| Snyk in 30: Developer-first security democast | 
                      Jim Armstrong | 
                      Mar 02, 2023 | 
                      1538 |  
                      - | 
                    
                    
                    
                      | Demystifying HTTP request smuggling | 
                      - | 
                      Jun 30, 2020 | 
                      2721 |  
                      3 | 
                    
                    
                    
                      | Announcing the 2022 State of Open Source Security report from Snyk and the Linux Foundation | 
                      Megan Moore | 
                      Jun 21, 2022 | 
                      558 |  
                      - | 
                    
                    
                    
                      | How to successfully roll out developer-first license compliance | 
                      Guy Podjarny | 
                      Apr 23, 2020 | 
                      1366 |  
                      - | 
                    
                    
                    
                      | New OpenSSL critical vulnerability: What you need to know | 
                      Vandana Verma Sehgal | 
                      Oct 31, 2022 | 
                      1282 |  
                      2 | 
                    
                    
                    
                      | Welcoming Samantha Wessels: Snyk’s New Vice President, EMEA Sales | 
                      Dino DiMarino | 
                      Jan 10, 2022 | 
                      409 |  
                      - | 
                    
                    
                    
                      | Snyk - Your Next Career Move! | 
                      Liran Tal | 
                      Jan 04, 2019 | 
                      870 |  
                      - | 
                    
                    
                    
                      | SnykCon Day One wrap-up: Snyk Code, carbon neutrality & session highlights | 
                      Ravi Maira | 
                      Oct 22, 2020 | 
                      1319 |  
                      - | 
                    
                    
                    
                      | SnykCon 2021 recap #2: Supply chain security, the future of cybersecurity, automation as an enabler, and more | 
                      Simon Maple | 
                      Oct 08, 2021 | 
                      1802 |  
                      - | 
                    
                    
                    
                      | Snyk participates in Atlassian Remote Summit and limited-time Bitbucket Cloud promotion | 
                      Sarah Conway | 
                      Apr 01, 2020 | 
                      291 |  
                      - | 
                    
                    
                    
                      | Modern VS Code extension development: The basics | 
                      Mdu Sibisi | 
                      Sep 14, 2023 | 
                      2775 |  
                      - | 
                    
                    
                    
                      | What kind of (security) dog are you? | 
                      Belyn Lai | 
                      Aug 25, 2023 | 
                      756 |  
                      - | 
                    
                    
                    
                      | Mitigating DOM clobbering attacks in JavaScript | 
                      Keshav Malik | 
                      Aug 07, 2023 | 
                      1806 |  
                      - | 
                    
                    
                    
                      | Lessons learned from improving full-text search at Snyk with Elasticsearch | 
                      Sergey Vasilkov | 
                      Nov 04, 2021 | 
                      1747 |  
                      - | 
                    
                    
                    
                      | Improving coverage of cloud resources to reduce infrastructure drift | 
                      Stephane Jourdan | 
                      Mar 23, 2022 | 
                      2878 |  
                      - | 
                    
                    
                    
                      | CodeSecDays conference and more complete security coverage with GitGuardian | 
                      Sarah Conway | 
                      Aug 10, 2023 | 
                      989 |  
                      - | 
                    
                    
                    
                      | How Snyk is normalizing authentication strategies with Gloo Edge | 
                      Joakim Bajoul Kakaei | 
                      Jul 20, 2021 | 
                      1490 |  
                      - | 
                    
                    
                    
                      | Uncharted territory - discovering vulnerabilities in public Helm Charts | 
                      Gareth Rushgrove | 
                      Nov 18, 2019 | 
                      834 |  
                      - | 
                    
                    
                    
                      | DevSecOps tools for open source projects in JavaScript and Node.js | 
                      Liran Tal | 
                      Nov 24, 2020 | 
                      2122 |  
                      - | 
                    
                    
                    
                      | 88% increase in application library vulnerabilities over two years | 
                      Liran Tal | 
                      Feb 26, 2019 | 
                      1041 |  
                      11 | 
                    
                    
                    
                      | Snyk named to the CRN 2020 Emerging Vendor list | 
                      Anna Hester | 
                      Aug 03, 2020 | 
                      277 |  
                      - | 
                    
                    
                    
                      | Snyk users don't have to worry about NVD delays | 
                      Hadas Bloom | 
                      Mar 13, 2024 | 
                      734 |  
                      - | 
                    
                    
                    
                      | How to increase Serverless observability, monitoring and security | 
                      Liran Tal | 
                      Jul 15, 2019 | 
                      1108 |  
                      - | 
                    
                    
                    
                      | Best practices for creating a modern npm package with security in mind | 
                      Brian Clark | 
                      Sep 12, 2022 | 
                      4985 |  
                      2 | 
                    
                    
                    
                      | 10 Maven Security Best Practices | 
                      Simon Maple | 
                      Sep 26, 2018 | 
                      1759 |  
                      - | 
                    
                    
                    
                      | Launching serverless Snyk | 
                      Tim Kadlec | 
                      Nov 03, 2016 | 
                      360 |  
                      - | 
                    
                    
                    
                      | Automate cloud compliance with Snyk IaC | 
                      Lauren Place | 
                      Feb 07, 2023 | 
                      591 |  
                      - | 
                    
                    
                    
                      | Discussions on improving security through chaos engineering | 
                      Mariah Gresham | 
                      Aug 03, 2023 | 
                      966 |  
                      - | 
                    
                    
                    
                      | How to strengthen security in your CI/CD pipeline | 
                      James Konik | 
                      Jul 12, 2023 | 
                      1800 |  
                      - | 
                    
                    
                    
                      | Snyk welcomes Helios, accelerating our ASPM vision with runtime insights | 
                      Manoj Nair | 
                      Jan 16, 2024 | 
                      874 |  
                      - | 
                    
                    
                    
                      | Snyk joins OpenSSF: Tackling open source supply chain security with a developer-first approach | 
                      Guy Podjarny | 
                      Oct 19, 2021 | 
                      443 |  
                      - | 
                    
                    
                    
                      | Snyk & Trend Micro deepen collaboration with a new solution for solving open source development risks | 
                      Geva Solomonovich | 
                      Aug 27, 2020 | 
                      731 |  
                      - | 
                    
                    
                    
                      | Command line tools for containers—using Snyk with Buildah, Podman, and Skopeo | 
                      Matt Jarvis | 
                      Dec 09, 2020 | 
                      2177 |  
                      - | 
                    
                    
                    
                      | Introducing Snyk’s new Risk Score for risk-based prioritization | 
                      Gur Shafriri, Benji Catabi-Kalman | 
                      Aug 17, 2023 | 
                      1514 |  
                      - | 
                    
                    
                    
                      | Four easy ways to analyze your Java and Kotlin code | 
                      Brian Vermeer | 
                      Aug 13, 2024 | 
                      1982 |  
                      - | 
                    
                    
                    
                      | 10 Serverless security best practices | 
                      Liran Tal, Guy Podjarny | 
                      May 31, 2019 | 
                      3289 |  
                      - | 
                    
                    
                    
                      | 5 ways to improve security during digital transformation | 
                      Erin Cullen | 
                      Apr 10, 2023 | 
                      1007 |  
                      - | 
                    
                    
                    
                      | How to use AI for software development and cybersecurity | 
                      Simon Maple | 
                      Aug 30, 2023 | 
                      1755 |  
                      - | 
                    
                    
                    
                      | SnakeYaml 2.0: Solving the unsafe deserialization vulnerability | 
                      Brian Vermeer | 
                      Jun 21, 2023 | 
                      1205 |  
                      - | 
                    
                    
                    
                      | Provide granular permissions and groups for users in Azure Repos | 
                      Simon Maple | 
                      May 06, 2019 | 
                      131 |  
                      - | 
                    
                    
                    
                      | Write secure Kubernetes configuration with help from Snyk | 
                      Gareth Rushgrove | 
                      Nov 18, 2019 | 
                      565 |  
                      - | 
                    
                    
                    
                      | What’s so wild about exploits in the wild - and how can we prioritize accordingly? | 
                      Rachel Cheyfitz | 
                      Nov 21, 2019 | 
                      1409 |  
                      - | 
                    
                    
                    
                      | Finding YAML Deserialization with Snyk Code | 
                      Calum Hutton | 
                      Feb 23, 2023 | 
                      799 |  
                      - | 
                    
                    
                    
                      | Announcing customized role-based access controls for Snyk | 
                      Daniel Berman | 
                      Jun 29, 2022 | 
                      1237 |  
                      - | 
                    
                    
                    
                      | Snyk announces new Slack integration | 
                      Sarah Conway | 
                      May 30, 2023 | 
                      610 |  
                      - | 
                    
                    
                    
                      | Best practices for using AI in the SDLC | 
                      Frank Fischer | 
                      Jul 19, 2023 | 
                      749 |  
                      - | 
                    
                    
                    
                      | DevOpsDays Singapore 2024: Unmasking the security pitfalls in AI-generated code | 
                      Hiroko Nakano | 
                      Apr 23, 2024 | 
                      562 |  
                      - | 
                    
                    
                    
                      | 80% of developers are not addressing Docker security | 
                      Brian Vermeer | 
                      Apr 17, 2019 | 
                      654 |  
                      2 | 
                    
                    
                    
                      | A recap from our latest PCI webinar, and compliance tips from Deliveroo | 
                      Taylor Macomber | 
                      Oct 17, 2019 | 
                      909 |  
                      - | 
                    
                    
                    
                      | How I was hacking docker containers by exploiting ImageMagick vulnerabilities | 
                      Liran Tal | 
                      Mar 11, 2021 | 
                      1153 |  
                      - | 
                    
                    
                    
                      | Instant security information with the Snyk security badge | 
                      Brian Vermeer | 
                      Aug 04, 2020 | 
                      469 |  
                      - | 
                    
                    
                    
                      | Announcing the 2022 State of Cloud Security report from Snyk | 
                      Megan Moore | 
                      Sep 13, 2022 | 
                      757 |  
                      - | 
                    
                    
                    
                      | Engineering culture at Snyk: The values that support and drive our teams | 
                      Sergey Vasilkov | 
                      May 08, 2023 | 
                      2259 |  
                      - | 
                    
                    
                    
                      | SnykCon recap: Building a developer-focused AppSec program | 
                      Mariah Gresham | 
                      Jan 27, 2022 | 
                      1051 |  
                      - | 
                    
                    
                    
                      | "Dirty Pipe" Linux vulnerability and your containerized applications (CVE-2022-0847) | 
                      Eric Smalling | 
                      Mar 09, 2022 | 
                      1180 |  
                      - | 
                    
                    
                    
                      | Security lessons with a Snyk Ambassador | 
                      Andres Haro | 
                      Oct 11, 2022 | 
                      941 |  
                      - | 
                    
                    
                    
                      | 3 tips from Snyk and Dynatrace’s AI security experts | 
                      Sarah Conway | 
                      Jan 22, 2024 | 
                      905 |  
                      - | 
                    
                    
                    
                      | Securing Go modules made easy (and accurately!) | 
                      Ariel Ornstein | 
                      Aug 07, 2019 | 
                      416 |  
                      - | 
                    
                    
                    
                      | HTTPS Adoption *doubled* this year | 
                      Guy Podjarny | 
                      Jul 20, 2016 | 
                      1349 |  
                      139 | 
                    
                    
                    
                      | Threat modelling For Node.js applications | 
                      Gergely Nemeth | 
                      Aug 31, 2016 | 
                      825 |  
                      - | 
                    
                    
                    
                      | Snyk Code, the only security tool chosen by developers in Stack Overflow's 2024 AI Search and Developer Tools survey | 
                      Liqian Lim (林利蒨) | 
                      Aug 27, 2024 | 
                      901 |  
                      - | 
                    
                    
                    
                      | SourMint malicious SDK research write up | 
                      Kirill Efimov | 
                      Oct 16, 2020 | 
                      5703 |  
                      - | 
                    
                    
                    
                      | Snyk Voices: Returning from maternity leave | 
                      Tali Wahrhaft | 
                      May 06, 2022 | 
                      2557 |  
                      - | 
                    
                    
                    
                      | 10 Spring Boot security best practices | 
                      Simon Maple | 
                      Aug 16, 2018 | 
                      1888 |  
                      - | 
                    
                    
                    
                      | Snyk’s approach to container security research and relative importance | 
                      Jim Armstrong | 
                      Dec 14, 2020 | 
                      945 |  
                      - | 
                    
                    
                    
                      | How to prevent NullPointerExceptions in Java | 
                      Lucien Chemaly | 
                      Sep 21, 2023 | 
                      2669 |  
                      - | 
                    
                    
                    
                      | The ultimate guide to creating a secure Python package | 
                      Gourav Singh Bais | 
                      May 08, 2024 | 
                      3482 |  
                      - | 
                    
                    
                    
                      | Why you need a security companion for AI-generated code | 
                      Liqian Lim (林利蒨) | 
                      Oct 25, 2023 | 
                      1834 |  
                      - | 
                    
                    
                    
                      | Join Snyk in celebrating 31 days of Cybersecurity Awareness Month 2021 | 
                      Randall Degges | 
                      Oct 01, 2021 | 
                      455 |  
                      - | 
                    
                    
                    
                      | 29% of highest security integration orgs endure friction when collaborating | 
                      Liran Tal | 
                      Jan 28, 2020 | 
                      635 |  
                      - | 
                    
                    
                    
                      | Building Docker images in Kubernetes | 
                      Vitalis Ogbonna | 
                      May 03, 2022 | 
                      1557 |  
                      - | 
                    
                    
                    
                      | Snyk takes over Boston for SnykWeek | 
                      Megan Moore | 
                      May 19, 2022 | 
                      663 |  
                      - | 
                    
                    
                    
                      | Differences in version handling between RubyGems and npm | 
                      Gareth Visagie | 
                      Dec 14, 2016 | 
                      1243 |  
                      4 | 
                    
                    
                    
                      | Reduce risk to your supply chain with a software bill of materials (SBOM) | 
                      Ryan Searle | 
                      Jun 07, 2023 | 
                      881 |  
                      - | 
                    
                    
                    
                      | Snyk provides native integration for Atlassian Bitbucket Cloud security | 
                      Sarah Conway | 
                      Jun 15, 2021 | 
                      887 |  
                      - | 
                    
                    
                    
                      | What is typosquatting and how typosquatting attacks are responsible for malicious modules in npm | 
                      Liran Tal | 
                      Jan 12, 2021 | 
                      1350 |  
                      1 | 
                    
                    
                    
                      | Cybersecurity Venture’s 2023 Software Supply Chain Attack Report | 
                      Sydney Milligan | 
                      Oct 10, 2023 | 
                      816 |  
                      - | 
                    
                    
                    
                      | Maximizing IAM security with AWS permissions boundaries and Snyk | 
                      Wayne Crissman | 
                      Jun 26, 2023 | 
                      1019 |  
                      - | 
                    
                    
                    
                      | What makes Verdaccio a successful project? | 
                      Oren Hacohen | 
                      Feb 02, 2021 | 
                      1578 |  
                      - | 
                    
                    
                    
                      | Fun with ciphers in copycat Wordles | 
                      Micah Silverman | 
                      Feb 02, 2022 | 
                      903 |  
                      - | 
                    
                    
                    
                      | Data leak in the Netherlands: What developers should learn from this | 
                      Brian Vermeer | 
                      Mar 31, 2023 | 
                      753 |  
                      - | 
                    
                    
                    
                      | Snyk Unifies Open Source and Container Security for Coveo | 
                      Sarah Conway | 
                      Nov 23, 2019 | 
                      232 |  
                      - | 
                    
                    
                    
                      | Snyk Closes $200M to Modernize Security Industry | 
                      Peter McKay | 
                      Sep 09, 2020 | 
                      371 |  
                      - | 
                    
                    
                    
                      | Identify vulnerabilities in your container images with Snyk’s enhanced Docker Desktop Extension | 
                      LaToya Muff | 
                      Apr 11, 2023 | 
                      363 |  
                      - | 
                    
                    
                    
                      | Learning from cloud transformation as we move to AI | 
                      David Lugo | 
                      May 21, 2024 | 
                      976 |  
                      - | 
                    
                    
                    
                      | Enabling policy as code (PaC) with OPA and Rego | 
                      Eric Smalling | 
                      Jan 19, 2022 | 
                      1522 |  
                      - | 
                    
                    
                    
                      | Remote code execution, cross-site scripting, and denial of service vulnerabilities account for 2/3 of known vulnerabilities in .NET ecosystem | 
                      Hayley Denbraver | 
                      Jul 25, 2019 | 
                      1066 |  
                      - | 
                    
                    
                    
                      | How to secure an S3 bucket on AWS? | 
                      Liran Tal | 
                      Jul 12, 2024 | 
                      3393 |  
                      - | 
                    
                    
                    
                      | Using Pulumi to automate the Snyk Kubernetes integration for containers | 
                      Pas Apicella | 
                      Feb 09, 2022 | 
                      2064 |  
                      - | 
                    
                    
                    
                      | How Axel Springer National Media and Tech achieved continuous security with Snyk | 
                      Nina McClure | 
                      Sep 03, 2024 | 
                      952 |  
                      - | 
                    
                    
                    
                      | Modern security leader spotlight: with Marcin Hoppe from Auth0 | 
                      Noa Korem | 
                      Sep 19, 2019 | 
                      1096 |  
                      - | 
                    
                    
                    
                      | You should be using HTTP Strict Transport Security (HSTS) headers in your Node.js server | 
                      Raphael Mun | 
                      Dec 29, 2022 | 
                      1729 |  
                      - | 
                    
                    
                    
                      | The State of Open Source Security 2020 | 
                      Alyssa Miller | 
                      Jun 24, 2020 | 
                      1912 |  
                      - | 
                    
                    
                    
                      | Secure Java URL encoding and decoding | 
                      Jura Gorohovsky | 
                      Aug 14, 2023 | 
                      3090 |  
                      - | 
                    
                    
                    
                      | Snyk named a Leader, placed highest in Strategy category in The Forrester Wave: Software Composition Analysis (SCA), Q2 2023 report | 
                      Manoj Nair | 
                      Jun 13, 2023 | 
                      770 |  
                      - | 
                    
                    
                    
                      | Give employees the flexibility to do their best work | 
                      Peter McKay | 
                      Jun 07, 2021 | 
                      522 |  
                      - | 
                    
                    
                    
                      | Building a secure Amazon S3 bucket (AWS) | 
                      Josh Stella | 
                      Sep 08, 2020 | 
                      1746 |  
                      - | 
                    
                    
                    
                      | Nightfall AI and Snyk unite to deliver AI-powered secrets scanning for developers | 
                      LaToya Muff | 
                      Nov 29, 2023 | 
                      547 |  
                      - | 
                    
                    
                    
                      | SnykCon recap: Automation for better compliance and faster feedback loops | 
                      Megan Moore | 
                      Apr 13, 2022 | 
                      1189 |  
                      - | 
                    
                    
                    
                      | Krampus delivers an end-of-year Struts vulnerability | 
                      Micah Silverman | 
                      Jan 02, 2024 | 
                      1667 |  
                      - | 
                    
                    
                    
                      | 3 tips for rebuilding a Docker image faster (and save CI seconds!) | 
                      Liran Tal | 
                      Dec 28, 2023 | 
                      2564 |  
                      - | 
                    
                    
                    
                      | 6 stages of refactoring a Jest test case | 
                      Liran Tal | 
                      Sep 04, 2019 | 
                      324 |  
                      - | 
                    
                    
                    
                      | Does AI lead to AppSec hell or nirvana? | 
                      Erin Cullen | 
                      Oct 03, 2023 | 
                      1040 |  
                      - | 
                    
                    
                    
                      | Snyk and Trek10 publish new AWS Quick Start Guide to secure serverless CI/CD deployments | 
                      Jay Yeras | 
                      Sep 29, 2020 | 
                      480 |  
                      - | 
                    
                    
                    
                      | Announcing SnykCon 2021: Build Securely | 
                      Guy Podjarny | 
                      Jun 01, 2021 | 
                      825 |  
                      - | 
                    
                    
                    
                      | Node.js multithreading with worker threads series: worker_threads tutorial | 
                      James Walker | 
                      Oct 25, 2022 | 
                      2310 |  
                      - | 
                    
                    
                    
                      | PHP security in Snyk Code now GA | 
                      DeveloperSteve Coochin | 
                      Jan 26, 2022 | 
                      760 |  
                      - | 
                    
                    
                    
                      | Announcing Snyk AppRisk: Elevate your AppSec game with ASPM | 
                      Daniel Berman | 
                      Dec 12, 2023 | 
                      1464 |  
                      - | 
                    
                    
                    
                      | 3 ways AppSec modernization is a game-changer for financial services | 
                      Katie DeMatteis | 
                      Sep 03, 2024 | 
                      782 |  
                      - | 
                    
                    
                    
                      | SnykLaunch April '23: C/C++ expansion, cloud and IaC updates, custom container security, new integrations, and more | 
                      Jim Armstrong | 
                      Apr 04, 2023 | 
                      1462 |  
                      - | 
                    
                    
                    
                      | New SEC cybersecurity rules put more onus on the CISO, not so much on directors | 
                      Myke Lyons | 
                      Aug 03, 2023 | 
                      1578 |  
                      - | 
                    
                    
                    
                      | Preventing malicious packages and supply chain attacks with Snyk | 
                      Daniel Berman | 
                      Aug 31, 2021 | 
                      1421 |  
                      - | 
                    
                    
                    
                      | Enhancing code to cloud security with the Common Configuration Scoring System | 
                      Wayne Crissman | 
                      Dec 14, 2023 | 
                      998 |  
                      - | 
                    
                    
                    
                      | Secure development when working from home — tips and tricks | 
                      Guy Podjarny | 
                      Mar 31, 2020 | 
                      1737 |  
                      - | 
                    
                    
                    
                      | Snyk welcomes Enso: Enabling security leaders to scale their AppSec program with ASPM | 
                      Manoj Nair | 
                      Jun 07, 2023 | 
                      972 |  
                      - | 
                    
                    
                    
                      | Leaky Vessels: Docker and runc container breakout vulnerabilities (January 2024) | 
                      Jamie Smith | 
                      Jan 31, 2024 | 
                      1729 |  
                      41 | 
                    
                    
                    
                      | Introducing Snyk’s partnership with Gemini Code Assist | 
                      David Lugo | 
                      Apr 09, 2024 | 
                      682 |  
                      - | 
                    
                    
                    
                      | Snyk is named a Strong Performer as a first-time entrant in the Forrester Wave™: Static Application Security Testing (SAST) Q3 2023 | 
                      Peter McKay | 
                      Sep 20, 2023 | 
                      696 |  
                      - | 
                    
                    
                    
                      | Zip Slip Vulnerability Cheat Sheet | 
                      Simon Maple | 
                      Jun 28, 2018 | 
                      440 |  
                      - | 
                    
                    
                    
                      | Day in the life of a food giant CISO | 
                      Vandana Verma Sehgal | 
                      Apr 18, 2024 | 
                      668 |  
                      - | 
                    
                    
                    
                      | 7 tips for prioritizing container and web application vulnerabilities | 
                      Daniel Berman | 
                      Sep 22, 2020 | 
                      1195 |  
                      - | 
                    
                    
                    
                      | Top ten most popular docker images each contain at least 30 vulnerabilities | 
                      Liran Tal | 
                      Feb 26, 2019 | 
                      1133 |  
                      562 | 
                    
                    
                    
                      | Join "The Big Fix" to secure your projects with Snyk and earn cool swag | 
                      Liran Tal | 
                      Feb 09, 2022 | 
                      1029 |  
                      - | 
                    
                    
                    
                      | How to educate, train and empower developers in security | 
                      Simon Maple | 
                      Jul 25, 2018 | 
                      843 |  
                      - | 
                    
                    
                    
                      | Snyk & Atlassian: How to embed security in AI-assisted software development | 
                      LaToya Muff | 
                      Feb 14, 2024 | 
                      1030 |  
                      - | 
                    
                    
                    
                      | Integrating Snyk Code SAST results in your ServiceNow workflows | 
                      Sarah Conway | 
                      May 07, 2024 | 
                      514 |  
                      - | 
                    
                    
                    
                      | How to Detect and Remediate Kubernetes Vulnerability CVE-2019-11249 | 
                      Hayley Denbraver | 
                      Mar 11, 2020 | 
                      884 |  
                      - | 
                    
                    
                    
                      | Three reasons to invest in an ASPM solution in 2024 | 
                      Julia Kraut | 
                      Dec 12, 2023 | 
                      610 |  
                      - | 
                    
                    
                    
                      | Exposed or not, vulnerabilities are dangerous | 
                      Tim Kadlec | 
                      Nov 08, 2017 | 
                      466 |  
                      - | 
                    
                    
                    
                      | With Love, Your Applications | 
                      Krysta Williams-Timm | 
                      Feb 14, 2024 | 
                      373 |  
                      - | 
                    
                    
                    
                      | Snyk named a 2022 Gartner Peer Insights Customers’ Choice for Application Security Testing | 
                      Tony Sleva | 
                      Oct 04, 2022 | 
                      382 |  
                      - | 
                    
