Skip to main content

Narrow Your Search

Type

Topic

Reset filters

Showing 1 - 12 of 98 resources

DevSecOps is Dead…or is it?
White Paper

DevSecOps is Dead…or is it?

Learn why DevSecOps has fallen short and discover a new framework to align security with development goals.

The anatomy of a successful DevSecOps program
Webinar

The anatomy of a successful DevSecOps program

Our on-demand webinar discussed the state of DevSecOps in 2024.

wordpress-sync/feature-code-scan-blue
Article

Improving your Java application with Records

Java Records revolutionizes the way you create data-centric classes in Java, offering a concise and secure approach. Embrace Java Records and unlock efficient and maintainable Java development.

Securing AI-Generated Code in Banking
Webinar

Securing AI-Generated Code in Banking

wordpress-sync/feature-screenshot-mockup
Article

Getting started with Practical Rego

Read this guide introducing Rego, a declarative policy language, for programmers familiar with imperative languages like Python or Java. It covers key concepts, common pitfalls, and best practices for writing effective Rego policies.

wordpress-sync/feature-snyk-code-orange
Article

JavaScript Static Analysis with ESLint and Biome

Biome, a new tool in the JavaScript ecosystem, combines code formatting and quality linting. It offers speed and performance advantages over traditional tools like ESLint and Prettier, making it a compelling alternative. With its integration into development environments like VS Code and potential adoption by major projects, Biome is poised to reshape the way JavaScript developers approach code quality and formatting.

wordpress-sync/feature-5FoCS4
Article

Oops I built a feature and created an Open Redirect Vulnerability in a Deno app

Build your first Deno web application with a step-by-step guide. Learn how to implement a redirect feature while avoiding common security pitfalls like open redirect vulnerabilities. Secure your Deno app with best practices and discover how to set up a Deno development environment in GitHub Codespaces.

blog-feature-ai-blue
Article

How Snyk Helps with the OWASP Software Assurance Maturity Model

Read how the OWASP Software Assurance Maturity Model (SAMM) and Snyk can work together to provide an effective approach to measuring, managing, and improving your software security. Learn about the key benefits, practical implementation steps, and the specific tools offered by Snyk to support your organization's security journey.

Unsolved Problems in AppSec
Webinar

Unsolved Problems in AppSec

Understanding, Creating & Curating SBOMs
Webinar

Understanding, Creating & Curating SBOMs

Prioritizing your AppSec Issues
Webinar

Prioritizing your AppSec Issues

AI Guardrails for AppSec
Webinar

AI Guardrails for AppSec