Skip to main content

Security fundamentals

Core fundamentals in the art and science of security

Showing 61 - 80 of 164 articles

wordpress-sync/blog-feature-snyk-apps

Application Security

Application Security Controls Explained

wordpress-sync/blog-hero-snyk-container-purple

Container Security

Container registry security: security concerns for using a container registry

wordpress-sync/blog-hero-snyk-container-purple

Container Security

The Importance of Container Monitoring

wordpress-sync/blog-hero-global-service

Open Source Security

Software Bill Of Materials (SBOM) Explained: Why SBOMs are essential for cybersecurity

wordpress-sync/blog-hero-snyk-iac-green

CI/CD

Blue Green Deployment Strategy Explained

wordpress-sync/Advancing-DevSecOps-1

DevSecOps

Continuous security within DevSecOps

wordpress-sync/blog-feature-snyk-code-party

Open Source Security

Fintech cybersecurity: How to build securely with open source

wordpress-sync/blog-hero-snyk-apps

Container Security

Microservices security: 6 best practice tips

wordpress-sync/blog-hero-shift-left-dev-purple

SDLC

Agile SDLC: Benefits and implementation

wordpress-sync/blog-feature-snyk-container-pink

Container Security

CaaS: Container as a Service Explained

wordpress-sync/blog-hero-snyk-open-source-blue

Open Source Licenses

Apache License 2.0 Explained

wordpress-sync/blog-hero-snyk-seurity-policies

SDLC

10 SDLC best practices to implement today

wordpress-sync/blog-hero-snyk-secure-java

Code Security

7 best Java code review tools for developers

wordpress-sync/blog-hero-trojan-source-unicode

Code Security

8 proven code review best practices for developers

wordpress-sync/blog-hero-snyk-code-dark

Code Security

Why you should implement an automated code review process

wordpress-sync/Container-scanning-1-4

Container Security

Building a Strong Container Security Foundation

wordpress-sync/blog-hero-snyk-iac-magenta

Cybersecurity Exploits

What Are Security Misconfigurations and How Can You Prevent Them?

wordpress-sync/blog-hero-snyk-code-green

Code Security

The Three Pillars for Implementing Secure Coding Standards

wordpress-sync/blog-hero-fast-sast

Application Security

SAST vs. SCA testing: What’s the difference? Can they be combined?

wordpress-sync/state-of-cloud-native-application-security-report-post

Application Security

Application Vulnerability: Avoiding Code Flaws and Security Risks