                    
                    
                      | Three trends shaping software supply chain security today | 
                      Erin Cullen | 
                      Aug 22, 2024 | 
                      923 |  
                      - | 
                    
                    
                    
                      | Snyk named Visionary in 2021 Gartner Magic Quadrant for AST | 
                      Aner Mazur | 
                      Jun 01, 2021 | 
                      1187 |  
                      - | 
                    
                    
                    
                      | Understanding the software supply chain security requirements in the cybersecurity Executive Order | 
                      Daniel Berman | 
                      Jun 10, 2021 | 
                      1503 |  
                      - | 
                    
                    
                    
                      | How to add Playwright tests to your pull request CI with GitHub Actions | 
                      Liran Tal | 
                      Oct 14, 2022 | 
                      2546 |  
                      - | 
                    
                    
                    
                      | Using insecure npm package manager defaults to steal your macOS keyboard shortcuts | 
                      Yagiz Nizipli | 
                      Jun 28, 2023 | 
                      1102 |  
                      - | 
                    
                    
                    
                      | Protestware is trending in open source: 4 different types and their impact | 
                      Benji Catabi-Kalman | 
                      Mar 22, 2022 | 
                      1185 |  
                      - | 
                    
                    
                    
                      | Keep your dependencies up-to-date—enable auto upgrades with Snyk | 
                      Dan Mckean | 
                      Nov 06, 2019 | 
                      450 |  
                      - | 
                    
                    
                    
                      | Fetch the Flag CTF 2022 writeup: Roadrunner | 
                      Giovanni Funchal | 
                      Nov 10, 2022 | 
                      1138 |  
                      - | 
                    
                    
                    
                      | Snyker Spotlight: Reflecting on Juneteenth | 
                      Kris Broughton | 
                      Jun 17, 2021 | 
                      1257 |  
                      - | 
                    
                    
                    
                      | 4 benefits of visualizing your cloud infrastructure | 
                      Diem Shin | 
                      Jun 11, 2019 | 
                      650 |  
                      - | 
                    
                    
                    
                      | AI quality: Garbage in, garbage out | 
                      Michael Biocchi | 
                      Jun 11, 2024 | 
                      730 |  
                      - | 
                    
                    
                    
                      | How to secure JavaScript applications right from the CLI | 
                      Gideon Idoko | 
                      Oct 24, 2023 | 
                      2412 |  
                      - | 
                    
                    
                    
                      | Securing cloud native applications: ActiveCampaign’s VP, Information Security provides perspective | 
                      Brian Piper | 
                      Apr 09, 2021 | 
                      1232 |  
                      - | 
                    
                    
                    
                      | Jackson Deserialization Vulnerability | 
                      Brian Vermeer | 
                      Aug 21, 2019 | 
                      586 |  
                      1 | 
                    
                    
                    
                      | Happy 1st Birthday, Snyk Code! | 
                      Frank Fischer | 
                      May 06, 2022 | 
                      1368 |  
                      - | 
                    
                    
                    
                      | 10 best practices for securely developing with AI | 
                      Simon Maple | 
                      Sep 27, 2023 | 
                      3204 |  
                      - | 
                    
                    
                    
                      | How Snyk Code prioritizes vulnerabilities using their Priority Score | 
                      Frank Fischer | 
                      Nov 09, 2021 | 
                      1078 |  
                      - | 
                    
                    
                    
                      | Snyk top 10 code vulnerabilities report | 
                      Mariah Gresham | 
                      May 18, 2023 | 
                      424 |  
                      1 | 
                    
                    
                    
                      | Reachable vulnerabilities: how to effectively prioritize open source security | 
                      Krysztof Huszcza | 
                      Aug 18, 2020 | 
                      2177 |  
                      1 | 
                    
                    
                    
                      | Analyzing the PwnKit local privilege escalation exploit | 
                      Kyle Suero | 
                      Jan 29, 2022 | 
                      726 |  
                      - | 
                    
                    
                    
                      | SDRing during COVID-19—Snyk style! | 
                      Brendan McCrann | 
                      Jun 01, 2020 | 
                      445 |  
                      - | 
                    
                    
                    
                      | Setting up the Docker image scan GitHub Action | 
                      Mohammad-Ali A'râbi | 
                      May 19, 2023 | 
                      1076 |  
                      - | 
                    
                    
                    
                      | Why do organizations trust Snyk to win the open source security battle? | 
                      Benji Catabi-Kalman | 
                      May 27, 2020 | 
                      2302 |  
                      - | 
                    
                    
                    
                      | Getting started with PHP static analysis in 2024 | 
                      Liran Tal | 
                      Mar 21, 2024 | 
                      2431 |  
                      - | 
                    
                    
                    
                      | Introducing the Snyk App for Compass: A complete view of software component risk | 
                      LaToya Muff | 
                      Oct 05, 2023 | 
                      662 |  
                      - | 
                    
                    
                    
                      | How to prevent XPath injection attacks | 
                      Marcelo Oliveira | 
                      May 10, 2023 | 
                      2175 |  
                      - | 
                    
                    
                    
                      | Securing your SBOM on Google Cloud | 
                      David Lugo | 
                      Mar 28, 2024 | 
                      983 |  
                      - | 
                    
                    
                    
                      | The Log4j vulnerability and its impact on software supply chain security | 
                      Liran Tal | 
                      Dec 13, 2021 | 
                      2129 |  
                      - | 
                    
                    
                    
                      | More accurate than GPT-4: How Snyk’s CodeReduce improved the performance of other LLMs | 
                      Eric Fernandez | 
                      May 07, 2024 | 
                      1245 |  
                      - | 
                    
                    
                    
                      | These aren’t the npm packages you’re looking for | 
                      DeveloperSteve Coochin | 
                      May 04, 2022 | 
                      1141 |  
                      - | 
                    
                    
                    
                      | One month to SnykCon 2021: Sessions to attend, flags to capture, Simons to Maple | 
                      Leigh Moore | 
                      Sep 07, 2021 | 
                      722 |  
                      - | 
                    
                    
                    
                      | Snyk’s guide to disclosing pronouns | 
                      Mariah Gresham, Alex Fallon | 
                      Jun 09, 2022 | 
                      774 |  
                      - | 
                    
                    
                    
                      | Can AI write secure code? | 
                      Frank Fischer | 
                      May 03, 2023 | 
                      2244 |  
                      - | 
                    
                    
                    
                      | Securing Artifactory using Snyk | 
                      Or Fattal | 
                      Aug 19, 2019 | 
                      591 |  
                      - | 
                    
                    
                    
                      | Snyk finds 200+ malicious npm packages, including Cobalt Strike dependency confusion attacks | 
                      Kirill Efimov | 
                      May 24, 2022 | 
                      2807 |  
                      3 | 
                    
                    
                    
                      | The State of Cloud Native Application Security survey—2021 | 
                      Matt Jarvis | 
                      Feb 02, 2021 | 
                      431 |  
                      - | 
                    
                    
                    
                      | Introducing parlay, a tool for enriching SBOMs | 
                      Gareth Rushgrove | 
                      Jun 07, 2023 | 
                      773 |  
                      - | 
                    
                    
                    
                      | Introducing groups – a new way to manage your teams in Snyk | 
                      Anna Debenham | 
                      Mar 06, 2018 | 
                      525 |  
                      - | 
                    
                    
                    
                      | Understanding filesystem takeover vulnerabilities in npm JavaScript package manager | 
                      Liran Tal | 
                      Jan 07, 2020 | 
                      1366 |  
                      34 | 
                    
                    
                    
                      | 360 degrees of application security with Snyk | 
                      Soumen Mukherjee | 
                      Apr 24, 2024 | 
                      1273 |  
                      - | 
                    
                    
                    
                      | How to keep an HTTP connection alive for 9 hours | 
                      Micah Silverman | 
                      Oct 23, 2023 | 
                      2391 |  
                      3 | 
                    
                    
                    
                      | Log4Shell in a nutshell (for non-developers & non-Java developers) | 
                      Micah Silverman | 
                      Dec 15, 2021 | 
                      1203 |  
                      - | 
                    
                    
                    
                      | Congratulations to Snyk’s 2022 CRN Women of the Channel | 
                      Carey Stanton | 
                      May 09, 2022 | 
                      740 |  
                      - | 
                    
                    
                    
                      | New O’Reilly book — Cloud Native Application Security: Embracing Developer-First Security for the Cloud Era | 
                      Simon Maple | 
                      Jun 15, 2021 | 
                      965 |  
                      - | 
                    
                    
                    
                      | How to build a secure API gateway in Node.js | 
                      Florian Rappl | 
                      Dec 28, 2022 | 
                      2647 |  
                      - | 
                    
                    
                    
                      | Response to the Enduring Security Framework (ESF) Guide for Developers | 
                      Gareth Rushgrove | 
                      Sep 03, 2022 | 
                      602 |  
                      - | 
                    
                    
                    
                      | Creating SBOMs with the Snyk CLI | 
                      Brian Vermeer | 
                      Feb 08, 2024 | 
                      1348 |  
                      - | 
                    
                    
                    
                      | What’s new in Snyk? | 
                      Rachel Cheyfitz | 
                      Jun 10, 2019 | 
                      346 |  
                      - | 
                    
                    
                    
                      | Vulnerability: runc process.cwd and leaked fds container breakout (CVE-2024-21626) | 
                      Rory McNamara | 
                      Jan 31, 2024 | 
                      1114 |  
                      3 | 
                    
                    
                    
                      | Ethical hacking techniques | 
                      Vandana Verma Sehgal | 
                      Jun 05, 2023 | 
                      1713 |  
                      - | 
                    
                    
                    
                      | Snyk Container certified “VMware PKS Partner Ready” to find and fix vulnerabilities in container workloads | 
                      Jim Armstrong | 
                      Apr 17, 2020 | 
                      459 |  
                      - | 
                    
                    
                    
                      | Snykers spoke, we listened—Snyk collects 4 Best Place to Work awards by Comparably | 
                      Fenella Vavasour | 
                      Aug 13, 2020 | 
                      1099 |  
                      - | 
                    
                    
                    
                      | Snyk Closes $150M to Accelerate Developer-first Security | 
                      Peter McKay | 
                      Jan 21, 2020 | 
                      405 |  
                      7 | 
                    
                    
                    
                      | Alert: LaughTilYouCry ransomware sabotages npm package (with puns) | 
                      Mariah Gresham | 
                      Apr 01, 2022 | 
                      529 |  
                      - | 
                    
                    
                    
                      | 10 Java security best practices | 
                      Brian Vermeer, Jim Manico | 
                      Sep 17, 2019 | 
                      3330 |  
                      2 | 
                    
                    
                    
                      | PCI standards open source security requirements — how to comply? | 
                      Danny Grander | 
                      Jul 23, 2019 | 
                      1393 |  
                      - | 
                    
                    
                    
                      | Snykers share wellness tips for mental health awareness month | 
                      Belyn Lai | 
                      May 30, 2023 | 
                      706 |  
                      - | 
                    
                    
                    
                      | Snyk Partner Speaks series: True DevSecOps with Snyk and Dynatrace | 
                      Sarah Conway | 
                      Jun 08, 2023 | 
                      177 |  
                      - | 
                    
                    
                    
                      | Vuln Cost: Effortless finding vulnerabilities in npm packages with VS Code | 
                      Brian Vermeer | 
                      Apr 02, 2020 | 
                      548 |  
                      - | 
                    
                    
                    
                      | Using Node.js event loop for timing attacks | 
                      Danny Grander | 
                      Feb 16, 2016 | 
                      1640 |  
                      4 | 
                    
                    
                    
                      | Snyk enhances ServiceNow with comprehensive insights into vulnerabilities in open source software | 
                      Marco Morales | 
                      Jan 24, 2023 | 
                      633 |  
                      - | 
                    
                    
                    
                      | The security course missing from higher education | 
                      Michael Biocchi | 
                      Jul 12, 2022 | 
                      955 |  
                      - | 
                    
                    
                    
                      | Snyk ranked #20 on 2022 Forbes Cloud 100 list | 
                      Jeff Yoshimura | 
                      Aug 09, 2022 | 
                      341 |  
                      - | 
                    
                    
                    
                      | From image security to workload security | 
                      Gareth Rushgrove | 
                      Oct 31, 2019 | 
                      859 |  
                      - | 
                    
                    
                    
                      | JVM Ecosystem Report 2020 | 
                      Brian Vermeer | 
                      Feb 05, 2020 | 
                      460 |  
                      - | 
                    
                    
                    
                      | Container images simplified with Ko | 
                      Eric Smalling | 
                      Oct 10, 2022 | 
                      3025 |  
                      1 | 
                    
                    
                    
                      | Snyk Ranked #19 on 2023 Forbes Cloud 100 List | 
                      Peter McKay | 
                      Aug 08, 2023 | 
                      430 |  
                      - | 
                    
                    
                    
                      | Responsible disclosure: the impact of vulnerability disclosure on open source security | 
                      Asaf Biton | 
                      Apr 07, 2020 | 
                      695 |  
                      - | 
                    
                    
                    
                      | Snyk Code is now available for free | 
                      Frank Fischer | 
                      May 06, 2021 | 
                      735 |  
                      1 | 
                    
                    
                    
                      | Talking visibility, scalability, and relationships in secure development with Phil Guimond of ViacomCBS | 
                      Simon Maple | 
                      Jul 01, 2021 | 
                      2244 |  
                      - | 
                    
                    
                    
                      | Security Transformation and The Three Faces of DevSecOps | 
                      Guy Podjarny | 
                      Mar 08, 2019 | 
                      243 |  
                      - | 
                    
                    
                    
                      | Going beyond “shift left” to extend AppSec in all directions | 
                      Ben Desjardins | 
                      Jul 09, 2024 | 
                      968 |  
                      - | 
                    
                    
                    
                      | Prioritizing vulnerabilities in Kubernetes deployments | 
                      Gareth Rushgrove | 
                      Aug 06, 2020 | 
                      572 |  
                      - | 
                    
                    
                    
                      | Snyk Named a 2018 Gartner Cool Vendor in Application and Data Security | 
                      Guy Podjarny | 
                      May 15, 2018 | 
                      657 |  
                      - | 
                    
                    
                    
                      | Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub | 
                      Vandana Verma Sehgal | 
                      Jun 22, 2023 | 
                      399 |  
                      - | 
                    
                    
                    
                      | Gradle dependencies: scanning with  new Snyk Gradle plugin | 
                      Brian Vermeer | 
                      Oct 23, 2020 | 
                      885 |  
                      - | 
                    
                    
                    
                      | Snyk Partner Speak Video Series Puts Spotlight on New Integrations | 
                      Sarah Conway | 
                      Apr 12, 2023 | 
                      181 |  
                      - | 
                    
                    
                    
                      | Snyk takes on responsibility for Node.js ecosystem vulnerability disclosure program | 
                      Benji Catabi-Kalman | 
                      May 25, 2021 | 
                      499 |  
                      2 | 
                    
                    
                    
                      | Securing S3 bucket configuration and access with Snyk & Solvo | 
                      Lauren Place | 
                      Oct 18, 2021 | 
                      1114 |  
                      - | 
                    
                    
                    
                      | How to build a modern DevSecOps culture: Lessons from Jaguar Land Rover and Asda | 
                      Brian Piper | 
                      Feb 21, 2024 | 
                      1209 |  
                      - | 
                    
                    
                    
                      | 78% of vulnerabilities are found in indirect dependencies, making remediation complex | 
                      Liran Tal | 
                      Feb 26, 2019 | 
                      989 |  
                      - | 
                    
                    
                    
                      | Snyk IaC scanning enhancements include Azure and AWS infrastructure as code | 
                      Eric Smalling | 
                      Feb 23, 2021 | 
                      769 |  
                      - | 
                    
                    
                    
                      | Launching the State of Open Source Security Survey | 
                      Tim Kadlec | 
                      Sep 21, 2017 | 
                      366 |  
                      7 | 
                    
                    
                    
                      | Go security cheatsheet: 8 security best practices for Go developers | 
                      Eric Smalling | 
                      Feb 09, 2021 | 
                      1889 |  
                      - | 
                    
                    
                    
                      | Panel recap: Breaking Bad Security Habits with Corey Quinn | 
                      Erin Cullen | 
                      Dec 20, 2022 | 
                      985 |  
                      - | 
                    
                    
                    
                      | Welcoming Dino DiMarino: The first Snyk Chief Revenue Officer | 
                      Peter McKay | 
                      Oct 13, 2021 | 
                      452 |  
                      - | 
                    
                    
                    
                      | Amplifying AAPI Voices to Honor Asian American Pacific Islander Heritage Month | 
                      Belyn Lai, Yos Pang | 
                      May 25, 2023 | 
                      1495 |  
                      - | 
                    
                    
                    
                      | NPM security: preventing supply chain attacks | 
                      Liran Tal | 
                      Nov 08, 2022 | 
                      3307 |  
                      1 | 
                    
                    
                    
                      | Integrating the Snyk Language Server with IntelliJ IDEs | 
                      Arvyd Paeglit | 
                      Jun 17, 2024 | 
                      344 |  
                      - | 
                    
                    
                    
                      | 3 tips to manage drift from manual changes in Terraform | 
                      Stephane Jourdan | 
                      May 22, 2020 | 
                      939 |  
                      - | 
                    
                    
                    
                      | Black Hat Asia customer panel recap: How to lead DevSecOps adoption | 
                      Brian Piper | 
                      Sep 18, 2023 | 
                      821 |  
                      - | 
                    
                    
                    
                      | Critical Arbitrary Code Execution Vulnerability Found in Kubernetes | 
                      Liran Tal | 
                      Dec 20, 2018 | 
                      715 |  
                      - | 
                    
                    
                    
                      | Recap: Stress-Free Security for Devs and Ops on AWS | 
                      David Lugo | 
                      Apr 03, 2023 | 
                      1341 |  
                      - | 
                    
                    
                    
                      | Fixing vulnerabilities in Maven projects | 
                      Brian Vermeer | 
                      Sep 14, 2020 | 
                      948 |  
                      - | 
                    
                    
                    
                      | Building a culture of Digital Trust | 
                      Stephanie Dominy | 
                      Feb 18, 2020 | 
                      999 |  
                      - | 
                    
                    
                    
                      | SuiteCRM: PHAR deserialization vulnerability to code execution | 
                      Sam Sanoop | 
                      May 07, 2021 | 
                      1707 |  
                      - | 
                    
                    
                    
                      | Hunting intent-based Android security vulnerabilities with Snyk Code | 
                      Raul Onitza-Klugman | 
                      May 27, 2021 | 
                      1654 |  
                      - | 
                    
                    
                    
                      | 81% believe developers should own security, but they aren’t well-equipped | 
                      Liran Tal | 
                      Feb 26, 2019 | 
                      923 |  
                      - | 
                    
                    
                    
                      | Polyfill supply chain attack embeds malware in JavaScript CDN assets | 
                      Liran Tal | 
                      Jun 26, 2024 | 
                      1892 |  
                      - | 
                    
                    
                    
                      | The npm faker package and the unexpected demise of open source libraries | 
                      Liran Tal | 
                      Sep 02, 2022 | 
                      2339 |  
                      - | 
                    
                    
                    
                      | Building security into your Azure DevOps Pipeline | 
                      Udi Nachmany | 
                      Dec 16, 2019 | 
                      308 |  
                      - | 
                    
                    
                    
                      | Kernel privilege escalation: how Kubernetes container isolation impacts privilege escalation attacks | 
                      Kamil Potrec | 
                      Dec 03, 2020 | 
                      3824 |  
                      4 | 
                    
                    
                    
                      | NumPy arbitrary code execution vulnerability | 
                      Hayley Denbraver | 
                      Feb 05, 2019 | 
                      394 |  
                      - | 
                    
                    
                    
                      | Java ecosystem survey 2021 | 
                      Brian Vermeer | 
                      Feb 15, 2021 | 
                      247 |  
                      - | 
                    
                    
                    
                      | Go security: announcing enhanced security for Go applications | 
                      Daniel Berman | 
                      Dec 16, 2020 | 
                      1319 |  
                      - | 
                    
                    
                    
                      | Snyk Fetch the Flag CTF 2023 writeup: Audiopolis | 
                      John Hammond | 
                      Nov 30, 2023 | 
                      278 |  
                      - | 
                    
                    
                    
                      | Securing the digital future: Reviewing the Biden-Harris administration's National Cybersecurity Strategy | 
                      Vandana Verma Sehgal | 
                      Mar 20, 2023 | 
                      713 |  
                      - | 
                    
                    
                    
                      | Hypergrowth Playbook: 7 best practices as you go from startup to scaleup | 
                      Dipti Salopek | 
                      Aug 25, 2021 | 
                      1052 |  
                      - | 
                    
                    
                    
                      | RPM Package Manager: RPM package security scanning with Snyk | 
                      Ivan Stanev | 
                      Nov 13, 2020 | 
                      2414 |  
                      - | 
                    
                    
                    
                      | Snyk streamlines procurement with AWS Marketplace Solution Provider Private Offers (SPPO) | 
                      David Lugo | 
                      May 11, 2021 | 
                      696 |  
                      - | 
                    
                    
                    
                      | A security expert’s view on Gartner’s generative AI insights | 
                      Liqian Lim (林利蒨) | 
                      Aug 07, 2024 | 
                      1729 |  
                      - | 
                    
                    
                    
                      | Using third party content securely | 
                      Gareth Rushgrove | 
                      Nov 08, 2019 | 
                      881 |  
                      - | 
                    
                    
                    
                      | Snyk CLI: Introducing Semantic Versioning and release channels | 
                      Chintan B. | 
                      Apr 30, 2024 | 
                      930 |  
                      - | 
                    
                    
                    
                      | Scanning Harbor registry images for vulnerabilities with Snyk | 
                      Eric Smalling | 
                      Apr 01, 2021 | 
                      655 |  
                      - | 
                    
                    
                    
                      | Cheat sheet: Meeting security compliance standards | 
                      Mariah Gresham | 
                      Sep 15, 2022 | 
                      784 |  
                      - | 
                    
                    
                    
                      | How to make a mock API server in JavaScript | 
                      David Ekete | 
                      Oct 20, 2022 | 
                      2038 |  
                      1 | 
                    
                    
                    
                      | Shifting left security incident management with the Snyk & Opsgenie integration | 
                      Jay Yeras | 
                      Feb 24, 2021 | 
                      840 |  
                      - | 
                    
                    
                    
                      | Call for action: Exploring vulnerabilities in Github Actions | 
                      Elliot Ward, Rory McNamara, Raul Onitza-Klugman | 
                      Jun 06, 2024 | 
                      3977 |  
                      - | 
                    
                    
                    
                      | Continuous dependency updates: Improving processes by front-loading pain | 
                      James Bowes | 
                      May 24, 2021 | 
                      1499 |  
                      2 | 
                    
                    
                    
                      | How Snyk can help secure supply chains per Executive Order M-21-30 | 
                      Vandana Verma Sehgal | 
                      Sep 29, 2022 | 
                      1767 |  
                      1 | 
                    
                    
                    
                      | Security in context: When is a CVE not a CVE? | 
                      Matt Jarvis | 
                      Dec 17, 2021 | 
                      953 |  
                      2 | 
                    
                    
                    
                      | Session management security: Best practices for protecting user sessions | 
                      Okoth Pius | 
                      Jul 11, 2023 | 
                      2703 |  
                      1 | 
                    
                    
                    
                      | 31% don’t track application dependencies and 38% only track direct dependencies | 
                      Liran Tal | 
                      Jan 28, 2020 | 
                      653 |  
                      - | 
                    
                    
                    
                      | Data loss prevention for developers | 
                      Annabel Gauci | 
                      May 24, 2023 | 
                      2103 |  
                      2 | 
                    
                    
                    
                      | Snyk brings infrastructure as code security to HashiCorp Terraform Cloud | 
                      Marco Morales | 
                      May 04, 2022 | 
                      762 |  
                      - | 
                    
                    
                    
                      | Top 5 scary AWS misconfigurations | 
                      Shilpi Bhattacharjee | 
                      Oct 31, 2022 | 
                      816 |  
                      - | 
                    
                    
                    
                      | Log4j 2.16 High Severity Vulnerability (CVE-2021-45105) Discovered | 
                      Benji Catabi-Kalman | 
                      Dec 18, 2021 | 
                      767 |  
                      - | 
                    
                    
                    
                      | Vulnerable Gradle plugin-publish plugin reveals sensitive information | 
                      Brian Vermeer | 
                      Mar 31, 2020 | 
                      364 |  
                      - | 
                    
                    
                    
                      | Snyk and Atlassian deepen partnership with Snyk security in Jira Software | 
                      Jill Wilkins | 
                      Feb 08, 2023 | 
                      412 |  
                      - | 
                    
                    
                    
                      | Announcing enhanced end-to-end security for Bitbucket Cloud development workflows | 
                      Daniel Berman | 
                      Jun 04, 2020 | 
                      829 |  
                      - | 
                    
                    
                    
                      | 10 modern Node.js runtime features to start using in 2024 | 
                      Liran Tal | 
                      May 29, 2024 | 
                      5030 |  
                      2 | 
                    
