-Lizenz - eine der unkompliziertesten Open-Source-Lizenzvereinbarungen - und integrieren Sie die Lizenzeinhaltung in Ihre vorhandenen Abläufe.

wordpress-sync/ssdlc-2
Article

Software Development Life Cycle (SDLC): Phases and Methodologies

Learn more about SDLC (Software Development Life Cycle) phases and methodologies that define the entire software development procedure step-by-step.

wordpress-sync/CI-CD-infinity-copy
Article

What is CI/CD? CI/CD pipeline and tools explained

Learn more about CI/CD continuous integration and continuous delivery, CI/CD pipeline, and framework. CI/CD as the foundation for DevSecOps.

Was sind Schwachstellen-Scanner und wie funktionieren sie?
Article

Was sind Schwachstellen-Scanner und wie funktionieren sie?

Hier erfahren Sie alles, was Sie 2023 über Schwachstellen-Scanner, die verschiedenen Typen, ihre Funktionsweise und die Auswahl des richtigen Angebots wissen sollten.

wordpress-sync/prioritize-vulns-header-2
Article

Vulnerability Assessment: Tools and Steps to Improve Security Posture

Learn more about vulnerability assessment to stay secure and efficiently evaluate the state of security weaknesses and flaws in your systems and environments.

wordpress-sync/Prioritisation-header-5
Article

Anwendungssicherheit: Der Guide

Jede Aktion zur Beseitigung von Schwachstellen, alle Maßnahmen zur Stärkung des Security-Status und zum Schutz sensibler Daten, in sämtlichen Phasen des App-Lifecycle: Das ist Anwendungssicherheit.

wordpress-sync/state-of-cloud-native-application-security-report-post
Article

Cloud-Sicherheit: Kernsäule für Cybersecurity

Die Sicherheit ihrer Services ist für Public-Cloud-Provider essenziell, baut ihr Geschäftsmodell doch in erster Linie auf dem Vertrauen ihrer Kunden auf. Zugleich verschwimmen durch ihre Nutzung zunehmend die Grenzen zwischen Cloud- und klassischer On-Prem-Infrastruktur.

Security Champions Overview
Article

Security Champions Overview

Security champions are developers with an interest in security and a home in development. They are the interface between two teams that have traditionally been siloed. Let’s take a look at some of the benefits any organization can gain from these programs.

Product Security vs. Application Security: What’s the Difference?
Article

Product Security vs. Application Security: What’s the Difference?

Discover the differences between product and application security to build more secure products and applications.