Skip to main content

リソース

Ebook

5 Critical Capabilities for Progressing Your DevSecOps Program

今すぐ読む

Ebook

Optimizing AppSec in the technology sector: Strategies & Challenges

今すぐ読む
種類
トピック

表示中 1 - 12 / 298 リソース

eBook

From basics to best practices: Building a strong AppSec program

SAST・SCAツールの活用、セキュリティ重視の文化づくり、そしてAI戦略の統合など、モダンで安全かつ革新的な開発を実現するための強固なアプリケーションセキュリティプログラム構築のヒントをご紹介します。

White Paper

How security teams can engage developers in security programs

開発者をセキュリティプログラムに巻き込み、強固なアプリケーションを構築する方法をご紹介します。本ホワイトペーパーでは、開発プロセスへのセキュリティ統合と、その過程で直面しがちな課題の克服方法について解説しています。

eBook

CISOのための、生成AIを安全に活用するためのガイド

Article

ソフトウェアサプライチェーンのセキュリティ

ソフトウェアサプライチェーンのセキュリティについてさらに詳しく説明します。組織にとっての重要性や、Snyk を使った安全保護についても解説します。

Article

AI Glossary

Snyk’s glossary for learning about AI, including its science, common AI use cases, and how it relates to cybersecurity.

Article

What is Cloud Security Architecture? Principles, Framework, and Architecture Assessment

Protect your organization in the cloud with a robust cloud security architecture. Learn more about cloud security architecture and its importance.

Article

In Localhost We Trust: Exploring Vulnerabilities in Cortex.cpp, Jan’s AI Engine

Discover critical security vulnerabilities recently found in Cortex.cpp, the engine behind the local AI platform Jan AI, revealing that self-hosted AI isn't automatically secure. Learn how attackers could exploit these flaws and the importance of prioritizing security in the growing ecosystem of on-premise AI solutions.

Podcast

Authentication, Authorization, And The Future Of AI Security With Alex Salazar

エピソード 161

Article

7 Surprising Roadblocks on the Path to DevSecOps Maturity

Understand how your organization's DevSecOps maturity compares to industry benchmarks. Learn about common challenges in risk reduction, security fatigue, and developer adoption. Get the insights.

Article

Adversarial Inputs to Image Classifiers: Understanding the Threat of Adversarial AI

Explore the vulnerabilities of AI image classifiers to adversarial attacks. Understand techniques like C&W, PGDL2, DeepFool, their implications, and the importance of AI security.

Article

The Essential Guide to AI Bills of Materials (AIBOMs)

This guide is your one-stop shop on AI Bill of Materials (AIBOMs). Learn how to build an inventory of your AI model.

Article

AI Attacks & Threats: What are they and how do they work?

Discover more about AI cyber-attacks: what they are, how they work, and how to protect your business against them.