                    
                    
                      | Snyk and AWS announce native Amazon EKS support directly from the AWS Management Console | 
                      David Lugo | 
                      Jun 12, 2024 | 
                      418 |  
                      - | 
                    
                    
                    
                      | 5 Node.js security code snippets every backend developer should know | 
                      Liran Tal | 
                      Feb 28, 2024 | 
                      3106 |  
                      - | 
                    
                    
                    
                      | Regular Expression Denial of Service (REDoS) in UAParser.js | 
                      Alyssa Miller | 
                      Oct 26, 2020 | 
                      1125 |  
                      - | 
                    
                    
                    
                      | Introducing the ASPM Masterclass | 
                      Erin Cullen | 
                      Mar 12, 2024 | 
                      504 |  
                      - | 
                    
                    
                    
                      | The new, improved Snyk Container CLI | 
                      Gareth Rushgrove | 
                      Oct 29, 2020 | 
                      932 |  
                      - | 
                    
                    
                    
                      | Welcoming Adriana Bokel Herde: Snyk’s new Chief People Officer | 
                      Peter McKay | 
                      Sep 01, 2021 | 
                      588 |  
                      - | 
                    
                    
                    
                      | Dependency injection in Python | 
                      Lucien Chemaly | 
                      Oct 31, 2023 | 
                      2919 |  
                      - | 
                    
                    
                    
                      | Snyk Apps now GA: An easy, standardized, and secure framework for building custom integrations | 
                      Sarah Conway | 
                      Nov 20, 2023 | 
                      1108 |  
                      - | 
                    
                    
                    
                      | Manage security issues in Jira with Snyk Security in Jira Cloud | 
                      LaToya Muff | 
                      Aug 09, 2023 | 
                      330 |  
                      - | 
                    
                    
                    
                      | Securing symmetric encryption algorithms in Java | 
                      Brian Vermeer | 
                      Oct 18, 2023 | 
                      1489 |  
                      - | 
                    
                    
                    
                      | How Comic Relief’s developers used Snyk to automate security and boost productivity as part of their Digital Transformation. | 
                      Ellen Van Keulen | 
                      Mar 22, 2018 | 
                      709 |  
                      - | 
                    
                    
                    
                      | Scan for AWS CloudFormation misconfigurations with Snyk IaC | 
                      Ilianna Papastefanou | 
                      Jun 17, 2021 | 
                      1083 |  
                      - | 
                    
                    
                    
                      | Managing Node.js Docker images in GitHub Packages using GitHub Actions | 
                      Liran Tal | 
                      Jul 13, 2021 | 
                      1791 |  
                      - | 
                    
                    
                    
                      | Preventing insecure deserialization in Node.js | 
                      Benson Kuria Macharia | 
                      Apr 17, 2023 | 
                      1890 |  
                      - | 
                    
                    
                    
                      | Building a security-conscious CI/CD pipeline | 
                      Peter De Tender | 
                      Jun 29, 2023 | 
                      1529 |  
                      - | 
                    
                    
                    
                      | Snyk Code CLI support now in public beta | 
                      Frank Fischer | 
                      Sep 21, 2021 | 
                      1619 |  
                      - | 
                    
                    
                    
                      | New Gartner Market Guide highlights the importance of Software Composition Analysis (SCA) | 
                      Daniel Berman | 
                      Sep 01, 2020 | 
                      1434 |  
                      - | 
                    
                    
                    
                      | Open source maintainers want to be secure, but 70% lack skills | 
                      Liran Tal | 
                      Feb 26, 2019 | 
                      1787 |  
                      - | 
                    
                    
                    
                      | Interview with an engineer: Diving into modern SAST | 
                      Snyk Team | 
                      May 18, 2022 | 
                      1355 |  
                      - | 
                    
                    
                    
                      | Snyk debuts on 2021 CNBC Disruptor 50 List at #15 | 
                      Peter McKay | 
                      May 27, 2021 | 
                      363 |  
                      - | 
                    
                    
                    
                      | Announcing Snyk’s developer-first prioritization capabilities | 
                      Daniel Berman | 
                      Jul 22, 2020 | 
                      1604 |  
                      - | 
                    
                    
                    
                      | A year-old dormant malicious remote code execution vulnerability discovered in Webmin | 
                      Hayley Denbraver | 
                      Aug 20, 2019 | 
                      510 |  
                      3 | 
                    
                    
                    
                      | Controlling your server with a reverse shell attack | 
                      Brian Vermeer | 
                      Aug 10, 2022 | 
                      1544 |  
                      - | 
                    
                    
                    
                      | Snyk at RSAC 2021 — ML in SAST: Distraction or Disruption | 
                      Tony Sleva | 
                      Jun 30, 2021 | 
                      882 |  
                      - | 
                    
                    
                    
                      | Protecting our culture as we hyperscale | 
                      Dipti Salopek | 
                      Feb 04, 2020 | 
                      823 |  
                      - | 
                    
                    
                    
                      | Is your team on the *security* naughty or nice list? | 
                      Mariah Gresham | 
                      Dec 20, 2023 | 
                      873 |  
                      - | 
                    
                    
                    
                      | Secure your application from Argo CD to Kubernetes | 
                      JJ Ng | 
                      Oct 12, 2022 | 
                      1253 |  
                      - | 
                    
                    
                    
                      | How to find and fix XML entity vulnerabilities | 
                      Michael Sherman | 
                      Sep 07, 2022 | 
                      2223 |  
                      - | 
                    
                    
                    
                      | How REI built a DevSecOps culture and how Snyk helped | 
                      Brian Piper | 
                      Feb 27, 2024 | 
                      1154 |  
                      - | 
                    
                    
                    
                      | What’s a known vulnerability? | 
                      Guy Podjarny | 
                      Feb 06, 2018 | 
                      991 |  
                      - | 
                    
                    
                    
                      | Applying risk management to DevOps practices with Snyk & Datadog | 
                      Brian Piper | 
                      Jan 04, 2021 | 
                      815 |  
                      - | 
                    
                    
                    
                      | Preventing YAML parsing vulnerabilities with snakeyaml in Java | 
                      Brian Vermeer | 
                      Mar 30, 2021 | 
                      1273 |  
                      - | 
                    
                    
                    
                      | Container image formats under the hood | 
                      Agata Krajewska | 
                      Nov 18, 2020 | 
                      2232 |  
                      - | 
                    
                    
                    
                      | Git, the easy way: changing history using rebase—part I | 
                      Or Kamara | 
                      Jun 09, 2020 | 
                      1869 |  
                      - | 
                    
                    
                    
                      | Announcing Snyk Impact | 
                      Bry Breckenridge | 
                      Oct 06, 2021 | 
                      1031 |  
                      - | 
                    
                    
                    
                      | Snyk achieves Red Hat Vulnerability Scanner Certification | 
                      Tomás González Blasini, David Lugo | 
                      Apr 03, 2023 | 
                      391 |  
                      - | 
                    
                    
                    
                      | 4 tips to manage multiple Terraform versions | 
                      Stephane Jourdan | 
                      May 27, 2020 | 
                      750 |  
                      - | 
                    
                    
                    
                      | Snyk is available on the GOV.UK Digital Marketplace! | 
                      Guy Podjarny | 
                      Jun 01, 2017 | 
                      385 |  
                      - | 
                    
                    
                    
                      | SolarWinds Orion Security Breach: A Shift In The Software Supply Chain Paradigm | 
                      Anton Hoffman | 
                      Mar 02, 2021 | 
                      576 |  
                      - | 
                    
                    
                    
                      | Why fuzzing tools should be part of your security toolkit | 
                      Kuria Macharia | 
                      Oct 28, 2022 | 
                      1763 |  
                      - | 
                    
                    
                    
                      | Why the Facebook outage and Twitch breach matter to business leaders | 
                      Josh Stella | 
                      Oct 14, 2021 | 
                      1357 |  
                      - | 
                    
                    
                    
                      | How to find and fix Critical WebP zero-day vulnerability CVE-2023-4863 | 
                      Brian Clark, Eric Smalling, Tim Gowan | 
                      Oct 05, 2023 | 
                      1282 |  
                      - | 
                    
                    
                    
                      | Snyk-Watcher: keep Snyk in sync | 
                      Vlad Perelmuter | 
                      Feb 17, 2021 | 
                      429 |  
                      - | 
                    
                    
                    
                      | Weak Hash vulnerability discovered in crypto-js and crypto-es (CVE-2023-46233 & CVE-2023-46133) | 
                      Jamie Smith | 
                      Oct 25, 2023 | 
                      1509 |  
                      - | 
                    
                    
                    
                      | Regular Expression Denial-of-Service in websocket-extensions | 
                      Alyssa Miller | 
                      Jun 22, 2020 | 
                      849 |  
                      - | 
                    
                    
                    
                      | Developing secure software: how to implement the OWASP top 10 Proactive Controls | 
                      Liran Tal | 
                      Nov 05, 2020 | 
                      1423 |  
                      - | 
                    
                    
                    
                      | Why did is-promise happen and what can we learn from it | 
                      Liran Tal | 
                      Apr 28, 2020 | 
                      1314 |  
                      2 | 
                    
                    
                    
                      | 2022 Snyk Customer Value Study highlights: The impact of developer-first security | 
                      Jeff Yoshimura | 
                      Oct 18, 2022 | 
                      1061 |  
                      - | 
                    
                    
                    
                      | Announcing the Snyk Team plan: Secure development for teams | 
                      Daniel Berman | 
                      Apr 21, 2021 | 
                      879 |  
                      - | 
                    
                    
                    
                      | It takes a community: Responding to open source criticism post-Log4Shell | 
                      Randall Degges | 
                      Dec 24, 2021 | 
                      1904 |  
                      - | 
                    
                    
                    
                      | Open source vulnerabilities tripped Equifax, how can you defend yourself? | 
                      Guy Podjarny | 
                      Sep 11, 2017 | 
                      1233 |  
                      12 | 
                    
                    
                    
                      | Continuously secure all apps with unlimited Snyk projects | 
                      Guy Podjarny | 
                      Apr 05, 2017 | 
                      379 |  
                      - | 
                    
                    
                    
                      | How to update cURL | 
                      Brian Clark, Eric Smalling | 
                      Oct 11, 2023 | 
                      1772 |  
                      - | 
                    
                    
                    
                      | AWS top 10 misconfigurations and how to fix them: A cheat sheet | 
                      Erin Cullen | 
                      Mar 15, 2023 | 
                      1546 |  
                      - | 
                    
                    
                    
                      | Call for nominations: The Snykie awards for Secure Development | 
                      Sarah Wills | 
                      Sep 28, 2021 | 
                      427 |  
                      - | 
                    
                    
                    
                      | Fixing a Prototype Override Protection Bypass Vulnerability in qs | 
                      Tim Kadlec | 
                      Mar 14, 2017 | 
                      546 |  
                      - | 
                    
                    
                    
                      | 6 big AWS IAM vulnerabilities – and how to avoid them | 
                      Becki Lee | 
                      Nov 05, 2021 | 
                      1098 |  
                      - | 
                    
                    
                    
                      | 77% of 433,000 sites use vulnerable JavaScript libraries | 
                      Tim Kadlec | 
                      Nov 21, 2017 | 
                      1394 |  
                      108 | 
                    
                    
                    
                      | Azure Repos enriched with DevSecOps capabilities | 
                      Ariel Ornstein | 
                      May 01, 2019 | 
                      440 |  
                      - | 
                    
                    
                    
                      | Snyk + International Dog Day: recap | 
                      Megan Moore | 
                      Oct 05, 2022 | 
                      374 |  
                      - | 
                    
                    
                    
                      | Snyk vulnerability disclosure program: what’s going on behind the scenes? | 
                      Asaf Biton | 
                      Apr 14, 2020 | 
                      885 |  
                      - | 
                    
                    
                    
                      | The most common vulnerabilities in Maven Central and npm | 
                      Simon Maple | 
                      Jun 27, 2018 | 
                      540 |  
                      - | 
                    
                    
                    
                      | Handling security vulnerabilities in Spring Boot | 
                      Brian Vermeer | 
                      Nov 29, 2023 | 
                      1451 |  
                      - | 
                    
                    
                    
                      | Three considerations for building an effective security program | 
                      Alex Bovee | 
                      May 04, 2023 | 
                      920 |  
                      - | 
                    
                    
                    
                      | How Dun & Bradstreet and Shutterstock built successful security champions programs | 
                      Sarah Wills | 
                      Oct 14, 2021 | 
                      922 |  
                      - | 
                    
                    
                    
                      | Top 8 penetration testing tools | 
                      Benson Kuria Macharia | 
                      May 25, 2023 | 
                      1172 |  
                      - | 
                    
                    
                    
                      | Snyk Learn and the NIST Cybersecurity Framework (CSF) | 
                      Michael Biocchi | 
                      Mar 06, 2024 | 
                      523 |  
                      - | 
                    
                    
                    
                      | Snyk named #39 on 2021 Forbes Cloud 100 list | 
                      Jeff Yoshimura | 
                      Aug 11, 2021 | 
                      375 |  
                      - | 
                    
                    
                    
                      | Deep dive into Visual Studio Code extension security vulnerabilities | 
                      Raul Onitza-Klugman | 
                      May 26, 2021 | 
                      2562 |  
                      1 | 
                    
                    
                    
                      | Snyk Fetch the Flag CTF 2023 writeup: Protect The Environment | 
                      John Hammond | 
                      Nov 30, 2023 | 
                      243 |  
                      - | 
                    
                    
                    
                      | How even quick Node.js async functions can block the Event-Loop | 
                      Michael Gokhman | 
                      Feb 04, 2019 | 
                      3451 |  
                      3 | 
                    
                    
                    
                      | Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195) | 
                      Liran Tal | 
                      Jan 18, 2024 | 
                      1059 |  
                      - | 
                    
                    
                    
                      | Accelerate C/ C++ security with Snyk | 
                      Marcie Cheung | 
                      Dec 05, 2023 | 
                      614 |  
                      - | 
                    
                    
                    
                      | The Secure Developer: talking DevSecOps in Azure with Microsoft’s Victoria Almazova | 
                      Hayley Denbraver | 
                      Sep 26, 2019 | 
                      819 |  
                      - | 
                    
                    
                    
                      | Scaling your security team without hiring | 
                      Drew Wright | 
                      Nov 02, 2022 | 
                      984 |  
                      - | 
                    
                    
                    
                      | Angular security best practices | 
                      Liran Tal | 
                      Aug 10, 2020 | 
                      2003 |  
                      2 | 
                    
                    
                    
                      | Mastering Python virtual environments: A complete guide to venv, Docker, and securing your code | 
                      Liran Tal | 
                      Jan 10, 2024 | 
                      1589 |  
                      - | 
                    
                    
                    
                      | Snyk Fetch the Flag CTF 2023 writeup: I Do Math | 
                      John Hammond | 
                      Nov 30, 2023 | 
                      190 |  
                      - | 
                    
                    
                    
                      | Snyk @ Snyk: Enabling Kubernetes RBAC for Snyk’s Developers | 
                      Omer Levi Hevroni | 
                      Apr 14, 2021 | 
                      771 |  
                      - | 
                    
                    
                    
                      | 8 tips for securing containers from source to runtime | 
                      Sarah Conway | 
                      Aug 24, 2022 | 
                      661 |  
                      - | 
                    
                    
                    
                      | How to verify and secure your Mastodon account | 
                      Liran Tal | 
                      Dec 05, 2022 | 
                      946 |  
                      - | 
                    
                    
                    
                      | How to protect Node.js apps from CSRF attacks | 
                      Victor Ikechukwu | 
                      Oct 17, 2023 | 
                      3146 |  
                      - | 
                    
                    
                    
                      | Snyk integrates with AWS Security Hub to automate security remediation workflows | 
                      David Lugo | 
                      Jun 12, 2023 | 
                      884 |  
                      - | 
                    
                    
                    
                      | Command injection vulnerability in Snyk CLI released prior to September 1, 2022 (older than v1.996.0) | 
                      Gareth Rushgrove | 
                      Oct 03, 2022 | 
                      501 |  
                      - | 
                    
                    
                    
                      | LGBTQ+ in tech: from building apps to spreading magic—part I | 
                      Eirini-Eleni Papadopoulou | 
                      Jun 29, 2020 | 
                      2646 |  
                      - | 
                    
                    
                    
                      | How to implement SSL/TLS pinning in Node.js | 
                      Nwani Victory | 
                      Aug 29, 2023 | 
                      2298 |  
                      - | 
                    
                    
                    
                      | Python security best practices cheat sheet | 
                      Frank Fischer | 
                      Sep 27, 2021 | 
                      2241 |  
                      5 | 
                    
                    
                    
                      | Streamline dependency updates with Mergify and Snyk | 
                      Liran Tal | 
                      Aug 23, 2023 | 
                      1548 |  
                      - | 
                    
                    
                    
                      | 10 Docker Security Best Practices | 
                      Liran Tal, Omer Levi Hevroni | 
                      Mar 06, 2019 | 
                      3479 |  
                      1 | 
                    
                    
                    
                      | The Cloud Security Podcast is now powered by Snyk! | 
                      Ashish Rajan | 
                      Jul 26, 2022 | 
                      562 |  
                      - | 
                    
                    
                    
                      | 5 security best practices for adopting generative AI code assistants like GitHub Copilot | 
                      Liqian Lim (林利蒨) | 
                      Mar 05, 2024 | 
                      1368 |  
                      - | 
                    
                    
                    
                      | A denial of service Regex breaks FastAPI security | 
                      Liran Tal | 
                      Jul 31, 2024 | 
                      1878 |  
                      - | 
                    
                    
                    
                      | How secure is WebAssembly? 5 security concerns unique to WebAssembly | 
                      Marcelo Oliveira | 
                      Jul 28, 2023 | 
                      1448 |  
                      2 | 
                    
                    
                    
                      | Scanning Red Hat Quay registry images for vulnerabilities with Snyk | 
                      Jim Armstrong | 
                      Apr 01, 2021 | 
                      880 |  
                      - | 
                    
                    
                    
                      | The Docker project turns 10! Looking back at a decade of containers | 
                      Eric Smalling | 
                      Mar 17, 2023 | 
                      3058 |  
                      - | 
                    
                    
                    
                      | Update: OpenSSL high severity vulnerabilities | 
                      Vandana Verma Sehgal | 
                      Nov 03, 2022 | 
                      516 |  
                      - | 
                    
                    
                    
                      | Talk to us about Snyk CLI | 
                      Chintan B., Neil Mackay | 
                      Jun 06, 2024 | 
                      859 |  
                      - | 
                    
                    
                    
                      | Snyk Announces New Rapid7 Strategic Partnership at RSA 2020 | 
                      Sarah Conway | 
                      Feb 24, 2020 | 
                      387 |  
                      - | 
                    
                    
                    
                      | How Mulesoft fosters a developer-first, shift-left culture with Snyk | 
                      Gerald Crescione | 
                      Apr 30, 2024 | 
                      798 |  
                      - | 
                    
                    
                    
                      | Snyk Open Source adds beta C/C++ security scanning for unmanaged OSS | 
                      Daniel Berman | 
                      Dec 08, 2021 | 
                      974 |  
                      - | 
                    
                    
                    
                      | Why developer-first SAST tools are the future of code security | 
                      Liran Tal | 
                      Apr 28, 2021 | 
                      2293 |  
                      - | 
                    
                    
                    
                      | Launching a Free-Tier Version of our Container Vulnerability Management Solution | 
                      Liron Lifshitz-Yadin | 
                      Oct 10, 2018 | 
                      253 |  
                      - | 
                    
                    
                    
                      | The art of conditional rendering: Tips and tricks for React and Next.js developers | 
                      Kumar Harsh | 
                      Oct 30, 2023 | 
                      2865 |  
                      - | 
                    
                    
                    
                      | Trend Micro and Snyk partner to deliver complete remediation to secure containers | 
                      Geva Solomonovich | 
                      Oct 08, 2019 | 
                      438 |  
                      - | 
                    
                    
                    
                      | Snyk's 2023 State of Open Source Security: Supply chain security, AI, and more | 
                      Simon Maple | 
                      Jul 26, 2023 | 
                      1184 |  
                      - | 
                    
                    
                    
                      | Snyk achieves AWS Security Competency | 
                      David Lugo | 
                      Nov 15, 2023 | 
                      514 |  
                      - | 
                    
                    
                    
                      | Improve security by knowing when to ignore IaC vulnerabilities | 
                      Craig Furman | 
                      Sep 29, 2021 | 
                      1004 |  
                      - | 
                    
                    
                    
                      | Diagnosing and fixing memory leaks in Python | 
                      Drew Wright | 
                      Mar 07, 2017 | 
                      2313 |  
                      - | 
                    
                    
                    
                      | Faster & improved tests for JavaScript lockfile based projects | 
                      Liliana Kastilio | 
                      Dec 10, 2018 | 
                      641 |  
                      - | 
                    
                    
                    
                      | Welcoming Sanjay Poonen to the Snyk Board of Directors | 
                      Peter McKay | 
                      Oct 20, 2021 | 
                      564 |  
                      - | 
                    
                    
                    
                      | Preventing SQL injection attacks in Node.js | 
                      Lucien Chemaly | 
                      Feb 20, 2024 | 
                      2260 |  
                      - | 
                    
                    
                    
                      | Snyking in - regular expression denial of service vulnerability exploit in the ms package | 
                      Simon Maple | 
                      Mar 13, 2019 | 
                      864 |  
                      - | 
                    
                    
                    
                      | Addressing cybersecurity challenges in open source software with the Linux Foundation | 
                      Mariah Gresham | 
                      Jul 20, 2022 | 
                      1033 |  
                      - | 
                    
                    
                    
                      | Angular vs React: security bakeoff 2019 | 
                      Liran Tal | 
                      Oct 30, 2019 | 
                      999 |  
                      - | 
                    
                    
                    
                      | A brief history of modularity | 
                      Josh Emerson | 
                      Nov 21, 2016 | 
                      625 |  
                      - | 
                    
                    
                    
                      | DevSecCon24 2021: 24 hours of development, security, and inclusivity | 
                      Sam Hepburn | 
                      Jun 07, 2021 | 
                      845 |  
                      - | 
                    
                    
                    
                      | Popular Python library, urllib3, subject to a denial of service vulnerability | 
                      Hayley Denbraver | 
                      Mar 09, 2020 | 
                      485 |  
                      - | 
                    
                    
                    
                      | Snyk $7M Series A - and a huge thanks! | 
                      Guy Podjarny | 
                      Mar 08, 2018 | 
                      884 |  
                      - | 
                    
                    
                    
                      | Best practices for secrets management in serverless applications | 
                      Liran Tal | 
                      Jun 13, 2019 | 
                      709 |  
                      - | 
                    
                    
                    
                      | How Voltos Uses Snyk to Secure Their Own Security Product | 
                      Glenn Gillen | 
                      Feb 22, 2017 | 
                      807 |  
                      - | 
                    
                    
                    
                      | Find and fix vulnerabilities in Artifactory container repositories | 
                      Jim Armstrong | 
                      Feb 08, 2020 | 
                      674 |  
                      - | 
                    
                    
                    
                      | SnykLaunch June ‘23: Insights and DeepCode AI enable faster fixes and prioritization | 
                      Jim Armstrong | 
                      Jun 07, 2023 | 
                      1567 |  
                      - | 
                    
                    
                    
                      | Snyk and Rapid7 partnership expand capabilities to enhance security for cloud native applications | 
                      Sarah Conway | 
                      Sep 17, 2020 | 
                      341 |  
                      - | 
                    
                    
                    
                      | Finding and fixing exposed hardcoded secrets in your GitHub project with Snyk | 
                      Chandler Mayo | 
                      Jun 25, 2024 | 
                      902 |  
                      - | 
                    
                    
                    
                      | Breaking down the ’critical’ OpenSSL vulnerability | 
                      Elliot Ward, Raul Onitza-Klugman | 
                      Nov 04, 2022 | 
                      1657 |  
                      - | 
                    
                    
                    
                      | 2020 Q1 in review—JVM ecosystem report, DevSecOps insights, and more | 
                      Simon Maple | 
                      Dec 28, 2020 | 
                      844 |  
                      - | 
                    
                    
                    
                      | Does GitOps enhance application security? | 
                      Vandana Verma Sehgal | 
                      Aug 21, 2023 | 
                      1026 |  
                      - | 
                    
                    
                    
                      | What are AI hallucinations and why should developers care? | 
                      Liran Tal | 
                      Aug 16, 2023 | 
                      2376 |  
                      1 | 
                    
                    
                    
                      | Ruby gem installations can expose you to lockfile injection attacks | 
                      Liran Tal | 
                      Aug 17, 2022 | 
                      2317 |  
                      - | 
                    
                    
                    
                      | Fastify Node.js framework improves JSON security thanks to a security report | 
                      Liran Tal | 
                      Mar 10, 2020 | 
                      424 |  
                      1 | 
                    
                    
                    
                      | Infrastructure drift and drift detection explained | 
                      Lauren Place | 
                      Mar 09, 2022 | 
                      1362 |  
                      - | 
                    
