Skip to main content

Resources

White paper

5 Common AppSec Challenges in FinServ

Read now

Ebook

5 Critical Capabilities for Progressing Your DevSecOps Program

Read now

Ebook

Optimizing AppSec in the technology sector: Strategies & Challenges

Read now
Type
Topic

Showing 1 - 12 of 298 resources

eBook

From basics to best practices: Building a strong AppSec program

Learn to build a strong AppSec program with insights on SAST, SCA tools, fostering a security-focused culture, and integrating AI strategies for modernized, secure, and innovative development.

White Paper

How security teams can engage developers in security programs

Learn how to engage developers in security programs to create resilient applications. This whitepaper covers integrating security into development and overcoming common challenges.

eBook

CISOs Guide to Safely Unleashing Power of Gen AI

Article

Software Supply Chain Security

Learn more about software supply chain security, why it’s important to organizations, and how you can secure your supply chains with Snyk.

Article

AI Glossary

Snyk’s glossary for learning about AI, including its science, common AI use cases, and how it relates to cybersecurity.

Article

What is Cloud Security Architecture? Principles, Framework, and Architecture Assessment

Protect your organization in the cloud with a robust cloud security architecture. Learn more about cloud security architecture and its importance.

Article

In Localhost We Trust: Exploring Vulnerabilities in Cortex.cpp, Jan’s AI Engine

Discover critical security vulnerabilities recently found in Cortex.cpp, the engine behind the local AI platform Jan AI, revealing that self-hosted AI isn't automatically secure. Learn how attackers could exploit these flaws and the importance of prioritizing security in the growing ecosystem of on-premise AI solutions.

Podcast

Authentication, Authorization, And The Future Of AI Security With Alex Salazar

Episode 161

Article

7 Surprising Roadblocks on the Path to DevSecOps Maturity

Understand how your organization's DevSecOps maturity compares to industry benchmarks. Learn about common challenges in risk reduction, security fatigue, and developer adoption. Get the insights.

Article

Adversarial Inputs to Image Classifiers: Understanding the Threat of Adversarial AI

Explore the vulnerabilities of AI image classifiers to adversarial attacks. Understand techniques like C&W, PGDL2, DeepFool, their implications, and the importance of AI security.

Article

The Essential Guide to AI Bills of Materials (AIBOMs)

This guide is your one-stop shop on AI Bill of Materials (AIBOMs). Learn how to build an inventory of your AI model.

Article

AI Attacks & Threats: What are they and how do they work?

Discover more about AI cyber-attacks: what they are, how they work, and how to protect your business against them.