                    
                    
                      | Welcoming Danny Allan and Brian Rogan: Snyk leadership team expands with key appointments to accelerate innovation | 
                      Peter McKay | 
                      Feb 06, 2024 | 
                      492 |  
                      - | 
                    
                    
                    
                      | The 8 best IntelliJ plugins for improving your coding experience | 
                      Brian Vermeer | 
                      Aug 26, 2021 | 
                      1356 |  
                      - | 
                    
                    
                    
                      | Fixing `marked` XSS vulnerability | 
                      Guy Podjarny | 
                      May 15, 2016 | 
                      1081 |  
                      2 | 
                    
                    
                    
                      | Getting started with React Native security | 
                      Kingsley Ubah | 
                      Apr 07, 2022 | 
                      2306 |  
                      - | 
                    
                    
                    
                      | Code Dx 5.3 integrates with Snyk for comprehensive vulnerability management | 
                      Utsav Sanghani | 
                      Apr 19, 2021 | 
                      531 |  
                      - | 
                    
                    
                    
                      | Fetch the Flag CTF 2022 writeup: Logster | 
                      Sonya Moisset | 
                      Nov 10, 2022 | 
                      1063 |  
                      - | 
                    
                    
                    
                      | Snyk welcomes Reviewpad:  Code, commit, celebrate! | 
                      Manoj Nair | 
                      Oct 30, 2023 | 
                      606 |  
                      - | 
                    
                    
                    
                      | Our favorite 2023 Snyk Fetch the Flag CTF writeups from the community | 
                      Danielle Bradford | 
                      Nov 21, 2023 | 
                      183 |  
                      - | 
                    
                    
                    
                      | 5 ways to prevent PHP code injection | 
                      DeveloperSteve Coochin | 
                      Jun 29, 2021 | 
                      1907 |  
                      - | 
                    
                    
                    
                      | Top 3 security best practices for handling JWTs | 
                      Liran Tal | 
                      Dec 18, 2023 | 
                      2007 |  
                      - | 
                    
                    
                    
                      | A quick primer on LDAP injection | 
                      Eric Kahuha | 
                      Jun 01, 2023 | 
                      1379 |  
                      - | 
                    
                    
                    
                      | 10 GitHub Security Best Practices | 
                      Brian Vermeer | 
                      Feb 05, 2024 | 
                      3532 |  
                      3 | 
                    
                    
                    
                      | Ruby on Rails Docker for local development environment | 
                      Mikhail Tereschenko | 
                      Nov 02, 2022 | 
                      1770 |  
                      - | 
                    
                    
                    
                      | So, you think your CI/CD environment is secure? | 
                      Simon Maple | 
                      Feb 21, 2019 | 
                      1426 |  
                      2 | 
                    
                    
                    
                      | .NET developers alert: Moq NuGET package exfiltrates user emails from git | 
                      Liran Tal | 
                      Aug 09, 2023 | 
                      831 |  
                      2 | 
                    
                    
                    
                      | Snyk Code in 2021: Redefining SAST | 
                      Frank Fischer | 
                      Dec 21, 2021 | 
                      593 |  
                      - | 
                    
                    
                    
                      | Snyk expands into Asia Pacific Japan | 
                      Peter McKay | 
                      Mar 11, 2021 | 
                      706 |  
                      - | 
                    
                    
                    
                      | International Men’s Day—it’s time to talk | 
                      Nickie Hills | 
                      Nov 19, 2020 | 
                      1159 |  
                      - | 
                    
                    
                    
                      | Fixing a Remote Code Execution Vulnerability in EJS | 
                      Tim Kadlec | 
                      Nov 30, 2016 | 
                      664 |  
                      - | 
                    
                    
                    
                      | Modern VS Code extension development tutorial: Building a secure extension | 
                      Mdu Sibisi | 
                      Oct 02, 2023 | 
                      3917 |  
                      - | 
                    
                    
                    
                      | Securing Bitbucket Cloud with Snyk | 
                      Ariel Ornstein | 
                      Apr 04, 2019 | 
                      460 |  
                      - | 
                    
                    
                    
                      | Container vulnerability management for developers | 
                      Aner Mazur | 
                      Jun 28, 2018 | 
                      655 |  
                      - | 
                    
                    
                    
                      | Introducing SUS: Snyk Ultimate Security | 
                      Megan Moore | 
                      Apr 01, 2022 | 
                      592 |  
                      - | 
                    
                    
                    
                      | Engineering is somewhat like basketball | 
                      Anton Drukh | 
                      Aug 04, 2016 | 
                      1224 |  
                      - | 
                    
                    
                    
                      | A serious security flaw in runC can result in root privilege escalation in Docker and Kubernetes | 
                      Liran Tal | 
                      Feb 13, 2019 | 
                      932 |  
                      - | 
                    
                    
                    
                      | Showing Snyk security information in GitHub code scanning | 
                      Gareth Rushgrove | 
                      Oct 07, 2020 | 
                      582 |  
                      - | 
                    
                    
                    
                      | Control your role! Kubernetes RBAC explored | 
                      James Walker | 
                      Jul 27, 2023 | 
                      2123 |  
                      - | 
                    
                    
                    
                      | The importance of platform engineers in a security program | 
                      Elliott Spira | 
                      Apr 13, 2023 | 
                      962 |  
                      - | 
                    
                    
                    
                      | Snyk Partner Speak Video with ServiceNow: A complete view of application security | 
                      Sarah Conway | 
                      May 02, 2023 | 
                      196 |  
                      - | 
                    
                    
                    
                      | Snyk <3 Jira | 
                      Anna Debenham | 
                      Jun 20, 2018 | 
                      551 |  
                      - | 
                    
                    
                    
                      | Reporting AppSec risk up to your CISO | 
                      Kate Powers Burke, Ezra Tanzer | 
                      Feb 13, 2024 | 
                      1945 |  
                      - | 
                    
                    
                    
                      | How Snyk Social Trends help you fix essential security vulnerabilities | 
                      Brian Vermeer | 
                      Aug 18, 2021 | 
                      909 |  
                      - | 
                    
                    
                    
                      | Securing next-gen development: Lessons from Trust Bank and TASConnect | 
                      Gerald Crescione | 
                      Jun 05, 2024 | 
                      1312 |  
                      - | 
                    
                    
                    
                      | Building a secure CI/CD pipeline with GitHub Actions for your Java Application | 
                      Brian Vermeer | 
                      Jun 27, 2022 | 
                      1456 |  
                      - | 
                    
                    
                    
                      | My first week at Snyk was at our All Hands Conference | 
                      Hayley Denbraver | 
                      Feb 12, 2019 | 
                      1300 |  
                      - | 
                    
                    
                    
                      | Snyk brings developer-first AppSec approach to C/C++ | 
                      Roy Ram, Neha Shenoy | 
                      Apr 04, 2023 | 
                      1094 |  
                      - | 
                    
                    
                    
                      | Maven support is here! | 
                      Guy Podjarny | 
                      Apr 18, 2017 | 
                      441 |  
                      - | 
                    
                    
                    
                      | Snyk sponsors Atlassian Team ’22: Bringing developer security to the Atlassian ecosystem | 
                      Sarah Conway | 
                      Apr 05, 2022 | 
                      601 |  
                      - | 
                    
                    
                    
                      | The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant | 
                      Brian Vermeer | 
                      Aug 29, 2024 | 
                      1000 |  
                      - | 
                    
                    
                    
                      | Writing unit tests in Java | 
                      Lewis Gavin | 
                      Nov 18, 2022 | 
                      1629 |  
                      - | 
                    
                    
                    
                      | Trend Micro launches Cloud One Open Source Security powered by Snyk | 
                      Geva Solomonovich | 
                      May 10, 2021 | 
                      926 |  
                      - | 
                    
                    
                    
                      | How to do password hashing in Java applications the right way! | 
                      Brian Vermeer | 
                      Mar 24, 2022 | 
                      1911 |  
                      - | 
                    
                    
                    
                      | DevSecOps lifecycle coverage with new Snyk and Dynatrace app | 
                      Sarah Conway | 
                      May 15, 2023 | 
                      507 |  
                      - | 
                    
                    
                    
                      | 2022 Collaboration Partner of the Year: Snyk | 
                      Sarah Conway | 
                      Oct 05, 2022 | 
                      417 |  
                      - | 
                    
                    
                    
                      | How Snyk ensures safe adoption of AI | 
                      Akanchha Shrivastava | 
                      Mar 27, 2024 | 
                      1534 |  
                      - | 
                    
                    
                    
                      | You can’t compare SAST tools using only lists, test suites, and benchmarks | 
                      Asaf Biton | 
                      Jun 16, 2021 | 
                      832 |  
                      - | 
                    
                    
                    
                      | Signing container images: Comparing Sigstore, Notary, and Docker Content Trust | 
                      Hrittik Roy | 
                      Sep 26, 2023 | 
                      3098 |  
                      - | 
                    
                    
                    
                      | Real-time threat protection with Snyk and SentinelOne | 
                      Shivam Jindal | 
                      Nov 09, 2023 | 
                      679 |  
                      - | 
                    
                    
                    
                      | Secure JavaScript URL validation | 
                      Mannan Tirmizi | 
                      May 09, 2023 | 
                      1940 |  
                      6 | 
                    
                    
                    
                      | A recap of our Kubernetes configuration security announcement and webinar | 
                      Jim Armstrong | 
                      Apr 10, 2020 | 
                      1051 |  
                      - | 
                    
                    
                    
                      | Using JLink to create smaller Docker images for your Spring Boot Java application | 
                      Brian Vermeer | 
                      Aug 24, 2023 | 
                      1499 |  
                      - | 
                    
                    
                    
                      | Adding Snyk security to Jira and Bitbucket Cloud | 
                      LaToya Muff | 
                      Oct 25, 2023 | 
                      647 |  
                      - | 
                    
                    
                    
                      | How to scale successfully with Snyk’s Project Attributes and Tags | 
                      Waleed Arshad | 
                      Sep 30, 2020 | 
                      1160 |  
                      - | 
                    
                    
                    
                      | SDR Series: Meet our APJ team | 
                      Snyk Team | 
                      Apr 26, 2022 | 
                      1350 |  
                      - | 
                    
                    
                    
                      | VS Code extension: building auto CI/CD with GitHub Actions | 
                      Shai Mendel | 
                      Apr 06, 2020 | 
                      1225 |  
                      - | 
                    
                    
                    
                      | Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code | 
                      Brian Vermeer | 
                      Apr 25, 2023 | 
                      1523 |  
                      - | 
                    
                    
                    
                      | Scaling security with DevSecOps at a Forbes Cloud 100 company | 
                      Taylor Macomber | 
                      Sep 16, 2020 | 
                      730 |  
                      - | 
                    
                    
                    
                      | How SME lender New10 uses AWS and Snyk to deliver quickly and securely | 
                      Udi Nachmany | 
                      Jul 08, 2019 | 
                      1608 |  
                      - | 
                    
                    
                    
                      | SocketSleuth: Improving security testing for WebSocket applications | 
                      Elliot Ward | 
                      Sep 06, 2023 | 
                      843 |  
                      - | 
                    
                    
                    
                      | Cheatsheet: top 10 application security acronyms | 
                      Alyssa Miller | 
                      Dec 01, 2020 | 
                      2037 |  
                      4 | 
                    
                    
                    
                      | Serialization and deserialization in Java: explaining the Java deserialize vulnerability | 
                      Brian Vermeer | 
                      Dec 18, 2020 | 
                      1847 |  
                      - | 
                    
                    
                    
                      | AI-generated security fixes in Snyk Code now available | 
                      Jim Armstrong | 
                      May 09, 2023 | 
                      823 |  
                      - | 
                    
                    
                    
                      | Snyk named to CNBC 2023 Disruptor 50 List | 
                      Peter McKay | 
                      May 09, 2023 | 
                      311 |  
                      - | 
                    
                    
                    
                      | Exploring 3 types of directory traversal vulnerabilities in C/C++ | 
                      Kirill Efimov | 
                      Apr 04, 2022 | 
                      2081 |  
                      - | 
                    
                    
                    
                      | Navigating the AI-powered development era in financial services | 
                      Lawrence Crowther | 
                      Aug 26, 2024 | 
                      826 |  
                      - | 
                    
                    
                    
                      | Fetch the Flag CTF 2022 writeup: Pay Attention | 
                      Assaf Ben Josef | 
                      Nov 10, 2022 | 
                      1058 |  
                      - | 
                    
                    
                    
                      | Cloud Security at Blackhat and Defcon 2022 | 
                      Ashish Rajan | 
                      Sep 06, 2022 | 
                      1896 |  
                      - | 
                    
                    
                    
                      | Snyk Integrates with AWS to Help Enterprises Build Secure Applications | 
                      Udi Nachmany | 
                      Apr 09, 2020 | 
                      548 |  
                      - | 
                    
                    
                    
                      | How much do we really know about how packages behave on the npm registry? | 
                      Liran Tal | 
                      Apr 22, 2019 | 
                      944 |  
                      1 | 
                    
                    
                    
                      | Achieving developer security adoption at Nylas with Snyk | 
                      Erin Cullen | 
                      Dec 04, 2023 | 
                      762 |  
                      - | 
                    
                    
                    
                      | WillowTree roundtable: security for hypergrowth organizations | 
                      Mariah Gresham | 
                      Apr 22, 2022 | 
                      1051 |  
                      - | 
                    
                    
                    
                      | Launching "The Secure Developer" Podcast | 
                      Guy Podjarny | 
                      Oct 11, 2016 | 
                      542 |  
                      - | 
                    
                    
                    
                      | Fetch the Flag CTF 2022 writeup: git-refs | 
                      Iulia Manda | 
                      Nov 10, 2022 | 
                      585 |  
                      - | 
                    
                    
                    
                      | Top 5 security concerns for infrastructure as code | 
                      Raphael Mun | 
                      Jul 14, 2023 | 
                      1565 |  
                      - | 
                    
                    
                    
                      | 8 tips for securing your CI/CD pipeline with Snyk | 
                      Eric Smalling | 
                      Jul 20, 2023 | 
                      3928 |  
                      - | 
                    
                    
                    
                      | Timing out synchronous functions with regex | 
                      Steve Shani | 
                      Apr 06, 2023 | 
                      1071 |  
                      - | 
                    
                    
                    
                      | Concerns of supply-chain attacks amplify as remote code execution was found in Ruby gem strong_password | 
                      Liran Tal | 
                      Jul 07, 2019 | 
                      615 |  
                      4 | 
                    
                    
                    
                      | How Okta empowers devs to find & fix security issues with Snyk | 
                      Mariah Gresham | 
                      Aug 25, 2023 | 
                      958 |  
                      - | 
                    
                    
                    
                      | Make Snyk notifications work for you | 
                      Michele Wiedemer | 
                      Apr 06, 2022 | 
                      550 |  
                      - | 
                    
                    
                    
                      | A Denial of Service vulnerability discovered in the Axios JavaScript package - affecting all versions of the popular HTTP client | 
                      Liran Tal | 
                      May 06, 2019 | 
                      749 |  
                      2 | 
                    
                    
                    
                      | 7 tips to become a successful bug bounty hunter | 
                      Ben Sadeghipour | 
                      Jan 25, 2024 | 
                      1246 |  
                      - | 
                    
                    
                    
                      | SQL injection cheat sheet: 8 best practices to prevent SQL injection attacks | 
                      Brian Vermeer | 
                      Mar 26, 2021 | 
                      1802 |  
                      - | 
                    
                    
                    
                      | Nine Docker pro tips for Node.js developers | 
                      Liran Tal | 
                      Apr 11, 2024 | 
                      1630 |  
                      - | 
                    
                    
                    
                      | Announcing IaC+ early access: Secure your infrastructure configurations across the SDLC | 
                      Lauren Place | 
                      Oct 03, 2023 | 
                      686 |  
                      - | 
                    
                    
                    
                      | Dependency Health—assessing package risk with Snyk | 
                      Anna Debenham | 
                      May 16, 2019 | 
                      832 |  
                      - | 
                    
                    
                    
                      | How to generate an SBOM for JavaScript and Node.js applications | 
                      Liran Tal | 
                      May 22, 2023 | 
                      2795 |  
                      - | 
                    
                    
                    
                      | Build and deploy a Node.js security scanning API to Platformatic Cloud | 
                      Liran Tal | 
                      Jan 05, 2024 | 
                      2980 |  
                      - | 
                    
                    
                    
                      | Buildkit GRPC SecurityMode privilege check: Build-time container breakout (CVE-2024-23653) | 
                      Rory McNamara | 
                      Jan 31, 2024 | 
                      946 |  
                      - | 
                    
                    
                    
                      | 64% of developers report that Java 8 remains the most often used release | 
                      Brian Vermeer | 
                      Feb 05, 2020 | 
                      926 |  
                      - | 
                    
                    
                    
                      | What does Biden's Executive Order on AI safety measures mean for businesses? | 
                      Liqian Lim (林利蒨) | 
                      Nov 02, 2023 | 
                      2399 |  
                      - | 
                    
                    
                    
                      | Docker for Java developers: 5 things you need to know not to fail your security | 
                      Brian Vermeer | 
                      Nov 20, 2020 | 
                      2056 |  
                      - | 
                    
                    
                    
                      | The inevitability of Developer Security | 
                      Guy Podjarny | 
                      Sep 09, 2021 | 
                      614 |  
                      - | 
                    
                    
                    
                      | From zero to security hero: test your GitHub projects for known vulnerabilities | 
                      Simon Maple | 
                      Nov 12, 2020 | 
                      625 |  
                      - | 
                    
                    
                    
                      | Kroger’s approach to supply chain security | 
                      Brian Piper | 
                      Jan 02, 2024 | 
                      888 |  
                      - | 
                    
                    
                    
                      | Java turns 25—aging like fine wine or more like milk? | 
                      Brian Vermeer | 
                      May 22, 2020 | 
                      820 |  
                      1 | 
                    
                    
                    
                      | AppSec spring cleaning checklist | 
                      Mariah Gresham | 
                      May 13, 2024 | 
                      783 |  
                      - | 
                    
                    
                    
                      | Enhancing PCI compliance security with SAST and SCA | 
                      DeveloperSteve Coochin | 
                      Feb 08, 2022 | 
                      1359 |  
                      - | 
                    
                    
                    
                      | Welcoming Diana Brunelle: Snyk’s New Chief People Officer | 
                      Peter McKay | 
                      Jul 22, 2024 | 
                      336 |  
                      - | 
                    
                    
                    
                      | Installing and managing Java on macOS | 
                      Keshav Malik | 
                      Oct 12, 2023 | 
                      1464 |  
                      - | 
                    
                    
                    
                      | The importance of verifying webhook signatures | 
                      Marcelo Oliveira | 
                      Jun 29, 2023 | 
                      1829 |  
                      - | 
                    
                    
                    
                      | Three ways Snyk made software supply chains more secure in 2022 | 
                      Jamie Smith | 
                      Jan 12, 2023 | 
                      1390 |  
                      - | 
                    
                    
                    
                      | Docker for Node.js developers: 5 things you need to know not to fail your security | 
                      Liran Tal | 
                      Jan 25, 2021 | 
                      1829 |  
                      - | 
                    
                    
                    
                      | Improving developer experience with security tools at Pinterest | 
                      Megan Moore | 
                      Jul 14, 2022 | 
                      1165 |  
                      - | 
                    
                    
                    
                      | Open source maintainer pulls the plug on npm packages colors and faker, now what? | 
                      Liran Tal | 
                      Jan 09, 2022 | 
                      1160 |  
                      1 | 
                    
                    
                    
                      | Best practices for container isolation | 
                      Maryann Agofure | 
                      Aug 29, 2022 | 
                      1562 |  
                      - | 
                    
                    
                    
                      | Skyscanner fixed projects and gained visibility into their open source vulnerability exposure. | 
                      Ellen Van Keulen | 
                      May 03, 2018 | 
                      818 |  
                      - | 
                    
                    
                    
                      | Introducing pkgbot! | 
                      Karen Yavine | 
                      Jan 19, 2017 | 
                      475 |  
                      - | 
                    
                    
                    
                      | Announcing Snyk CLI for Ruby, and more ways to fix Ruby vulnerabilities | 
                      Johanna Kollmann | 
                      Dec 19, 2016 | 
                      287 |  
                      - | 
                    
                    
                    
                      | Rego 102: Combining queries with AND/OR and custom messages | 
                      Jasper Van der Jeugt, Becki Lee | 
                      Nov 09, 2023 | 
                      2514 |  
                      - | 
                    
                    
                    
                      | Best practices for building a production-ready Dockerfile for PHP applications | 
                      James Walker | 
                      Aug 22, 2023 | 
                      2507 |  
                      - | 
                    
                    
                    
                      | Introducing The Secure Developer community | 
                      Sam Hepburn | 
                      Feb 14, 2019 | 
                      431 |  
                      - | 
                    
                    
                    
                      | Azure Bicep security fundamentals | 
                      Mark Johnson | 
                      Dec 13, 2022 | 
                      1143 |  
                      - | 
                    
                    
                    
                      | Use Snyk security policies to prioritize fixes more efficiently | 
                      Daniel Berman | 
                      Aug 11, 2021 | 
                      1080 |  
                      - | 
                    
                    
                    
                      | Snyk sponsoring 2021 Open Source Summit by the Linux Foundation | 
                      Sarah Conway | 
                      Sep 16, 2021 | 
                      680 |  
                      - | 
                    
                    
                    
                      | A guide to input validation with Spring Boot | 
                      Lucien Chemaly | 
                      Sep 12, 2023 | 
                      2751 |  
                      - | 
                    
                    
                    
                      | Detect infrastructure drift and unmanaged resources with Snyk IaC | 
                      Stephane Jourdan | 
                      May 09, 2022 | 
                      1485 |  
                      - | 
                    
                    
                    
                      | What’s new in CVSS 4.0 | 
                      Paul Lascar | 
                      Nov 08, 2023 | 
                      1679 |  
                      - | 
                    
                    
                    
                      | GitHub “besieged” by malware repositories and repo confusion: Why you'll be ok | 
                      Liran Tal | 
                      Mar 12, 2024 | 
                      2102 |  
                      - | 
                    
                    
                    
                      | GitHub Security Code Scanning: Secure your open source dependencies | 
                      Daniel Berman | 
                      May 04, 2021 | 
                      996 |  
                      - | 
                    
                    
                    
                      | Safer together: Snyk and CISPA collaborate for the greater good | 
                      Idan Digmi | 
                      Jun 06, 2022 | 
                      853 |  
                      - | 
                    
                    
                    
                      | Announcing Snyk Apps beta: Build custom apps to extend Snyk security into your workflows | 
                      Daniel Berman | 
                      Oct 06, 2021 | 
                      651 |  
                      - | 
                    
                    
                    
                      | Snyk & Intuit roundtable: Breaking silos, engaging with security and developer communities | 
                      Simon Maple | 
                      Apr 30, 2021 | 
                      1654 |  
                      - | 
                    
                    
                    
                      | Security in the Container Registry | 
                      Udi Nachmany | 
                      Feb 21, 2019 | 
                      665 |  
                      - | 
                    
                    
                    
                      | Kotlin overtakes Scala and Clojure, becoming the 2nd most popular language on the JVM ecosystem | 
                      Brian Vermeer | 
                      Feb 05, 2020 | 
                      970 |  
                      192 | 
                    
                    
                    
                      | Snyk Code’s autofixing feature, DeepCode AI Fix, just got better | 
                      Eric Fernandez, Berkay Berabi | 
                      Apr 23, 2024 | 
                      2452 |  
                      - | 
                    
                    
                    
                      | Snyk provides a critical security layer for CommunityBridge, a new Linux Foundation platform | 
                      Noa Korem | 
                      Mar 13, 2019 | 
                      360 |  
                      - | 
                    
                    
                    
                      | Snyk is Now Integrated with Chrome’s Lighthouse | 
                      Tim Kadlec | 
                      Apr 03, 2018 | 
                      578 |  
                      - | 
                    
                    
                    
                      | How to build a secure WebSocket server in Python | 
                      Kingsley Ubah | 
                      Jul 05, 2022 | 
                      2728 |  
                      - | 
                    
                    
                    
                      | Best practices for rolling out Snyk | 
                      Or Feuer | 
                      Aug 06, 2019 | 
                      1203 |  
                      - | 
                    
                    
                    
                      | How Lunar shifted security left while building a cloud native bank | 
                      Brian Piper | 
                      Jan 20, 2022 | 
                      759 |  
                      - | 
                    
                    
                    
                      | How Snyk helps satisfy White House cybersecurity recommendations | 
                      Vandana Verma Sehgal | 
                      Mar 23, 2022 | 
                      1149 |  
                      - | 
                    
                    
                    
                      | Tips to scale your DevSecOps organization from Gene Kim and Guy Podjarny | 
                      Ravi Maira | 
                      Nov 02, 2020 | 
                      1176 |  
                      - | 
                    
                    
                    
                      | Generating fake security data with Python and faker-security | 
                      Michael Aquilina | 
                      Apr 26, 2022 | 
                      859 |  
                      - | 
                    
                    
                    
                      | Checking Helm Charts for security misconfigurations | 
                      Gareth Rushgrove | 
                      Jun 03, 2020 | 
                      429 |  
                      1 | 
                    
                    
                    
                      | Rediscovering argument injection when using VCS tools — git and mercurial | 
                      Alessio Della Libera | 
                      Aug 23, 2022 | 
                      2111 |  
                      3 | 
                    
                    
                    
                      | Join the Snyk Developer Challenge | 
                      Brittany Cannon | 
                      Aug 01, 2022 | 
                      479 |  
                      - | 
                    
                    
                    
                      | 5 tips for adopting AI code assistance securely | 
                      Liqian Lim (林利蒨) | 
                      May 30, 2024 | 
                      856 |  
                      - | 
                    
                    
                    
                      | Welcoming Tamar Yehoshua to the Snyk Board of Directors | 
                      Snyk Team | 
                      Jul 26, 2021 | 
                      405 |  
                      - | 
                    
                    
                    
                      | 2020 Q4 in review—iOS remote code execution, developer-first SAST, and more | 
                      Simon Maple | 
                      Dec 31, 2020 | 
                      1077 |  
                      - | 
                    
                    
                    
                      | Abusing Ubuntu 24.04 features for root privilege escalation | 
                      Rory McNamara | 
                      Sep 09, 2024 | 
                      5975 |  
                      189 | 
                    
                    
                    
                      | Snyk's AppSec dream team | 
                      Krysta Williams-Timm | 
                      Mar 19, 2024 | 
                      843 |  
                      - | 
                    
                    
                    
                      | A moment of respite for our mental health | 
                      Dipti Salopek | 
                      May 11, 2020 | 
                      353 |  
                      - | 
                    
                    
                    
                      | Improved security testing for git-based Gradle projects using lockfile | 
                      Antonio Gomes | 
                      Dec 07, 2020 | 
                      693 |  
                      - | 
                    
                    
                    
                      | Limitations of a single AI model | 
                      Frank Fischer | 
                      Aug 07, 2023 | 
                      1401 |  
                      - | 
                    
                    
                    
                      | Automate security controls from development to production on Google Cloud | 
                      David Lugo | 
                      Jun 18, 2024 | 
                      1073 |  
                      - | 
                    
                    
                    
                      | Shipping Kubernetes-native applications with confidence | 
                      Amir Moualem | 
                      Nov 14, 2019 | 
                      1337 |  
                      - | 
                    
                    
                    
                      | My internship journey at Snyk | 
                      Caroline Gow | 
                      Feb 16, 2023 | 
                      1329 |  
                      - | 
                    
                    
                    
                      | SourMint: Malicious code, ad fraud, and data leak in iOS | 
                      Alyssa Miller | 
                      Aug 24, 2020 | 
                      1900 |  
                      10 | 
                    
                    
                    
                      | Copilot amplifies insecure codebases by replicating vulnerabilities in your projects | 
                      Randall Degges | 
                      Feb 22, 2024 | 
                      1578 |  
                      - | 
                    
                    
                    
                      | January in review: funding news, DevSecOps insights study, and much more | 
                      Hayley Denbraver | 
                      Jan 31, 2020 | 
                      455 |  
                      - | 
                    
                    
                    
                      | Snyk Partner Speak video series with HashiCorp | 
                      Sarah Conway | 
                      Oct 04, 2023 | 
                      180 |  
                      - | 
                    
                    
                    
                      | 5 ways to secure Drupal 10 | 
                      Sushnigdha Tripathy | 
                      Aug 23, 2022 | 
                      1692 |  
                      - | 
                    
                    
                    
                      | New Java 17 features for improved security and serialization | 
                      Brian Vermeer | 
                      Oct 21, 2021 | 
                      1262 |  
                      - | 
                    
                    
                    
                      | Snyk Code adds security scanning for C# and .NET | 
                      Frank Fischer | 
                      Jul 29, 2021 | 
                      588 |  
                      - | 
                    
                    
                    
                      | AppSec during hypergrowth: Empower your developers to overcome the tech talent shortage | 
                      Jim Armstrong | 
                      Nov 16, 2021 | 
                      835 |  
                      - | 
                    
                    
                    
                      | Engineering equal opportunities at Snyk | 
                      Francesca Scantlebury | 
                      May 28, 2020 | 
                      1156 |  
                      - | 
                    
                    
                    
                      | A day in the life of a CISO: Chris Hughes of Aquia | 
                      Vandana Verma Sehgal | 
                      Nov 04, 2022 | 
                      851 |  
                      - | 
                    
                    
                    
                      | 10 Dimensions of Python Static Analysis | 
                      Liran Tal | 
                      Jul 17, 2024 | 
                      4861 |  
                      - | 
                    
                    
                    
                      | A security expert’s view on Gartner’s generative AI insights - Part 2 | 
                      Liqian Lim (林利蒨) | 
                      Aug 08, 2024 | 
                      1231 |  
                      - | 
                    
                    
                    
                      | Accelerating the Snyk infrastructure as code vision with the addition of CloudSkiff | 
                      Guy Podjarny | 
                      Oct 29, 2021 | 
                      801 |  
                      - | 
                    
                    
                    
                      | A (soft) introduction to Python dependency management | 
                      Lucian Irsigler | 
                      Sep 14, 2021 | 
                      1651 |  
                      - | 
                    
                    
                    
                      | High severity vulnerability found in libcurl and curl (CVE-2023-38545) | 
                      Hadas Bloom | 
                      Oct 04, 2023 | 
                      1104 |  
                      - | 
                    
                    
                    
                      | Improved risk assessment with EPSS scores in Snyk | 
                      Daniel Berman | 
                      May 22, 2023 | 
                      1297 |  
                      - | 
                    
                    
                    
                      | Node.js vs. Deno vs. Bun: JavaScript runtime comparison | 
                      James Konik | 
                      Sep 05, 2023 | 
                      2966 |  
                      - | 
                    
                    
                    
                      | Looking back at Black Hat USA 2022 | 
                      Vandana Verma Sehgal | 
                      Sep 21, 2022 | 
                      903 |  
                      - | 
                    
                    
                    
                      | Rego 101: Introduction to Rego | 
                      Becki Lee | 
                      Nov 02, 2023 | 
                      2503 |  
                      - | 
                    
                    
                    
                      | How LiveRamp used Snyk to remediate Log4Shell | 
                      Brian Piper | 
                      May 19, 2022 | 
                      685 |  
                      - | 
                    
                    
                    
                      | Snyker Spotlight: Jeff Yoshimura on his Asian American heritage & AAPI Month | 
                      Jeff Yoshimura | 
                      May 19, 2021 | 
                      1078 |  
                      - | 
                    
                    
                    
                      | What is package lock json and how a lockfile works for yarn and npm packages? | 
                      Liran Tal | 
                      Mar 14, 2019 | 
                      1224 |  
                      - | 
                    
                    
                    
                      | npm passes the 1 millionth package milestone! What can we learn? | 
                      Liran Tal, Simon Maple | 
                      Jun 04, 2019 | 
                      872 |  
                      5 | 
                    
                    
                    
                      | Why ASPM is the future of AppSec: Key points from our newest whitepaper | 
                      Sarah Conway | 
                      Jun 18, 2024 | 
                      1177 |  
                      - | 
                    
                    
                    
                      | Find and fix the Log4Shell exploit fast with Snyk | 
                      Ariel Ornstein | 
                      Dec 13, 2021 | 
                      1350 |  
                      - | 
                    
                    
                    
                      | Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools | 
                      Calum Hutton | 
                      Nov 27, 2023 | 
                      1511 |  
                      - | 
                    
                    
                    
                      | Snyk IaC for Terraform Enterprise: Expanding Snyk compatibility with HashiCorp Terraform | 
                      Sarah Conway | 
                      Sep 28, 2022 | 
                      562 |  
                      - | 
                    
                    
                    
                      | 7 AppSec tips from Snowflake’s Director of Product Security | 
                      Brian Piper | 
                      Aug 31, 2023 | 
                      850 |  
                      - | 
                    
                    
                    
                      | Breaking caches and bypassing Istio RBAC with HTTP response header injection | 
                      Rory McNamara | 
                      Jun 20, 2024 | 
                      2498 |  
                      - | 
                    
                    
                    
                      | How to choose a security tool for your AI-generated code | 
                      Liqian Lim (林利蒨) | 
                      Jan 09, 2024 | 
                      1774 |  
                      - | 
                    
                    
                    
                      | SnykWeek New York: In the cloud | 
                      Megan Moore | 
                      Oct 10, 2022 | 
                      731 |  
                      - | 
                    
                    
                    
                      | File encryption in Python: An in-depth exploration of symmetric and asymmetric techniques | 
                      Keshav Malik | 
                      Nov 22, 2023 | 
                      2132 |  
                      - | 
                    
                    
                    
                      | How to Dockerize a PHP application securely | 
                      James Olaogun | 
                      Aug 02, 2023 | 
                      2389 |  
                      1 | 
                    
                    
                    
                      | Building a secure GraphQL API with Node.js | 
                      Lawrence Eagles | 
                      Mar 29, 2022 | 
                      1901 |  
                      - | 
                    
                    
                    
                      | Avoiding SMTP Injection: A Whitebox primer | 
                      Sam Sanoop | 
                      Sep 15, 2022 | 
                      1579 |  
                      1 | 
                    
                    
                    
                      | Best practices for effective attack surface analysis | 
                      Benson Kuria Macharia | 
                      Jul 18, 2023 | 
                      1659 |  
                      - | 
                    
                    
                    
                      | AWS vulnerability scanning using the Snyk integration | 
                      Matt Jarvis | 
                      Feb 10, 2021 | 
                      2419 |  
                      - | 
                    
                    
                    
                      | Secure password hashing in Go | 
                      Love Bhardwaj | 
                      Dec 05, 2023 | 
                      3088 |  
                      - | 
                    
                    
                    
                      | How Spotify uses Snyk to secure the SDLC | 
                      Brian Piper | 
                      Sep 13, 2022 | 
                      919 |  
                      - | 
                    
                    
                    
                      | Announcing the open beta of Snyk's revamped security reporting | 
                      Daniel Berman | 
                      Nov 09, 2022 | 
                      1354 |  
                      - | 
                    
                    
                    
                      | Webhook Security Best Practices | 
                      Gints Dreimanis | 
                      Jul 06, 2022 | 
                      1168 |  
                      - | 
                    
                    
                    
                      | New IaC security workshop from Snyk, HashiCorp, and AWS at KubeCon Europe 2023 and on-demand | 
                      Sarah Conway | 
                      Apr 10, 2023 | 
                      1035 |  
                      - | 
                    
                    
                    
                      | SnykCon 2021 Partner Day recap: New partners, service offerings, and Snyk Apps | 
                      Sarah Conway | 
                      Oct 08, 2021 | 
                      916 |  
                      - | 
                    
                    
                    
                      | Snyk is your security companion for Amazon CodeWhisperer | 
                      Liqian Lim (林利蒨) | 
                      Nov 29, 2023 | 
                      1817 |  
                      - | 
                    
                    
                    
                      | 6 steps for scaling risk-based AppSec programs | 
                      Julia Kraut | 
                      Oct 13, 2023 | 
                      938 |  
                      - | 
                    
                    
                    
                      | Best practices for API gateway security | 
                      Kuria Macharia | 
                      Sep 07, 2022 | 
                      1510 |  
                      - | 
                    
                    
                    
                      | Power up security collaboration with Snyk and Slack | 
                      Sarah Conway | 
                      Oct 23, 2023 | 
                      271 |  
                      - | 
                    
                    
                    
                      | Take actions to improve security in your Docker images | 
                      Brian Vermeer | 
                      Apr 17, 2019 | 
                      1686 |  
                      1 | 
                    
                    
                    
                      | Exploiting HTTP/2 CONTINUATION frames for DoS attacks | 
                      Vandana Verma Sehgal | 
                      Apr 08, 2024 | 
                      696 |  
                      - | 
                    
                    
                    
                      | Repo Jacking: The Great Source-code Swindle | 
                      Elliot Ward | 
                      Jul 25, 2024 | 
                      2516 |  
                      - | 
                    
                    
                    
                      | How to maintain npm dependencies in your project | 
                      José Pérez Rivas | 
                      Jun 11, 2020 | 
                      972 |  
                      - | 
                    
                    
                    
                      | Safely handling containers | 
                      Tales Casagrande | 
                      Jun 22, 2022 | 
                      729 |  
                      - | 
                    
                    
                    
                      | Security implications of cross-origin resource sharing (CORS) in Node.js | 
                      Victor Ikechukwu | 
                      Sep 13, 2023 | 
                      2582 |  
                      - | 
                    
                    
                    
                      | The world since coronavirus: adapting quickly to a fully remote environment | 
                      Dipti Salopek | 
                      Mar 16, 2020 | 
                      686 |  
                      - | 
                    
                    
                    
                      | Shifting responsibly left with the enhanced Snyk security gating on pull requests | 
                      Daniel Berman | 
                      Mar 31, 2020 | 
                      810 |  
                      - | 
                    
                    
                    
                      | How cloud transforms IT security into AppSec | 
                      Guy Podjarny | 
                      Mar 12, 2020 | 
                      1565 |  
                      3 | 
                    
                    
                    
                      | Using Rego as a generic policy language | 
                      Dickson Boateng | 
                      Jun 03, 2022 | 
                      1323 |  
                      - | 
                    
                    
                    
                      | Fetch the Flag CTF 2022 writeup: Disposable Message | 
                      Michael Aquilina | 
                      Nov 10, 2022 | 
                      2421 |  
                      - | 
                    
                    
                    
                      | Snyk partners with the makers of Greenkeeper to help developers proactively maintain dependency health | 
                      Daniel Berman | 
                      Mar 05, 2020 | 
                      754 |  
                      - | 
                    
                    
                    
                      | JavaScript and Node.js Security – The Common Pitfalls | 
                      Guy Podjarny | 
                      Apr 11, 2018 | 
                      172 |  
                      - | 
                    
                    
                    
                      | Serverless Security implications—from infra to OWASP | 
                      Guy Podjarny | 
                      Apr 19, 2017 | 
                      2307 |  
                      114 | 
                    
                    
                    
                      | Fetch the Flag CTF 2022 writeup: Treasure Trove | 
                      Luke Watts | 
                      Nov 10, 2022 | 
                      572 |  
                      - | 
                    
                    
                    
                      | 10 npm Security Best Practices | 
                      Liran Tal | 
                      Feb 19, 2019 | 
                      3184 |  
                      3 | 
                    
                    
                    
                      | How to write your first unit test in JavaScript | 
                      Raphael Mun | 
                      Oct 28, 2022 | 
                      1600 |  
                      2 | 
                    
                    
                    
                      | Scanning Docker images for key binaries - going beyond package managers | 
                      Liron Lifshitz-Yadin | 
                      Feb 07, 2019 | 
                      312 |  
                      - | 
                    
                    
                    
                      | Snyk highlights AWS re:Invent 2023 | 
                      David Lugo | 
                      Dec 14, 2023 | 
                      820 |  
                      - | 
                    
                    
                    
                      | The Snyk Perpetual Key Rotation Machine | 
                      Megan Moore | 
                      Apr 01, 2023 | 
                      1000 |  
                      - | 
                    
                    
                    
                      | Developer-centric DAST with Bright Security | 
                      Vitaly Unic | 
                      Apr 14, 2023 | 
                      1496 |  
                      - | 
                    
                    
                    
                      | Scoring security vulnerabilities 101: Introducing CVSS for CVEs | 
                      Liran Tal | 
                      May 16, 2019 | 
                      2268 |  
                      1 | 
                    
                    
                    
                      | Embrace your next cybersecurity career with The Big Fix | 
                      Liran Tal | 
                      Feb 22, 2023 | 
                      692 |  
                      - | 
                    
                    
                    
                      | The XZ backdoor CVE-2024-3094 | 
                      Liran Tal | 
                      Mar 31, 2024 | 
                      1800 |  
                      - | 
                    
                    
                    
                      | How Snyk can help secure supply chains per "A Guide to Implementing the Software Bill of Materials (SBOM) for Software Management"’ by Japan's METI | 
                      Hiroko Nakano | 
                      Aug 01, 2023 | 
                      566 |  
                      - | 
                    
                    
                    
                      | Career growth in a scale-up world | 
                      Dipti Salopek | 
                      Aug 17, 2020 | 
                      674 |  
                      - | 
                    
                    
                    
                      | 10 Eclipse plugins you shouldn’t code without | 
                      Brian Vermeer | 
                      Aug 15, 2019 | 
                      1295 |  
                      3 | 
                    
                    
                    
                      | Snyk fix: Automatic vulnerability remediation from the Snyk CLI | 
                      Daniel Berman | 
                      Oct 07, 2021 | 
                      1302 |  
                      - | 
                    
                    
                    
                      | Patches of Pride: Love, inclusivity, & cute pets in celebration of Pride month | 
                      Ashley Ladd | 
                      Jun 20, 2023 | 
                      463 |  
                      - | 
                    
                    
                    
                      | Snyk’s new native integration with Bitbucket Cloud emphasizes dev-first security | 
                      Sarah Conway | 
                      Oct 25, 2022 | 
                      847 |  
                      - | 
                    
                    
                    
                      | Malicious remote code execution backdoor discovered in the popular bootstrap-sass Ruby gem | 
                      Liran Tal | 
                      Apr 04, 2019 | 
                      1109 |  
                      147 | 
                    
                    
                    
                      | ReDoS vulnerabilities in npm spikes by 143% and XSS continues to grow | 
                      Liran Tal | 
                      Feb 26, 2019 | 
                      1235 |  
                      1 | 
                    
                    
                    
                      | Cloud security fundamentals part 3: Empower your developers | 
                      Drew Wright | 
                      Oct 21, 2022 | 
                      1044 |  
                      - | 
                    
                    
                    
                      | Using ES2015 Proxy for fun and profit | 
                      Alon Niv | 
                      Aug 23, 2016 | 
                      1147 |  
                      2 | 
                    
                    
                    
                      | Snyk's AppSec journey in 2022 | 
                      Jason Lane | 
                      Jan 11, 2023 | 
                      1554 |  
                      - | 
                    
                    
                    
                      | Choosing the best Node.js Docker image | 
                      Liran Tal, Adrian Mouat | 
                      Sep 30, 2022 | 
                      3033 |  
                      2 | 
                    
                    
                    
                      | Introducing Snyk Training, our online learning platform | 
                      Michele Wiedemer | 
                      Aug 11, 2022 | 
                      424 |  
                      - | 
                    
                    
                    
                      | 10 AWS security considerations when migrating | 
                      Drew Wright | 
                      Nov 29, 2022 | 
                      1455 |  
                      - | 
                    
                    
                    
                      | Bolstering Snyk's developer security platform in 2022 | 
                      Daniel Berman | 
                      Jan 09, 2023 | 
                      2059 |  
                      - | 
                    
                    
                    
                      | Teaming up with Sysdig to deliver developer and runtime Kubernetes security | 
                      Jim Armstrong | 
                      Feb 16, 2022 | 
                      679 |  
                      - | 
                    
                    
                    
                      | Kicking off 2022 by recognizing DevSecOps leaders | 
                      Jeff Yoshimura | 
                      Jan 06, 2022 | 
                      1146 |  
                      - | 
                    
                    
                    
                      | Snyk integrates with AWS CloudTrail Lake to simplify security audits | 
                      David Lugo | 
                      Feb 01, 2023 | 
                      551 |  
                      - | 
                    
                    
                    
                      | Fastify plugins as building blocks for a backend Node.js API | 
                      Liran Tal | 
                      May 28, 2024 | 
                      2479 |  
                      - | 
                    
                    
                    
                      | Local Type Inference Cheat Sheet for Java 10 and beyond! | 
                      Simon Maple | 
                      Apr 26, 2018 | 
                      1868 |  
                      3 | 
                    
                    
                    
                      | Snyk scanning capabilities are now embedded in Jira Software | 
                      Sarah Conway | 
                      Jun 06, 2023 | 
                      658 |  
                      - | 
                    
                    
                    
                      | Is your website vulnerable? Let’s fix it! | 
                      Liran Tal | 
                      Mar 05, 2020 | 
                      807 |  
                      - | 
                    
                    
                    
                      | InCyber Forum Europe recap: 4 tips from DevSecOps experts | 
                      Nina McClure | 
                      Aug 14, 2024 | 
                      1217 |  
                      - | 
                    
                    
                    
                      | Launching .NET support for GitHub, Bitbucket and GitLab | 
                      Ariel Ornstein | 
                      Feb 04, 2019 | 
                      448 |  
                      - | 
                    
                    
                    
                      | 8 Azure Repos Security Best Practices | 
                      Simon Maple | 
                      May 06, 2019 | 
                      92 |  
                      - | 
                    
                    
                    
                      | Exploring the Spring Security authorization bypass (CVE-2022-31692) | 
                      Brian Vermeer | 
                      Dec 16, 2022 | 
                      1121 |  
                      - | 
                    
                    
                    
                      | XSS Attacks: The Next Wave | 
                      Guy Podjarny | 
                      Jun 08, 2017 | 
                      1700 |  
                      88 | 
                    
                    
                    
                      | Severe security vulnerability in Bower’s zip archive extraction | 
                      Liran Tal | 
                      Jan 31, 2019 | 
                      995 |  
                      2 | 
                    
                    
                    
                      | Key points from Google and Accenture's ransomware white paper | 
                      Vandana Verma Sehgal | 
                      Nov 07, 2022 | 
                      1459 |  
                      - | 
                    
                    
                    
                      | Snyk Week of Impact 2023: A week of meaningful contributions and community engagement | 
                      Bianca Matei | 
                      Nov 08, 2023 | 
                      567 |  
                      - | 
                    
                    
                    
                      | A post-mortem of the malicious event-stream backdoor | 
                      Danny Grander, Liran Tal | 
                      Dec 06, 2018 | 
                      1470 |  
                      - | 
                    
                    
                    
                      | SnykLaunch recap: Custom Base Image Recommendations | 
                      Jamie Smith | 
                      Apr 04, 2023 | 
                      1133 |  
                      - | 
                    
                    
                    
                      | Demystifying the AWS shared security responsibility model | 
                      David Lugo | 
                      Nov 13, 2023 | 
                      1004 |  
                      - | 
                    
                    
                    
                      | Tips for hardening your container image security strategy | 
                      Matt Jarvis | 
                      Jul 14, 2021 | 
                      1166 |  
                      - | 
                    
                    
                    
                      | Snyk Container in 2021: Shifting container security all the way left | 
                      Jim Armstrong | 
                      Dec 22, 2021 | 
                      1386 |  
                      - | 
                    
                    
                    
                      | Shifting compliance left: Helping legal teams and developers cooperate around licensing issues | 
                      Rachel Cheyfitz | 
                      Oct 03, 2019 | 
                      622 |  
                      - | 
                    
                    
                    
                      | Automating Kubernetes workload security reporting | 
                      Rags Srinivas | 
                      Mar 02, 2020 | 
                      590 |  
                      - | 
                    
                    
                    
                      | Mitigating path traversal vulns in Java with Snyk Code | 
                      Brian Vermeer | 
                      Mar 06, 2023 | 
                      1044 |  
                      2 | 
                    
                    
                    
                      | Developer driven workflows: Dockerfile image scanning, prioritization, and remediation | 
                      Eric Smalling | 
                      Mar 26, 2021 | 
                      5791 |  
                      - | 
                    
                    
                    
                      | How to integrate ASPM with your application security program | 
                      Vandana Verma Sehgal | 
                      Nov 28, 2023 | 
                      1258 |  
                      - | 
                    
                    
                    
                      | Log4Shell remediation cheat sheet | 
                      Simon Maple | 
                      Dec 14, 2021 | 
                      1602 |  
                      19 | 
                    
                    
                    
                      | Top considerations for addressing risks in the OWASP Top 10 for LLMs | 
                      Simon Maple | 
                      Sep 07, 2023 | 
                      3135 |  
                      - | 
                    
                    
                    
                      | Building an application security battle plan: Home Alone edition | 
                      Brian Clark | 
                      Dec 20, 2022 | 
                      898 |  
                      - | 
                    
                    
                    
                      | Java configuration: how to prevent security misconfigurations | 
                      Brian Vermeer | 
                      Feb 26, 2021 | 
                      1069 |  
                      - | 
                    
                    
                    
                      | Snyk Code adds Go security scanning | 
                      Frank Fischer | 
                      Oct 14, 2021 | 
                      782 |  
                      - | 
                    
                    
                    
                      | Top ten Docker images contain over 8000 vulnerable paths | 
                      Hayley Denbraver | 
                      Mar 07, 2019 | 
                      955 |  
                      11 | 
                    
                    
                    
                      | Snyk chats with Shutterstock about building a DevSecOps culture | 
                      Brian Piper | 
                      Apr 02, 2021 | 
                      844 |  
                      - | 
                    
                    
                    
                      | Swift deserialization security primer | 
                      Sam Sanoop | 
                      Jul 18, 2023 | 
                      1155 |  
                      - | 
                    
                    
                    
                      | Implementing TLS in Kubernetes | 
                      Rubaiat Hossain | 
                      Jul 31, 2023 | 
                      2063 |  
                      - | 
                    
                    
                    
                      | Bitbucket Server Integration in Beta | 
                      Guy Podjarny | 
                      Jun 07, 2017 | 
                      237 |  
                      - | 
                    
                    
                    
                      | Container security throughout the SDLC | 
                      Gareth Rushgrove | 
                      Oct 16, 2019 | 
                      884 |  
                      - | 
                    
                    
                    
                      | Deploying a Gatsby site to GitHub Pages from Travis CI | 
                      Liran Tal | 
                      Dec 03, 2019 | 
                      646 |  
                      - | 
                    
                    
                    
                      | 190,000 users affected by Docker Hub’s security breach. Now what? | 
                      Liran Tal | 
                      Apr 29, 2019 | 
                      717 |  
                      1 | 
                    
                    
                    
                      | Ruby email rule removed from Snyk Code | 
                      Frank Fischer | 
                      Oct 13, 2022 | 
                      594 |  
                      - | 
                    
                    
                    
                      | Cloud security updates you need to know from re:Invent 2022 | 
                      Ashish Rajan | 
                      Dec 21, 2022 | 
                      2303 |  
                      - | 
                    
                    
                    
                      | How to secure a REST API? | 
                      Liran Tal | 
                      Jun 27, 2024 | 
                      2768 |  
                      - | 
                    
                    
                    
                      | Proactively fixing vulnerabilities to maintain   Java security and project hygiene with Snyk | 
                      Lee Turner | 
                      Nov 16, 2021 | 
                      876 |  
                      - | 
                    
                    
                    
                      | Implementing TLS/SSL in Python | 
                      Kingsley Ubah | 
                      Oct 16, 2022 | 
                      1489 |  
                      - | 
                    
                    
                    
                      | Find and fix vulnerabilities in your CI/CD pipeline with Snyk and Harness | 
                      Pas Apicella | 
                      Dec 10, 2021 | 
                      1406 |  
                      - | 
                    
                    
                    
                      | 2022 Container Security Trends Report: Exploring ownership, education, expertise, and more | 
                      Megan Moore | 
                      Apr 27, 2022 | 
                      737 |  
                      - | 
                    
                    
                    
                      | Getting started with query parameterization | 
                      Mary Gathoni | 
                      Oct 24, 2023 | 
                      2337 |  
                      - | 
                    
                    
                    
                      | Fetch the Flag CTF 2022 writeup: Not So Smart Fridge | 
                      Antonio Gomes | 
                      Nov 10, 2022 | 
                      1026 |  
                      - | 
                    
                    
                    
                      | How Atlassian used Snyk to solve Log4Shell | 
                      Sarah Conway | 
                      Nov 16, 2022 | 
                      813 |  
                      - | 
                    
                    
                    
                      | 10 best practices to containerize Node.js web applications with Docker | 
                      Liran Tal, Yoni Goldberg | 
                      Sep 15, 2022 | 
                      6338 |  
                      - | 
                    
                    
                    
                      | Finding and fixing insecure direct object references in Python | 
                      Keshav Malik | 
                      Jul 19, 2023 | 
                      1509 |  
                      - | 
                    
                    
                    
                      | Preventing SQL injection in C# with Entity Framework | 
                      Brian Vermeer | 
                      Jul 30, 2024 | 
                      1273 |  
                      - | 
                    
                    
                    
                      | Snyk and StackHawk form strategic alliance to equip app teams with modern, developer-first security testing | 
                      David Lugo | 
                      May 02, 2022 | 
                      716 |  
                      - | 
                    
                    
                    
                      | Scaling Snyk fast with copy-paste orgs | 
                      Anna Debenham | 
                      Oct 11, 2018 | 
                      375 |  
                      - | 
                    
                    
                    
                      | Brian Vermeer named one of Business Insider’s "21 Top Developers Shaping Tech and Forging New Paths" | 
                      Liran Tal | 
                      Aug 03, 2021 | 
                      353 |  
                      - | 
                    
                    
                    
                      | Securing the web (forward) | 
                      Daniel Appelquist | 
                      Mar 27, 2023 | 
                      1233 |  
                      - | 
                    
                    
                    
                      | Putting container security in the hands of developers | 
                      Leigh Moore | 
                      Nov 12, 2019 | 
                      331 |  
                      2 | 
                    
                    
                    
                      | Open source security with O’Reilly author Guy Podjarny | 
                      Hayley Denbraver | 
                      Aug 30, 2019 | 
                      1493 |  
                      - | 
                    
                    
                    
                      | Lessons learned from the Argo CD zero-day vulnerability (CVE-2022-24348) | 
                      Eric Smalling | 
                      Feb 10, 2022 | 
                      1375 |  
                      - | 
                    
                    
                    
                      | JVM Ecosystem Report 2018 | 
                      Simon Maple | 
                      Oct 17, 2018 | 
                      1200 |  
                      - | 
                    
                    
                    
                      | Securing cloud infrastructure for PCI review | 
                      DeveloperSteve Coochin | 
                      Mar 03, 2022 | 
                      2080 |  
                      - | 
                    
                    
                    
                      | Using Snyk to implement end-to-end DevSecOps on Microsoft Azure | 
                      Daniel Berman | 
                      May 26, 2020 | 
                      752 |  
                      - | 
                    
                    
                    
                      | Announcing automated fixes for vulnerabilities in .NET dependencies | 
                      Daniel Berman | 
                      Nov 17, 2021 | 
                      1349 |  
                      - | 
                    
                    
                    
                      | Snyk AppRisk Pro: A holistic approach to application risk management | 
                      Daniel Berman | 
                      May 01, 2024 | 
                      1597 |  
                      - | 
                    
                    
                    
                      | Securing container applications using the Snyk CLI | 
                      Hadar Mutai | 
                      Aug 30, 2022 | 
                      489 |  
                      - | 
                    
                    
                    
                      | Exploring the advanced technologies behind Snyk Code | 
                      Frank Fischer | 
                      Oct 20, 2021 | 
                      1155 |  
                      - | 
                    
                    
                    
                      | Mitigating ImageMagick vulnerabilities in Node.js | 
                      Guy Podjarny | 
                      May 06, 2016 | 
                      623 |  
                      7 | 
                    
                    
                    
                      | Secure AI tool adoption: Perceptions and realities | 
                      Alex Salkever | 
                      Jun 04, 2024 | 
                      733 |  
                      - | 
                    
                    
                    
                      | Python Mocking 101: Fake it before you make it | 
                      Mike Lin | 
                      Feb 10, 2018 | 
                      2272 |  
                      - | 
                    
                    
                    
                      | Announcing Snyk for Ruby | 
                      Guy Podjarny | 
                      Nov 10, 2016 | 
                      482 |  
                      - | 
                    
                    
                    
                      | Why your team should attend SnykCon 2020 | 
                      Simon Maple | 
                      Oct 07, 2020 | 
                      535 |  
                      - | 
                    
                    
                    
                      | Mental Health Awareness Month: How losing my father changed me | 
                      Tim Leroy | 
                      May 31, 2022 | 
                      957 |  
                      - | 
                    
                    
                    
                      | Building Vue 3 components with Tailwind CSS | 
                      Mary Gathoni | 
                      Feb 21, 2023 | 
                      2017 |  
                      - | 
                    
                    
                    
                      | Announcing Snyk-Powered Linting in Sonar | 
                      Tim Kadlec | 
                      Oct 25, 2017 | 
                      517 |  
                      - | 
                    
                    
                    
                      | Automatic source locations with Rego | 
                      Jasper Van der Jeugt | 
                      Feb 12, 2024 | 
                      2614 |  
                      - | 
                    
                    
                    
                      | New year ushers in new wave of Snyk Technology Alliance Partner Program members | 
                      Sarah Conway | 
                      Jan 12, 2023 | 
                      444 |  
                      - | 
                    
                    
                    
                      | Fixing XXE Vulnerabilities in Nokogiri | 
                      Tim Kadlec | 
                      Feb 14, 2017 | 
                      740 |  
                      - | 
                    
                    
                    
                      | Allyship and advocacy: Celebrating Disability Pride Month at Snyk | 
                      Alex Fallon | 
                      Jul 27, 2022 | 
                      1764 |  
                      - | 
                    
                    
                    
                      | Discover package vulnerabilities with the Snyk integration for JSDelivr | 
                      Brian Vermeer | 
                      Jun 08, 2020 | 
                      301 |  
                      - | 
                    
                    
                    
                      | 4 AI coding risks and how to address them | 
                      Liqian Lim (林利蒨) | 
                      Jun 13, 2024 | 
                      1200 |  
                      - | 
                    
                    
                    
                      | Understanding Amazon S3 security and compliance on AWS | 
                      Drew Wright | 
                      May 10, 2019 | 
                      1606 |  
                      - | 
                    
                    
                    
                      | Looking at the Snyk integration with Red Hat CodeReady Dependency Analytics | 
                      Sarah Conway | 
                      Sep 03, 2020 | 
                      374 |  
                      - | 
                    
                    
                    
                      | Announcing the Snyk Business trial: Security across the SDLC | 
                      Mariah Gresham | 
                      Feb 15, 2022 | 
                      612 |  
                      - | 
                    
                    
                    
                      | Why “vulnerability management” falls short in modern application security | 
                      Daniel Berman | 
                      Jun 13, 2024 | 
                      988 |  
                      - | 
                    
                    
                    
                      | Leaky Vessels deep dive: Escaping from Docker one syscall at a time | 
                      Rory McNamara | 
                      Feb 06, 2024 | 
                      10279 |  
                      4 | 
                    
                    
                    
                      | Critical WebP 0-day security CVE-2023-4863 impacts wider software ecosystem | 
                      Brian Clark, Eric Smalling, Jonathan Moses | 
                      Sep 28, 2023 | 
                      1825 |  
                      - | 
                    
                    
                    
                      | Revisiting unit testing and mocking in Python | 
                      Mike Lin | 
                      Jul 07, 2018 | 
                      1847 |  
                      - | 
                    
                    
                    
                      | OSPO security evolution: The Kübler-Ross Model of open source | 
                      Dan Appelquist | 
                      Jan 12, 2023 | 
                      783 |  
                      - | 
                    
                    
                    
                      | Snyk integrates with Amazon EventBridge to enable secure AppDev at scale | 
                      David Lugo | 
                      Jun 12, 2023 | 
                      735 |  
                      - | 
                    
                    
                    
                      | Don’t build security tools, build developer tools instead | 
                      Guy Podjarny | 
                      Jan 09, 2018 | 
                      724 |  
                      - | 
                    
                    
                    
                      | Proxy authentication in Snyk CLI for Windows | 
                      Steve Winton | 
                      Oct 06, 2022 | 
                      297 |  
                      - | 
                    
                    
                    
                      | Snyk Fetch the Flag CTF 2023 writeup: Silent Cartographer | 
                      John Hammond | 
                      Nov 30, 2023 | 
                      362 |  
                      - | 
                    
                    
                    
                      | 10 Kubernetes Security Context settings you should understand | 
                      Eric Smalling | 
                      Mar 10, 2021 | 
                      2720 |  
                      2 | 
                    
                    
                    
                      | See Snyk and GitHub in action at GitHub Universe | 
                      Sarah Conway | 
                      Nov 13, 2019 | 
                      257 |  
                      - | 
                    
                    
                    
                      | Application vulnerability management best practices | 
                      Mariah Gresham | 
                      Aug 06, 2024 | 
                      1240 |  
                      - | 
                    
                    
                    
                      | Snyk recognized as an Emerging Segment Leader in Application Security in Snowflake's Next Generation of Cybersecurity Applications report | 
                      LaToya Muff | 
                      Dec 11, 2023 | 
                      658 |  
                      - | 
                    
                    
                    
                      | Gitpod remote code execution 0-day vulnerability via WebSockets | 
                      Elliot Ward | 
                      Feb 27, 2023 | 
                      2121 |  
                      1 | 
                    
                    
                    
                      | A day in the life of an ethical hacker | 
                      Sonya Moisset | 
                      Jun 05, 2023 | 
                      2679 |  
                      - | 
                    
                    
                    
                      | How to prevent open redirect vulnerabilities in Laravel | 
                      Kevin Kimani | 
                      Dec 27, 2023 | 
                      1696 |  
                      - | 
                    
                    
                    
                      | Bringing cloud native application security full circle | 
                      Erin Cullen | 
                      Jun 08, 2022 | 
                      845 |  
                      - | 
                    
                    
                    
                      | Snyk Voted Next European Unicorn for B2B Enterprise | 
                      Guy Podjarny | 
                      May 22, 2019 | 
                      422 |  
                      - | 
                    
                    
                    
                      | Find and fix HTTP/2 rapid reset zero-day vulnerability CVE-2023-44487 | 
                      Jamie Smith, Kriti Dogra, Anthony Larkin | 
                      Oct 11, 2023 | 
                      1225 |  
                      - | 
                    
                    
                    
                      | Six takeaways from our ASPM masterclass series | 
                      Erin Cullen | 
                      Apr 10, 2024 | 
                      1110 |  
                      - | 
                    
                    
                    
                      | Snyk increases investment in partners with new Snyk Technology Alliance Partner Program | 
                      Cara Sampson | 
                      Apr 27, 2022 | 
                      1502 |  
                      - | 
                    
                    
                    
                      | The 5 dimensions of an npm dependency | 
                      Guy Podjarny | 
                      Jun 16, 2016 | 
                      1640 |  
                      8 | 
                    
                    
                    
                      | Add a SECURITY.md file to your Azure Repos | 
                      Simon Maple | 
                      May 06, 2019 | 
                      718 |  
                      - | 
                    
                    
                    
                      | Snyk has acquired DevSecCon! | 
                      Guy Podjarny | 
                      Jul 24, 2019 | 
                      699 |  
                      - | 
                    
                    
                    
                      | 3 tips for effective developer security training | 
                      Mariah Gresham | 
                      Dec 01, 2022 | 
                      1127 |  
                      - | 
                    
                    
                    
                      | Snyk transformed cloud security in 2022 with developer-first solution | 
                      Lauren Place | 
                      Jan 11, 2023 | 
                      1211 |  
                      - | 
                    
                    
                    
                      | Snyk Fetch the Flag CTF 2023 writeup: Off the SETUID | 
                      Carlos Polop | 
                      Nov 30, 2023 | 
                      1710 |  
                      - | 
                    
                    
                    
                      | Three expert tips for cultivating secure software development practices | 
                      Simon Maple | 
                      Mar 01, 2023 | 
                      896 |  
                      - | 
                    
                    
                    
                      | Spring4Shell: The zero-day RCE in the Spring Framework explained | 
                      Brian Vermeer | 
                      Apr 01, 2022 | 
                      927 |  
                      - | 
                    
                    
                    
                      | 5 Common open source security myths everyone needs to know | 
                      Karl Hopkinson-Turrell | 
                      Apr 24, 2020 | 
                      1031 |  
                      - | 
                    
                    
                    
                      | Introducing Snyk developer-first security into the Terraform Cloud workflow | 
                      Sarah Conway | 
                      Oct 06, 2021 | 
                      759 |  
                      - | 
                    
                    
                    
                      | Goodbye, 2020! Look out, 2021 | 
                      Peter McKay | 
                      Jan 26, 2021 | 
                      393 |  
                      - | 
                    
                    
                    
                      | Node.js multithreading with worker threads: pros and cons | 
                      James Walker | 
                      Feb 27, 2023 | 
                      2120 |  
                      2 | 
                    
                    
                    
                      | How to effectively detect and mitigate Trojan Source attacks in JavaScript codebases with ESLint | 
                      Liran Tal | 
                      Nov 10, 2021 | 
                      1219 |  
                      - | 
                    
                    
                    
                      | How Datto made developer-first security a reality with Snyk | 
                      Brian Piper | 
                      Nov 09, 2021 | 
                      1125 |  
                      - | 
                    
                    
                    
                      | Announcing Snyk’s new Global Service Provider program | 
                      Cyndi Doyle | 
                      Feb 23, 2022 | 
                      696 |  
                      - | 
                    
                    
                    
                      | Website security score explained | 
                      Liran Tal | 
                      May 13, 2020 | 
                      677 |  
                      - | 
                    
                    
                    
                      | Serverless is great, but what about the security of my AWS Lambda functions and their dependencies? | 
                      Liran Tal | 
                      Jul 03, 2019 | 
                      961 |  
                      1 | 
                    
                    
                    
                      | Securing your open source dependencies with the Snyk Visual Studio Code extension | 
                      Daniel Berman | 
                      Nov 23, 2021 | 
                      1040 |  
                      - | 
                    
                    
                    
                      | Attacking an FTP Client: MGETting more than you bargained for | 
                      Danny Grander | 
                      Apr 04, 2018 | 
                      1603 |  
                      1 | 
                    
                    
                    
                      | Code injection in Python: examples and prevention | 
                      Lucien Chemaly | 
                      Dec 06, 2023 | 
                      1807 |  
                      - | 
                    
                    
                    
                      | Introducing service accounts: API tokens for your org | 
                      Anna Debenham | 
                      Jun 12, 2018 | 
                      172 |  
                      - | 
                    
                    
                    
                      | Mitigating clickJacking — the DevSecOps way! | 
                      Omer Levi Hevroni | 
                      May 25, 2020 | 
                      798 |  
                      - | 
                    
                    
                    
                      | SnykCon 2021 is almost here! | 
                      Randall Degges | 
                      Aug 24, 2021 | 
                      1382 |  
                      - | 
                    
                    
                    
                      | Django security tips | 
                      Hayley Denbraver | 
                      Mar 25, 2020 | 
                      1481 |  
                      - | 
                    
                    
                    
                      | Improving GraphQL security with static analysis and Snyk Code | 
                      Sam Sanoop | 
                      Apr 12, 2022 | 
                      1528 |  
                      - | 
                    
                    
                    
                      | How can a Content Security Policy prevent XSS and other vulnerabilities? | 
                      Luke Watts | 
                      Feb 09, 2020 | 
                      900 |  
                      - | 
                    
                    
                    
                      | Snyk research team discovers severe prototype pollution security vulnerabilities affecting all versions of lodash | 
                      Liran Tal | 
                      Jul 05, 2019 | 
                      925 |  
                      10 | 
                    
                    
                    
                      | SnykHer celebrates International Women’s Day 2022 | 
                      Jess Katz | 
                      Mar 07, 2022 | 
                      697 |  
                      - | 
                    
                    
                    
                      | Visibly invisible malicious Node.js packages: When configuration niche meets invisible characters | 
                      Aviad Hahami | 
                      Feb 28, 2022 | 
                      1240 |  
                      - | 
                    
                    
                    
                      | Mental Health Awareness—three important manager lessons that I couldn’t have done without | 
                      Ella Gee | 
                      May 21, 2020 | 
                      1066 |  
                      - | 
                    
                    
                    
                      | Git checkout remote branch: how it works and when to use it | 
                      Brian Vermeer | 
                      Dec 15, 2020 | 
                      835 |  
                      - | 
                    
                    
                    
                      | PulseMeter Report: Software supply chains | 
                      Erin Cullen | 
                      Mar 21, 2023 | 
                      708 |  
                      - | 
                    
                    
                    
                      | 4 best practices for cultivating developer security adoption | 
                      Erin Cullen | 
                      Apr 20, 2023 | 
                      897 |  
                      - | 
                    
                    
                    
                      | Kubernetes open sourced their security audit. What can we learn? | 
                      Hayley Denbraver | 
                      Aug 08, 2019 | 
                      894 |  
                      2 | 
                    
                    
                    
                      | Applying the principle of least privilege to Kubernetes using RBAC | 
                      Jekayin-Oluwa Olabemiwo | 
                      Aug 29, 2022 | 
                      1734 |  
                      - | 
                    
                    
                    
                      | How and when to use Docker labels / OCI container annotations | 
                      Eric Smalling | 
                      Nov 03, 2021 | 
                      1617 |  
                      - | 
                    
                    
                    
                      | 2020 Q3 in review—Snyk & DeepCode, Angular security best practices, and more | 
                      Simon Maple | 
                      Dec 30, 2020 | 
                      1009 |  
                      - | 
                    
                    
                    
                      | Cloud Security Podcast awarded SANS Podcast of the Year | 
                      Jeff Yoshimura | 
                      Dec 19, 2022 | 
                      830 |  
                      - | 
                    
                    
                    
                      | Introducing open source security runtime monitoring | 
                      Aner Mazur | 
                      Nov 12, 2018 | 
                      783 |  
                      - | 
                    
                    
                    
                      | Creating an automated cloud infrastructure testing tool with Terraform and PyTest | 
                      Drew Wright | 
                      Mar 27, 2020 | 
                      3559 |  
                      - | 
                    
                    
                    
                      | A stepping stone towards holistic application risk and compliance management of the Digital Operational Resiliency Act (DORA) | 
                      Ben Desjardins | 
                      Jul 11, 2024 | 
                      1834 |  
                      - | 
                    
                    
                    
                      | Top 5 VS Code extensions for security | 
                      Brian Clark | 
                      Aug 24, 2023 | 
                      1654 |  
                      - | 
                    
                    
                    
                      | Celebrating Juneteenth at Snyk | 
                      Sherica Bryan | 
                      Jun 16, 2023 | 
                      858 |  
                      - | 
                    
                    
                    
                      | Vulnerabilities in NodeJS C/C++ add-on extensions | 
                      Alessio Della Libera | 
                      Aug 14, 2024 | 
                      2808 |  
                      - | 
                    
                    
                    
                      | To our Community from the Snyk Team | 
                      Peter McKay | 
                      Mar 13, 2020 | 
                      266 |  
                      - | 
                    
                    
                    
                      | Snyk and Atlassian, Sitting in a Tree | 
                      Aner Mazur | 
                      Aug 24, 2017 | 
                      618 |  
                      - | 
                    
                    
                    
                      | Code injection vulnerabilities (CVSSv3 5.8) found in Snyk CLI and IDE plugins | 
                      Carm Janneteau | 
                      Nov 30, 2022 | 
                      585 |  
                      - | 
                    
                    
                    
                      | Advancing SBOM standards: Snyk and SPDX | 
                      Gareth Rushgrove | 
                      Jun 16, 2021 | 
                      829 |  
                      - | 
                    
                    
                    
                      | 5 "no experience needed" tips for building secure applications | 
                      Liran Tal | 
                      Dec 27, 2022 | 
                      997 |  
                      - | 
                    
                    
                    
                      | How to install Ruby in a macOS for local development | 
                      Liran Tal | 
                      Sep 27, 2022 | 
                      1579 |  
                      - | 
                    
                    
                    
                      | Our privilege is our responsibility | 
                      Dipti Salopek | 
                      Jun 05, 2020 | 
                      470 |  
                      - | 
                    
                    
                    
                      | Fix cloud security issues faster and at the source with Snyk IaC | 
                      Anthony Larkin | 
                      Apr 04, 2023 | 
                      632 |  
                      - | 
                    
                    
                    
                      | Improving the UI/UX of the Snyk VS Code extension | 
                      Andy Gongea | 
                      Nov 21, 2023 | 
                      702 |  
                      - | 
                    
                    
                    
                      | Best practices for Kubernetes Secrets management | 
                      Eric Kahuha | 
                      Nov 16, 2022 | 
                      1777 |  
                      - | 
                    
                    
                    
                      | Snyk Learn now aligns with the NIST NICE Workforce Framework | 
                      Michael Biocchi | 
                      Jun 07, 2023 | 
                      471 |  
                      - | 
                    
                    
                    
                      | RSA 2020: who we met and what we learned | 
                      Peter McKay | 
                      Mar 02, 2020 | 
                      385 |  
                      - | 
                    
                    
                    
                      | Common SAML vulnerabilities and how to remediate them | 
                      Sam Sanoop | 
                      Dec 19, 2023 | 
                      966 |  
                      - | 
                    
                    
                    
                      | The Secure Developer: Security champions recap | 
                      Sam Hepburn | 
                      Jun 14, 2023 | 
                      1365 |  
                      - | 
                    
                    
                    
                      | Introducing the Snyk Ambassador program: A call for nomination to champion application security | 
                      Liran Tal | 
                      Aug 16, 2021 | 
                      540 |  
                      - | 
                    
                    
                    
                      | February in review: JVM Ecosystem Report, Python and Container Updates, and more | 
                      Hayley Denbraver | 
                      Feb 28, 2020 | 
                      558 |  
                      - | 
                    
                    
                    
                      | How community participation can enhance your development career | 
                      Randall Degges | 
                      Nov 15, 2022 | 
                      1117 |  
                      - | 
                    
                    
                    
                      | Introducing the new Snyk UI | 
                      Steve Winton | 
                      Sep 29, 2022 | 
                      383 |  
                      - | 
                    
                    
                    
                      | What can you do with an enriched SBOM? A parlay quickstart guide | 
                      Gareth Rushgrove | 
                      Jun 07, 2023 | 
                      1077 |  
                      - | 
                    
                    
                    
                      | Why speed matters in Static Application Security Testing (SAST) | 
                      Frank Fischer | 
                      Aug 20, 2021 | 
                      698 |  
                      - | 
                    
                    
                    
                      | Snyk kicks off Community Outreach Internship Program | 
                      Dipti Salopek | 
                      Feb 11, 2021 | 
                      537 |  
                      - | 
                    
                    
                    
                      | Snyk named a Leader in 2023 Gartner® Magic Quadrant™ for Application Security Testing | 
                      Manoj Nair | 
                      May 23, 2023 | 
                      949 |  
                      - | 
                    
                    
                    
                      | Java dependency management: how many lines of code does my application hold? | 
                      Brian Vermeer | 
                      Aug 12, 2020 | 
                      795 |  
                      - | 
                    
                    
                    
                      | An unintimidating introduction to the dark arts of C/C++ vulnerabilities | 
                      Aviad Hahami | 
                      Apr 15, 2022 | 
                      1513 |  
                      - | 
                    
                    
                    
                      | Preventing server-side request forgery in Node.js applications | 
                      David Ekete | 
                      Feb 20, 2024 | 
                      1759 |  
                      - | 
                    
                    
                    
                      | Secure your Kubernetes applications with Snyk Container | 
                      Gareth Rushgrove | 
                      Nov 12, 2019 | 
                      434 |  
                      - | 
                    
                    
                    
                      | Responsible disclosure: CodeCov CEO & CTO share learnings from the breach | 
                      Mariah Gresham | 
                      Dec 09, 2021 | 
                      1186 |  
                      - | 
                    
                    
                    
                      | Symmetric vs. asymmetric encryption: Practical Python examples | 
                      Josh Amata | 
                      May 15, 2024 | 
                      4010 |  
                      - | 
                    
                    
                    
                      | GDPR Compliance and Open Source | 
                      Ellen Van Keulen | 
                      Sep 26, 2017 | 
                      665 |  
                      - | 
                    
                    
                    
                      | Improving code quality with linting in Python | 
                      Keshav Malik | 
                      Oct 12, 2022 | 
                      1767 |  
                      2 | 
                    
                    
                    
                      | Keeping Docker secrets secure (even if you’re not using Kubernetes) | 
                      Marcelo Oliveira | 
                      Aug 24, 2022 | 
                      1484 |  
                      - | 
                    
                    
                    
                      | Making climate positive changes | 
                      Luke Watts | 
                      Sep 05, 2019 | 
                      609 |  
                      - | 
                    
                    
                    
                      | dompdf security alert: RCE vulnerability found in popular PHP PDF library | 
                      DeveloperSteve Coochin | 
                      Mar 18, 2022 | 
                      1185 |  
                      - | 
                    
                    
                    
                      | 84% of all websites are impacted by jQuery XSS vulnerabilities | 
                      Liran Tal | 
                      Oct 30, 2019 | 
                      781 |  
                      - | 
                    
                    
                    
                      | 5 best practices for React with TypeScript security | 
                      Marcelo Oliveira | 
                      Dec 08, 2022 | 
                      1755 |  
                      - | 
                    
                    
                    
                      | 48% see security a major constraint on the ability to deliver software quickly | 
                      Liran Tal | 
                      Jan 28, 2020 | 
                      975 |  
                      - | 
                    
                    
                    
                      | Snyk named a 2023 Gartner Peer Insights™ Customers’ Choice for Application Security Testing | 
                      Ciana Abdollahian | 
                      Dec 04, 2023 | 
                      622 |  
                      - | 
                    
                    
                    
                      | How to use GitHub Actions environment variables | 
                      Lewis Gavin | 
                      Nov 22, 2022 | 
                      1877 |  
                      - | 
                    
                    
                    
                      | Preventing broken access control in express Node.js applications | 
                      Ben Smitthimedhin | 
                      May 22, 2024 | 
                      2923 |  
                      - | 
                    
                    
                    
                      | Open Source Vulnerabilities and Security with Microsoft’s Jeff McAffer | 
                      Hayley Denbraver | 
                      Nov 20, 2019 | 
                      841 |  
                      - | 
                    
                    
                    
                      | The SecurityManager is getting removed in Java: What that means for you | 
                      Mdu Sibisi | 
                      Jun 15, 2023 | 
                      2238 |  
                      - | 
                    
                    
                    
                      | Welcoming Karyn Smith: Snyk’s new Chief Legal Officer | 
                      Peter McKay | 
                      Feb 07, 2022 | 
                      539 |  
                      - | 
                    
                    
                    
                      | A Snyk peek into Node.js and npm’s state of open source security report 2019 | 
                      Liran Tal | 
                      Oct 09, 2019 | 
                      700 |  
                      1 | 
                    
                    
                    
                      | Happiness in the year of COVID-19 | 
                      Dipti Salopek | 
                      Oct 15, 2020 | 
                      473 |  
                      - | 
                    
                    
                    
                      | Do you know how healthy your .NET dependencies are? | 
                      Hayley Denbraver | 
                      May 03, 2019 | 
                      1550 |  
                      - | 
                    
                    
                    
                      | Building an npm package compatible with ESM and CJS in 2024 | 
                      Liran Tal | 
                      Apr 18, 2024 | 
                      1082 |  
                      - | 
                    
                    
                    
                      | Investing in our planet: One tree planted for each new Snyker | 
                      Tori Hay Lindahl | 
                      Apr 22, 2022 | 
                      444 |  
                      - | 
                    
                    
                    
                      | Extend the power of your AppSec data with the new Snyk and Snowflake integration | 
                      Guy Plotnik | 
                      Aug 06, 2024 | 
                      1095 |  
                      - | 
                    
                    
                    
                      | Meet (and join) our newest Snyk Ambassadors – Fall 2022 edition! | 
                      Gerald Crescione | 
                      Sep 19, 2022 | 
                      861 |  
                      - | 
                    
                    
                    
                      | How AppSec has evolved in 2021: Reddit’s perspective | 
                      Brian Piper | 
                      May 03, 2021 | 
                      1077 |  
                      - | 
                    
                    
                    
                      | Navigating your own career growth in a hyper-growth startup | 
                      Dipti Salopek | 
                      Jan 07, 2020 | 
                      849 |  
                      - | 
                    
                    
                    
                      | Vulnerability disclosure: Which comes first, the security bug in PHP or the CVE? | 
                      Liran Tal | 
                      Dec 19, 2023 | 
                      841 |  
                      - | 
                    
                    
                    
                      | Snyk sponsors Snowflake Summit | 
                      LaToya Muff | 
                      Jun 04, 2024 | 
                      569 |  
                      - | 
                    
                    
                    
                      | An investigation into code injection vulnerabilities caused by generative AI | 
                      Jack Hair | 
                      Apr 16, 2024 | 
                      983 |  
                      - | 
                    
                    
                    
                      | Lessons from OpenSSL vulnerabilities part 1: Preparing your supply chain for the next critical vulnerability | 
                      Jamie Smith | 
                      Apr 19, 2023 | 
                      1133 |  
                      - | 
                    
                    
                    
                      | Snyk Raises $70M to Accelerate Dev-first Security | 
                      Peter McKay | 
                      Sep 09, 2019 | 
                      409 |  
                      - | 
                    
                    
                    
                      | Announcing Social Trends: Use social media for security intelligence | 
                      Daniel Berman | 
                      Jul 28, 2021 | 
                      1232 |  
                      - | 
                    
                    
                    
                      | Log4j vulnerability explained: Prevent Log4Shell RCE by updating to version 2.17.1 | 
                      Brian Vermeer | 
                      Dec 10, 2021 | 
                      1135 |  
                      - | 
                    
                    
                    
                      | March in review: State of Open Source Security survey, All.The.Talks virtual conference, and more | 
                      Eirini-Eleni Papadopoulou | 
                      Mar 31, 2020 | 
                      621 |  
                      - | 
                    
                    
                    
                      | How Atlassian CISO Adrian Ludwig built a world-class product security team | 
                      Ravi Maira | 
                      Oct 28, 2020 | 
                      728 |  
                      - | 
                    
                    
                    
                      | Managing license compliance across your organization with Snyk’s license policies | 
                      Josefa Riveros | 
                      Apr 30, 2020 | 
                      741 |  
                      - | 
                    
                    
                    
                      | JavaScript type confusion: Bypassed input validation (and how to remediate) | 
                      Alessio Della Libera | 
                      Nov 03, 2021 | 
                      2957 |  
                      9 | 
                    
                    
                    
                      | Manage security issues in Jira with Snyk Security in Jira Cloud | 
                      LaToya Muff | 
                      Aug 09, 2023 | 
                      330 |  
                      - | 
                    
                    
                    
                      | Lessons from OpenSSL vulnerabilities part 2: Finding and fixing supply chain vulnerabilities | 
                      Jamie Smith | 
                      Apr 26, 2023 | 
                      1977 |  
                      - | 
                    
                    
                    
                      | Using the Snyk API to find and fix vulnerabilities | 
                      Josh Emerson | 
                      Jan 03, 2018 | 
                      1230 |  
                      - | 
                    
                    
                    
                      | 5 tips to supercharge app security from code to cloud | 
                      Sonya Moisset | 
                      Aug 08, 2023 | 
                      2759 |  
                      - | 
                    
                    
                    
                      | The dangers of setattr: Avoiding Mass Assignment vulnerabilities in Python | 
                      Jack Hair | 
                      Feb 15, 2023 | 
                      1334 |  
                      - | 
                    
                    
                    
                      | Understanding DNS attacks: Identifying and patching vulnerabilities | 
                      Nihad Hassan | 
                      Oct 26, 2022 | 
                      2002 |  
                      - | 
                    
                    
                    
                      | Shifting Docker security left | 
                      Brian Vermeer | 
                      Apr 17, 2019 | 
                      924 |  
                      - | 
                    
                    
                    
                      | Announcing Snyk for .NET, Go and PHP | 
                      Aner Mazur | 
                      Dec 21, 2017 | 
                      733 |  
                      - | 
                    
                    
                    
                      | Which of the OWASP Top 10 Caused the World’s Biggest Data Breaches? | 
                      Guy Podjarny | 
                      May 10, 2017 | 
                      2799 |  
                      17 | 
                    
                    
                    
                      | Protect container images directly from your registries | 
                      Liron Lifshitz-Yadin | 
                      Apr 30, 2019 | 
                      465 |  
                      - | 
                    
                    
                    
                      | Build a software bill of materials (SBOM) for open source supply chain security | 
                      Liran Tal | 
                      Mar 14, 2022 | 
                      2599 |  
                      - | 
                    
                    
                    
                      | Enterprise security: Digital transformation and risk management with Anheuser-Busch Inbev and Manulife | 
                      Brian Piper | 
                      Feb 03, 2022 | 
                      875 |  
                      - | 
                    
                    
                    
                      | Buildkit mount cache race: Build-time race condition container breakout (CVE-2024-23651) | 
                      Rory McNamara | 
                      Jan 31, 2024 | 
                      1022 |  
                      - | 
                    
                    
                    
                      | Serverless Security at Serverless Conf | 
                      Guy Podjarny | 
                      Apr 28, 2017 | 
                      155 |  
                      - | 
                    
                    
                    
                      | Ghostcat breach affects all Tomcat versions | 
                      Brian Vermeer | 
                      Feb 26, 2020 | 
                      491 |  
                      1 | 
                    
                    
                    
                      | Helping Python developers shift security left with a new PyCharm plugin | 
                      Daniel Berman | 
                      Sep 08, 2020 | 
                      750 |  
                      1 | 
                    
                    
                    
                      | AWS re:Inforce 2022 recap | 
                      Shilpi Bhattacharjee | 
                      Aug 08, 2022 | 
                      2487 |  
                      - | 
                    
                    
                    
                      | Providing Comprehensive Application Security from Code to Production: New Snyk and Hdiv Security Partnership | 
                      Carey Stanton | 
                      Oct 26, 2021 | 
                      406 |  
                      - | 
                    
                    
                    
                      | Snyk and Bitbucket best practices cheat sheet | 
                      Marco Morales | 
                      Mar 03, 2022 | 
                      915 |  
                      - | 
                    
                    
                    
                      | XS leaks: What they are and how to avoid them | 
                      Gino Diño | 
                      Jul 17, 2023 | 
                      2287 |  
                      1 | 
                    
                    
                    
                      | 36% of developers switched from Oracle JDK to an alternate OpenJDK distribution, over the last year | 
                      Brian Vermeer | 
                      Feb 05, 2020 | 
                      736 |  
                      3 | 
                    
                    
                    
                      | SAS and Snyk discuss the future of AI for development and security teams | 
                      Brian Piper | 
                      Oct 09, 2023 | 
                      848 |  
                      - | 
                    
                    
                    
                      | Snyk Open Source adds C/C++ security scanning for unmanaged dependencies | 
                      Michal Brutvan | 
                      Apr 05, 2022 | 
                      768 |  
                      - | 
                    
                    
                    
                      | How Onna Technologies uses Snyk & Sysdig to secure the SDLC while saving time and money | 
                      Brian Piper | 
                      Sep 12, 2022 | 
                      1297 |  
                      - | 
                    
                    
                    
                      | Suspicious Maintainer Unveils Threads of npm Supply Chain Attack | 
                      Liran Tal | 
                      Jul 16, 2024 | 
                      1524 |  
                      - | 
                    
                    
                    
                      | Turn the senior around: an alternative way to lead engineering teams | 
                      Shai Mendel | 
                      Nov 30, 2020 | 
                      1085 |  
                      - | 
                    
                    
                    
                      | How to prevent Trojan Source attacks with Snyk Code | 
                      Frank Fischer | 
                      Nov 17, 2021 | 
                      957 |  
                      - | 
                    
                    
                    
                      | Cloud security fundamentals part 1: Know your environment | 
                      Drew Wright | 
                      Oct 07, 2022 | 
                      1098 |  
                      - | 
                    
                    
                    
                      | New Year's security resolutions for 2024 from Snyk DevRel, SecRel, and friends | 
                      Micah Silverman | 
                      Jan 18, 2024 | 
                      1188 |  
                      - | 
                    
                    
                    
                      | The State of Open Source Security Survey | 
                      Simon Maple | 
                      Nov 06, 2018 | 
                      292 |  
                      - | 
                    
                    
                    
                      | Buildkit build-time container teardown arbitrary delete (CVE-2024-23652) | 
                      Rory McNamara | 
                      Jan 31, 2024 | 
                      879 |  
                      - | 
                    
                    
                    
                      | Launching the Snyk Community Outreach Internship Program | 
                      Peter McKay | 
                      Nov 16, 2020 | 
                      302 |  
                      - | 
                    
                    
                    
                      | Staying ahead of security vulnerabilities with security patches | 
                      Liran Tal | 
                      Jul 31, 2019 | 
                      1140 |  
                      - | 
                    
                    
                    
                      | What you should know about PHP code security | 
                      Liran Tal | 
                      Sep 04, 2024 | 
                      1773 |  
                      - | 
                    
                    
                    
                      | Actionable and aggregated Slack notifications | 
                      Anna Debenham | 
                      Aug 23, 2018 | 
                      301 |  
                      - | 
                    
                    
                    
                      | Import an existing infrastructure into Terraform | 
                      Stephane Jourdan | 
                      Jul 02, 2020 | 
                      1089 |  
                      - | 
                    
                    
                    
                      | Secure your software supply chain with the new Snyk Vulnerability Intelligence for SBOM ServiceNow integration | 
                      Sarah Conway | 
                      Nov 07, 2023 | 
                      531 |  
                      - | 
                    
                    
                    
                      | Sum a List of numbers in Java | 
                      Brian Vermeer | 
                      May 22, 2020 | 
                      817 |  
                      - | 
                    
                    
                    
                      | Snyk documentation: Our journey so far | 
                      David Bailey | 
                      Feb 29, 2024 | 
                      978 |  
                      - | 
                    
                    
                    
                      | Snyk and ServiceNow collaborate on new SBOM solution | 
                      Sarah Conway | 
                      May 16, 2023 | 
                      470 |  
                      - | 
                    
                    
                    
                      | Celebrating Father’s Day at Snyk | 
                      Snyk Team | 
                      Jun 17, 2022 | 
                      93 |  
                      - | 
                    
                    
                    
                      | CTF secrets revealed: TopLang challenge from SnykCon 2021 explained | 
                      Michael Aquilina | 
                      Jan 06, 2022 | 
                      2987 |  
                      - | 
                    
                    
                    
                      | Remove sensitive data in your files and Azure Repos history | 
                      Simon Maple | 
                      May 06, 2019 | 
                      199 |  
                      - | 
                    
                    
                    
                      | JVM Ecosystem report 2018 - About your Tools | 
                      Simon Maple | 
                      Oct 17, 2018 | 
                      1278 |  
                      - | 
                    
                    
                    
                      | Snyk Open Source in 2021: A year of innovation | 
                      Daniel Berman | 
                      Dec 21, 2021 | 
                      1298 |  
                      - | 
                    
                    
                    
                      | Privileged Docker containers—do you really need them? | 
                      Matt Jarvis | 
                      Nov 05, 2020 | 
                      1328 |  
                      2 | 
                    
                    
                    
                      | Backstage integration with the Snyk API | 
                      Matt Jarvis | 
                      Mar 17, 2021 | 
                      781 |  
                      - | 
                    
                    
                    
                      | Snyk $22M Series B: Thanks to our community! | 
                      Guy Podjarny | 
                      Sep 25, 2018 | 
                      802 |  
                      - | 
                    
                    
                    
                      | Understanding Responsible Disclosures | 
                      Tim Kadlec | 
                      Jan 31, 2017 | 
                      1577 |  
                      1 | 
                    
                    
                    
                      | Agent hijacking: The true impact of prompt injection attacks | 
                      Elliot Ward, Rory McNamara, Mateo Rojas-Carulla, Sam Watts, Eric Allen | 
                      Aug 28, 2024 | 
                      2758 |  
                      - | 
                    
                    
                    
                      | Mimic your mental model with Project Collections | 
                      Waleed Arshad | 
                      Jun 27, 2023 | 
                      745 |  
                      - | 
                    
                    
                    
                      | Best practices for containerizing Python applications with Docker | 
                      Liran Tal | 
                      Nov 11, 2021 | 
                      4280 |  
                      - | 
                    
                    
                    
                      | Rego 103: Types of values and rules | 
                      Jasper Van der Jeugt, Becki Lee | 
                      Nov 16, 2023 | 
                      3425 |  
                      - | 
                    
                    
                    
                      | Building Java container images using Jib | 
                      Eric Smalling | 
                      Aug 17, 2021 | 
                      3081 |  
                      - | 
                    
                    
                    
                      | Introducing new Snyk AppRisk integrations: Enhancing application risk management with development context | 
                      Daniel Berman | 
                      Aug 01, 2024 | 
                      890 |  
                      - | 
                    
                    
                    
                      | A developer-centric approach to software | 
                      Mariah Gresham | 
                      Feb 18, 2022 | 
                      1108 |  
                      - | 
                    
                    
                    
                      | Celebrate International Women’s Day with Snyk | 
                      Hayley Denbraver | 
                      Mar 08, 2019 | 
                      370 |  
                      - | 
                    
                    
                    
                      | Understanding Kubernetes Pod Security Standards | 
                      Gino Diño | 
                      Jun 20, 2023 | 
                      1389 |  
                      - | 
                    
                    
                    
                      | Vulnerability remediation process: reducing your vulnerability backlog with Snyk’s automatic backlog PRs | 
                      Daniel Berman | 
                      Oct 22, 2020 | 
                      835 |  
                      - | 
                    
                    
                    
                      | Avoiding mass assignment vulnerabilities in Node.js | 
                      Benson Kuria Macharia | 
                      Mar 28, 2023 | 
                      2321 |  
                      - | 
                    
                    
                    
                      | Snyk Fetch the Flag CTF 2023 writeup: Honey Baked Messages | 
                      John Hammond | 
                      Nov 30, 2023 | 
                      298 |  
                      - | 
                    
                    
                    
                      | Snyk is now also hosted in the EU providing regional data residency | 
                      Daniel Berman | 
                      Jun 28, 2022 | 
                      633 |  
                      - | 
                    
                    
                    
                      | Bower is dead, long live npm. And Yarn. And webpack. | 
                      Assaf Hefetz | 
                      Dec 05, 2017 | 
                      1077 |  
                      - | 
                    
                    
                    
                      | Essential Node.js backend examples for developers in 2024 | 
                      Liran Tal | 
                      Jun 12, 2024 | 
                      2643 |  
                      - | 
                    
                    
                    
                      | Python language support now beta in Snyk Code | 
                      Frank Fischer | 
                      Apr 13, 2021 | 
                      458 |  
                      - | 
                    
                    
                    
                      | Celebrating Asian American and Pacific Islander Heritage Month | 
                      Snyk Team | 
                      May 27, 2022 | 
                      1141 |  
                      - | 
                    
                    
                    
                      | Introducing Snyk Learn: Free developer security education | 
                      Edgar Kussberg | 
                      Oct 06, 2021 | 
                      684 |  
                      - | 
                    
                    
                    
                      | Architecting a Serverless web application in AWS | 
                      Drew Wright | 
                      May 09, 2016 | 
                      3036 |  
                      - | 
                    
                    
                    
                      | Announcing Snyk for Bitbucket Pipelines | 
                      Guy Podjarny | 
                      Oct 12, 2016 | 
                      187 |  
                      - | 
                    
                    
                    
                      | A developer’s best friend: Lessons learned from our canine companions about AI code security | 
                      Krysta Williams-Timm | 
                      Aug 26, 2024 | 
                      803 |  
                      - | 
                    
                    
                    
                      | 10 React security best practices | 
                      Liran Tal | 
                      Jul 18, 2022 | 
                      1130 |  
                      2 | 
                    
                    
                    
                      | Preventing XSS in Django | 
                      Liran Tal | 
                      Mar 13, 2023 | 
                      1932 |  
                      - | 
                    
                    
                    
                      | Snyk Code now secures AI builds with support for LLM sources | 
                      Liqian Lim (林利蒨), Ranko Cupovic | 
                      Jun 25, 2024 | 
                      571 |  
                      - | 
                    
                    
                    
                      | Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months | 
                      Danny Grander | 
                      Nov 27, 2018 | 
                      752 |  
                      - | 
                    
                    
                    
                      | Prioritizing container vulnerabilities with exploit maturity | 
                      Jim Armstrong | 
                      Sep 09, 2020 | 
                      800 |  
                      - | 
                    
                    
                    
                      | Spring4Shell extends to Glassfish and Payara: same vulnerability, new exploit | 
                      Brian Vermeer | 
                      Apr 08, 2022 | 
                      1015 |  
                      - | 
                    
                    
                    
                      | Secure coding with Snyk Code: Ignore functionality with a twist | 
                      Frank Fischer | 
                      Mar 30, 2021 | 
                      944 |  
                      - | 
                    
                    
                    
                      | SAST tools speed comparison: Snyk Code vs SonarQube and LGTM | 
                      Frank Fischer | 
                      Jul 22, 2021 | 
                      1443 |  
                      - | 
                    
                    
                    
                      | Announcing Insights: Helping you focus on top risks for your organization | 
                      Daniel Berman | 
                      Jun 07, 2023 | 
                      1737 |  
                      - | 
                    
                    
                    
                      | Priorities from the OpenSSF Secure Open Source Software Summit 2023 | 
                      Dan Appelquist | 
                      Oct 04, 2023 | 
                      381 |  
                      - | 
                    
                    
                    
                      | Under the C: A glance at C/C++ vulnerabilities in Python land | 
                      Aviad Hahami | 
                      Apr 28, 2022 | 
                      1289 |  
                      - | 
                    
                    
                    
                      | Requiring authentication in Snyk CLI | 
                      Guy Podjarny | 
                      Jan 12, 2017 | 
                      733 |  
                      - | 
                    
                    
                    
                      | How open source C++ code can introduce security risks | 
                      Snyk Security Research Team | 
                      Aug 22, 2022 | 
                      1353 |  
                      - | 
                    
                    
                    
                      | Snyk for your Enterprise | 
                      Aner Mazur | 
                      Sep 19, 2017 | 
                      380 |  
                      - | 
                    
                    
                    
                      | Introducing the Snyk Partner Solutions Directory for discovering Snyk technology integrations | 
                      Cara Sampson | 
                      Apr 03, 2023 | 
                      996 |  
                      - | 
                    
                    
                    
                      | Snyk’s Evolution: A Message From CEO Peter McKay | 
                      Peter McKay | 
                      Apr 13, 2023 | 
                      549 |  
                      - | 
                    
                    
                    
                      | Secure Elixir development with Snyk | 
                      Daniel Berman | 
                      Apr 27, 2021 | 
                      1025 |  
                      - | 
                    
                    
                    
                      | How to install Java on macOS | 
                      Liran Tal | 
                      Apr 17, 2024 | 
                      2820 |  
                      - | 
                    
                    
                    
                      | Navigate 3 trends in financial services with DevSecOps | 
                      Patrick Vandenberg | 
                      Jul 13, 2020 | 
                      932 |  
                      - | 
                    
                    
                    
                      | CISO playbook: 3 things to consider when establishing a security culture | 
                      Simon Maple | 
                      Mar 09, 2023 | 
                      1249 |  
                      - | 
                    
                    
                    
                      | The State of Open Source Security Survey - 2020 | 
                      Alyssa Miller | 
                      Mar 25, 2020 | 
                      668 |  
                      - | 
                    
                    
                    
                      | GitHub Copilot code security: XSS in React | 
                      Liran Tal | 
                      Oct 19, 2023 | 
                      2044 |  
                      - | 
                    
                    
                    
                      | Security breach leaks the personal data of all 6.5 million Israeli voters | 
                      Ran Bar zik | 
                      Feb 12, 2020 | 
                      595 |  
                      3 | 
                    
                    
                    
                      | Announcing the Snyk and Docker Security Guide for Developers | 
                      Jim Armstrong | 
                      Nov 18, 2020 | 
                      668 |  
                      - | 
                    
                    
                    
                      | Tightly control access to your Azure Repos | 
                      Simon Maple | 
                      May 06, 2019 | 
                      328 |  
                      - | 
                    
                    
                    
                      | Setting up SSL/TLS for Kubernetes Ingress | 
                      Peter De Tender | 
                      Nov 17, 2022 | 
                      2245 |  
                      - | 
                    
                    
                    
                      | Exploiting Buffer | 
                      Guy Podjarny | 
                      Apr 05, 2016 | 
                      1227 |  
                      - | 
                    
                    
                    
                      | Never store credentials as code/config in Azure Repos | 
                      Simon Maple | 
                      May 06, 2019 | 
                      315 |  
                      - | 
                    
                    
                    
                      | Snyk CLI cheat sheet | 
                      Brian Vermeer | 
                      Nov 26, 2020 | 
                      2369 |  
                      - | 
                    
                    
                    
                      | Snyk Career Stories: Starting and growing your career through the Snyk SDR program | 
                      Snyk Team | 
                      Nov 23, 2021 | 
                      2045 |  
                      - | 
                    
                    
                    
                      | What makes Fastify a successful project? | 
                      Oren Hacohen | 
                      Dec 22, 2020 | 
                      780 |  
                      - | 
                    
                    
                    
                      | Security success in the Bay Area with Slack | 
                      Mariah Gresham | 
                      May 17, 2023 | 
                      878 |  
                      - | 
                    
                    
                    
                      | Snyk expands in Asia-Pacific (APAC) with new datacenter in Sydney, Australia | 
                      Daniel Berman | 
                      Nov 30, 2022 | 
                      715 |  
                      - | 
                    
                    
                    
                      | Get Snyk security alerts on Slack | 
                      Johanna Kollmann | 
                      Sep 28, 2016 | 
                      202 |  
                      - | 
                    
                    
                    
                      | Secure your build workflow on Bitbucket Pipes with Snyk | 
                      Noa Korem | 
                      Mar 05, 2019 | 
                      776 |  
                      - | 
                    
                    
                    
                      | How to setup Deno Dev Container on GitHub Codespaces? | 
                      Liran Tal | 
                      Jul 18, 2024 | 
                      2097 |  
                      - | 
                    
                    
                    
                      | The Secret To Building A Truly Successful Freemium Product and more, with Guy Podjarny | 
                      Simon Maple | 
                      Dec 19, 2018 | 
                      571 |  
                      - | 
                    
                    
                    
                      | Welcoming Kathleen Murphy and Zach Nelson to the Snyk Board of Directors | 
                      Peter McKay | 
                      Jan 24, 2022 | 
                      448 |  
                      - | 
                    
                    
                    
                      | How to manage Terraform state? | 
                      Stephane Jourdan | 
                      May 26, 2020 | 
                      937 |  
                      - | 
                    
                    
                    
                      | Magento security requires additional patch to fix sanitization vulnerability | 
                      DeveloperSteve Coochin | 
                      Feb 24, 2022 | 
                      711 |  
                      - | 
                    
                    
                    
                      | Modernizing SAST rules maintenance to catch vulnerabilities faster | 
                      Frank Fischer | 
                      Apr 19, 2022 | 
                      928 |  
                      - | 
                    
                    
                    
                      | Why npm lockfiles can be a security blindspot for injecting malicious modules | 
                      Liran Tal | 
                      Sep 24, 2019 | 
                      1068 |  
                      259 | 
                    
                    
                    
                      | Our Journey to Today | 
                      Guy Podjarny | 
                      Mar 10, 2021 | 
                      788 |  
                      - | 
                    
                    
                    
                      | Command injection in Python: examples and prevention | 
                      Rubaiat Hossain | 
                      Dec 21, 2023 | 
                      2558 |  
                      - | 
                    
                    
                    
                      | Securing your Kubernetes application development with Snyk and Tilt | 
                      Matt Jarvis | 
                      Jan 11, 2021 | 
                      2412 |  
                      - | 
                    
                    
                    
                      | Meet (and join) our newest Snyk Ambassadors! | 
                      Waleed Arshad | 
                      Mar 28, 2022 | 
                      1783 |  
                      - | 
                    
                    
                    
                      | Best practices for managing Java dependencies | 
                      Brian Vermeer | 
                      Aug 26, 2022 | 
                      1826 |  
                      5 | 
                    
                    
                    
                      | How to avoid web cache poisoning attacks | 
                      Najia Gul | 
                      Sep 11, 2023 | 
                      2155 |  
                      - | 
                    
                    
                    
                      | How to secure Python Flask applications | 
                      Gourav Singh Bais | 
                      May 21, 2024 | 
                      4209 |  
                      - | 
                    
                    
                    
                      | Fetch the Flag CTF 2023 sneak peek | 
                      Danielle Bradford | 
                      Sep 06, 2023 | 
                      187 |  
                      - | 
                    
                    
                    
                      | Out of Beta, plus exciting new features | 
                      Guy Podjarny | 
                      Jun 22, 2016 | 
                      694 |  
                      - | 
                    
                    
                    
                      | Secure code review: 8 security code review best practices | 
                      Brian Vermeer, Trisha Gee | 
                      Apr 20, 2020 | 
                      3180 |  
                      - | 
                    
                    
                    
                      | A DevSecOps solution for your apps on AWS from Snyk | 
                      David Lugo | 
                      Nov 28, 2023 | 
                      900 |  
                      - | 
                    
                    
                    
                      | Ignoring vulnerabilities with Snyk | 
                      Daniel Berman | 
                      May 03, 2022 | 
                      1845 |  
                      - | 
                    
                    
                    
                      | Implementing TLS in Java | 
                      Himanish Munjal | 
                      Nov 09, 2022 | 
                      2166 |  
                      - | 
                    
                    
                    
                      | Getting started with Snyk for secure Python development | 
                      Daniel Berman | 
                      Aug 04, 2021 | 
                      2033 |  
                      - | 
                    
                    
                    
                      | Best practices for containerizing Go applications with Docker | 
                      Jekayin-Oluwa Olabemiwo | 
                      Mar 23, 2022 | 
                      2117 |  
                      - | 
                    
                    
                    
                      | Arbitrary code execution in Grunt | 
                      Alyssa Miller | 
                      Sep 21, 2020 | 
                      872 |  
                      - | 
                    
                    
                    
                      | 10 Tips for getting that conference CFP accepted | 
                      Liran Tal | 
                      Dec 03, 2020 | 
                      1148 |  
                      - | 
                    
                    
                    
                      | Snyk named as a top cybersecurity company in inaugural Fortune Cyber 60 2023 list | 
                      Snyk Team | 
                      Dec 18, 2023 | 
                      337 |  
                      - | 
                    
                    
                    
                      | 3 parameters to measure SAST testing | 
                      Asaf Biton | 
                      Aug 03, 2021 | 
                      1571 |  
                      - | 
                    
                    
                    
                      | 5 ways to prevent code injection in JavaScript and Node.js | 
                      Liran Tal | 
                      Apr 06, 2021 | 
                      2325 |  
                      1 | 
                    
                    
                    
                      | New years resolution: Don’t show my security tokens when hacking my demo application on stage | 
                      Brian Vermeer | 
                      Jan 12, 2022 | 
                      721 |  
                      - | 
                    
                    
                    
                      | Snyk finds PyPi malware that steals Discord and Roblox credential and payment info | 
                      Raul Onitza-Klugman | 
                      Aug 16, 2022 | 
                      1689 |  
                      - | 
                    
                    
                    
                      | AngularJS Security Fundamentals | 
                      Liran Tal | 
                      Mar 17, 2020 | 
                      3025 |  
                      2 | 
                    
                    
                    
                      | Announcing the 2017 State of Open Source Security Report | 
                      Tim Kadlec | 
                      Nov 16, 2017 | 
                      386 |  
                      - | 
                    
                    
                    
                      | A definitive guide to Ruby gems dependency management | 
                      Liran Tal | 
                      Aug 05, 2022 | 
                      2618 |  
                      1 | 
                    
                    
                    
                      | Python now fully supported in Snyk Code | 
                      Frank Fischer | 
                      Jun 03, 2021 | 
                      493 |  
                      - | 
                    
                    
                    
                      | Celebrating four years of developer-first integrations at Atlassian Team ‘21 | 
                      Sarah Conway | 
                      Apr 26, 2021 | 
                      750 |  
                      - | 
                    
                    
                    
                      | Enriched content on Snyk’s publicly available vulnerability database | 
                      Dan Mckean | 
                      Apr 08, 2019 | 
                      511 |  
                      - | 
                    
                    
                    
                      | Security vs. Development: A game of priorities | 
                      Andrew MacKenzie | 
                      Nov 06, 2023 | 
                      1009 |  
                      - | 
                    
                    
                    
                      | Finding meaning amidst so much unknown | 
                      Simon Maple | 
                      Apr 22, 2020 | 
                      781 |  
                      - | 
                    
                    
                    
                      | How MongoDB built a successful security champions program | 
                      Sarah Wills | 
                      Nov 02, 2021 | 
                      744 |  
                      - | 
                    
                    
                    
                      | Identifying Insecure C Code with Valgrind and Fixing with Snyk Code | 
                      Liran Tal | 
                      Sep 24, 2024 | 
                      1373 |  
                      - | 
                    
                    
                    
                      | Meet the new host for The Secure Developer podcast | 
                      Mariah Gresham | 
                      May 09, 2024 | 
                      469 |  
                      - | 
                    
                    
                    
                      | How to mitigate security issues in GenAI code and LLM integrations | 
                      Liran Tal | 
                      Sep 11, 2024 | 
                      2394 |  
                      - | 
                    
                    
                    
                      | Snyk Receives “Best CEO” Award | 
                      Dipti Salopek | 
                      Dec 12, 2019 | 
                      329 |  
                      - | 
                    
                    
                    
                      | Announcing new Snyk AppRisk integration with Orca Security | 
                      Daniel Berman | 
                      Sep 11, 2024 | 
                      809 |  
                      - | 
                    
                    
                    
                      | Want to avoid a data breach? Employ secrets detection | 
                      Liran Tal | 
                      Sep 16, 2024 | 
                      2539 |  
                      - | 
                    
                    
                    
                      | Application security automation for GitHub repositories with Snyk | 
                      Omer Levi Hevroni | 
                      Mar 31, 2021 | 
                      941 |  
                      - | 
                    
                    
                    
                      | Promise queues and batching concurrent tasks in Deno | 
                      Liran Tal | 
                      Sep 25, 2024 | 
                      3378 |  
                      - | 
                    
                    
                    
                      | AWS re:Invent 2022: How Neiman Marcus transitioned to developer-first security | 
                      Megan Moore | 
                      Dec 12, 2022 | 
                      1231 |  
                      - | 
                    
                    
                    
                      | 5 reasons why developers at FinServ institutions are outpacing their security teammates | 
                      Katie DeMatteis | 
                      Sep 09, 2024 | 
                      822 |  
                      - | 
                    
                    
                    
                      | Dive into AI and LLM learning with the new Snyk Learn learning path | 
                      Michael Biocchi | 
                      Sep 18, 2024 | 
                      310 |  
                      - | 
                    
                    
                    
                      | Welcoming Gary Olson: Snyk’s new Chief Revenue Officer | 
                      Peter McKay | 
                      Mar 04, 2024 | 
                      444 |  
                      - | 
                    
                    
                    
                      | How SAS secures their AI-generated code | 
                      Gerald Crescione | 
                      Apr 15, 2024 | 
                      1874 |  
                      - | 
                    
                    
                    
                      | The journey to AppSec gold: Lessons we can learn from the Olympians | 
                      Krysta Williams-Timm | 
                      Aug 15, 2024 | 
                      714 |  
                      - | 
                    
                    
                    
                      | Simplify Snyk and AWS integration with our latest AWS Quick Start | 
                      Jay Yeras | 
                      Sep 22, 2020 | 
                      424 |  
                      - | 
                    
                    
                    
                      | Tools for infrastructure drift detection | 
                      William Beuil | 
                      Mar 15, 2022 | 
                      2480 |  
                      - | 
                    
                    
                    
                      | Security Horror Story: Accidentally exposing PII data | 
                      Brian Vermeer | 
                      Oct 25, 2021 | 
                      1008 |  
                      - | 
                    
                    
                    
                      | 3 best practices to make the most of Snyk AppRisk Essentials | 
                      Daniel Berman | 
                      Sep 19, 2024 | 
                      1801 |  
                      - | 
                    
                    
                    
                      | 10 best practices to build a Java container with Docker | 
                      Brian Vermeer | 
                      Aug 24, 2022 | 
                      4147 |  
                      - | 
                    
                    
                    
                      | Secure development in Visual Studio with Snyk Open Source | 
                      Daniel Berman | 
                      Jun 09, 2021 | 
                      689 |  
                      - | 
                    
                    
                    
                      | Infosec Europe session: 4 tips for safer AI adoption | 
                      Gerald Crescione | 
                      Aug 01, 2024 | 
                      1103 |  
                      - | 
                    
                    
                    
                      | How to prevent log injection vulnerability in JavaScript and Node.js applications | 
                      Liran Tal | 
                      Sep 26, 2024 | 
                      1504 |  
                      - | 
                    
                    
                    
                      | Securing a DevOps pipeline with Snyk, Bitbucket, and AWS | 
                      Marco Morales | 
                      Jan 04, 2022 | 
                      456 |  
                      - | 
                    
                    
                    
                      | SurveyMonkey talks with Snyk about developer security during hypergrowth | 
                      Megan Moore | 
                      May 05, 2022 | 
                      1381 |  
                      - | 
                    
                    
                    
                      | Meet Snyk for Government: Our developer security solution with FedRAMP ATO | 
                      Danny Allan | 
                      Sep 17, 2024 | 
                      502 |  
                      - | 
                    
                    
                    
                      | Operating security ownership at scale: Twilio’s perspective | 
                      Brian Piper | 
                      Aug 30, 2021 | 
                      885 |  
                      - | 
                    
                    
                    
                      | Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System | 
                      Jim Armstrong | 
                      Sep 27, 2024 | 
                      1224 |  
                      - | 
                    
                    
                    
                      | Going beyond reachability to prioritize what matters most | 
                      Jamie Smith | 
                      Oct 01, 2024 | 
                      1149 |  
                      - | 
                    
                    
                    
                      | Proactive AppSec continuous vulnerability management for developers and security teams | 
                      Liran Tal | 
                      Oct 02, 2024 | 
                      1804 |  
                      - | 
                    
                    
                    
                      | Snyk named a 2024 Gartner Peer Insights™ Customers’ Choice for Application Security Testing for the 3rd consecutive year | 
                      Nina McClure | 
                      Oct 02, 2024 | 
                      723 |  
                      - | 
                    
                    
                    
                      | The mysterious supply chain concern of string-width-cjs npm package | 
                      Liran Tal | 
                      Oct 03, 2024 | 
                      1455 |  
                      - | 
                    
                    
                    
                      | SnykLaunch Oct 2024: Enhanced PR experience, extended visibility, AI-powered security, holistic risk management | 
                      Anthony Larkin | 
                      Oct 08, 2024 | 
                      1489 |  
                      - | 
                    
                    
                    
                      | A look into your engineering interview at Snyk | 
                      Philip Beevers | 
                      Oct 09, 2024 | 
                      750 |  
                      - | 
                    
                    
                    
                      | Foundations of trust: Securing the future of AI-generated code | 
                      Danny Allan | 
                      Oct 10, 2024 | 
                      888 |  
                      - | 
                    
                    
                    
                      | Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code | 
                      Liran Tal | 
                      Oct 10, 2024 | 
                      875 |  
                      - | 
                    
                    
                    
                      | Automatically fix code vulnerabilities with AI | 
                      Micah Silverman | 
                      Oct 14, 2024 | 
                      1132 |  
                      - | 
                    
                    
                    
                      | How Snyk is prioritizing developer experience | 
                      Anthony Larkin | 
                      Oct 16, 2024 | 
                      860 |  
                      - | 
                    
                    
                    
                      | Snyk announces commitment to Service for America, bringing security education access to all | 
                      Michael Biocchi | 
                      Oct 17, 2024 | 
                      394 |  
                      - | 
                    
                    
                    
                      | Ensuring comprehensive security testing in DevOps pipelines | 
                      Jim Armstrong | 
                      Oct 17, 2024 | 
                      1317 |  
                      - | 
                    
                    
                    
                      | Introducing: Extensive AppSec visibility with Snyk Analytics | 
                      Nastasha Casale | 
                      Oct 17, 2024 | 
                      952 |  
                      - | 
                    
                    
                    
                      | Elevating Views of Risk: Holistic Application Risk Management with Snyk | 
                      Daniel Berman | 
                      Oct 22, 2024 | 
                      1601 |  
                      - | 
                    
                    
                    
                      | Women - Kickstart your Application Security Career! | 
                      Vandana Verma Sehgal | 
                      Oct 22, 2024 | 
                      1020 |  
                      - | 
                    
                    
                    
                      | Find, auto-fix, and prioritize intelligently, with Snyk's AI-powered code security tools | 
                      Liqian Lim (林利蒨) | 
                      Oct 24, 2024 | 
                      2083 |  
                      - | 
                    
                    
                    
                      | Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV) | 
                      Liran Tal | 
                      Oct 23, 2024 | 
                      1469 |  
                      - | 
                    
                    
                    
                      | Best Practices for Continuous Vulnerability Management | 
                      Liran Tal | 
                      Oct 29, 2024 | 
                      1698 |  
                      - | 
                    
                    
                    
                      | Top 5 SAST Auto-fixing Tools and How They Compare | 
                      Liqian Lim (林利蒨) | 
                      Oct 29, 2024 | 
                      966 |  
                      - | 
                    
                    
                    
                      | Lottie Player npm package compromised for crypto wallet theft | 
                      Liran Tal | 
                      Oct 31, 2024 | 
                      825 |  
                      2 | 
                    
                    
                    
                      | If you don’t know about HTTP Archive’s Web Almanac yet, you should! | 
                      Brian Clark | 
                      Nov 01, 2024 | 
                      710 |  
                      - | 
                    
                    
                    
                      | Snyk Recharge days: Making time to take time | 
                      Adriana Bokel Herde | 
                      May 17, 2023 | 
                      710 |  
                      - | 
                    
                    
                    
                      | GitFlops: The Dangers of Terraform Automation Platforms | 
                      Elliot Ward | 
                      Nov 07, 2024 | 
                      1831 |  
                      - | 
                    
                    
                    
                      | Extending Developer Security with Dev-First Dynamic Testing | 
                      Manoj Nair | 
                      Nov 12, 2024 | 
                      1565 |  
                      - | 
                    
                    
                    
                      | How ASPM boosts visibility to manage application risk | 
                      Daniel Berman | 
                      Nov 12, 2024 | 
                      1144 |  
                      - | 
                    
                    
                    
                      | Exploring intent-based Android security vulnerabilities on Google Play | 
                      Raul Onitza-Klugman | 
                      May 18, 2021 | 
                      1495 |  
                      - | 
                    
                    
                    
                      | 5 Disaster Recovery Testing Methodologies | 
                      Liran Tal | 
                      Sep 23, 2022 | 
                      610 |  
                      - | 
                    
                    
                    
                      | Understanding command injection vulnerabilities in Go | 
                      Liran Tal | 
                      Nov 14, 2024 | 
                      1891 |  
                      1 | 
                    
                    
                    
                      | 5 Best Practices for Container security | 
                      Liran Tal | 
                      Jul 19, 2022 | 
                      985 |  
                      - | 
                    
                    
                    
                      | Snyk named a Customer Favorite in The Forrester Wave™: Software Composition Analysis Software, Q4 2024 Report | 
                      Peter McKay | 
                      Nov 13, 2024 | 
                      460 |  
                      - | 
                    
                    
                    
                      | Mitigating and remediating intent-based Android security vulnerabilities | 
                      Raul Onitza-Klugman | 
                      Jun 02, 2021 | 
                      1655 |  
                      - | 
                    
                    
                    
                      | Phony PyPi package imitates known developer | 
                      Elliot Ward | 
                      Oct 05, 2022 | 
                      1031 |  
                      2 | 
                    
                    
                    
                      | An Introduction to capture the flag | 
                      Sonya Moisset | 
                      Sep 13, 2023 | 
                      828 |  
                      - | 
                    
                    
                    
                      | 6 Kubernetes Tools That Can Help Secure Containers at Runtime | 
                      Liran Tal | 
                      Jun 08, 2022 | 
                      481 |  
                      - | 
                    
                    
                    
                      | Women in security: Inspiring leaders of today and tomorrow | 
                      Jonaki Egenolf | 
                      Nov 19, 2024 | 
                      433 |  
                      - | 
                    
                    
                    
                      | How to prioritize vulnerabilities based on risk | 
                      Daniel Berman | 
                      Nov 19, 2024 | 
                      1153 |  
                      - | 
                    
                    
                    
                      | A commitment to future generations: Snyk’s 2024 Student Edition Capture The Flag Recap | 
                      Michael Biocchi | 
                      Nov 21, 2024 | 
                      332 |  
                      - | 
                    
                    
                    
                      | Why a solid DevOps foundation is vital for effective DevSecOps | 
                      Ben Desjardins | 
                      Nov 27, 2024 | 
                      1117 |  
                      - | 
                    
                    
                    
                      | Measuring AppSec success: Key KPIs that demonstrate value | 
                      Daniel Berman | 
                      Nov 26, 2024 | 
                      1479 |  
                      - | 
                    
                    
                    
                      | 6 Reasons to use source code analysis | 
                      Liran Tal | 
                      May 10, 2021 | 
                      666 |  
                      - | 
                    
                    
                    
                      | Seven steps to close coverage gaps with ASPM | 
                      Daniel Berman | 
                      Dec 03, 2024 | 
                      1023 |  
                      - | 
                    
                    
                    
                      | 2024 Open Source Security Report: Slowing Progress and New Challenges for DevSecOps | 
                      Jamie Smith | 
                      Dec 03, 2024 | 
                      973 |  
                      - | 
                    
                    
                    
                      | Empowering women in security: The impact of mentorship | 
                      Erin Cullen | 
                      Nov 27, 2024 | 
                      696 |  
                      - | 
                    
                    
                    
                      | Snyk-generated SBOMs now include license details for the open source libraries in your projects | 
                      Jamie Smith | 
                      Dec 09, 2024 | 
                      906 |  
                      - | 
                    
                    
                    
                      | How to mitigate SSRF vulnerabilities in Go | 
                      Liran Tal | 
                      Dec 10, 2024 | 
                      910 |  
                      - | 
                    
                    
                    
                      | Snyk’s risk-based approach to prioritization | 
                      Daniel Berman | 
                      Dec 11, 2024 | 
                      1082 |  
                      - | 
                    
                    
                    
                      | Ultralytics AI Pwn Request Supply Chain Attack | 
                      Stephen Thoemmes | 
                      Dec 11, 2024 | 
                      1375 |  
                      - | 
                    
                    
                    
                      | 10 SDLC best practices to implement today | 
                      Jamie Smith | 
                      Jan 14, 2022 | 
                      1304 |  
                      - | 
                    
                    
                    
                      | Microservices security: 6 best practice tips | 
                      Jamie Smith | 
                      Feb 10, 2022 | 
                      1226 |  
                      - | 
                    
                    
                    
                      | Vulnerability vs Weakness: Understanding Key Differences in AppSec | 
                      Daniel Berman | 
                      Nov 17, 2023 | 
                      1934 |  
                      - | 
                    
                    
                    
                      | 7 Best practices for disaster recovery testing | 
                      Liran Tal | 
                      Sep 23, 2022 | 
                      805 |  
                      - | 
                    
                    
                    
                      | Ethical Hacking: Top Tools | 
                      Vandana Verma Sehgal | 
                      Jun 01, 2023 | 
                      1601 |  
                      - | 
                    
                    
                    
                      | Top 10 DevOps Tools | 
                      Jamie Smith | 
                      Mar 21, 2021 | 
                      1423 |  
                      - | 
                    
                    
                    
                      | Security Vulnerability: types and remediation | 
                      Rory McNamara | 
                      Feb 11, 2021 | 
                      1352 |  
                      - | 
                    
                    
                    
                      | Top 8 AWS Security Best Practices | 
                      Liran Tal | 
                      Oct 18, 2022 | 
                      1835 |  
                      - | 
                    
                    
                    
                      | Hiring a virtual CISO to help your security team | 
                      Manoj Nair | 
                      Mar 09, 2022 | 
                      1019 |  
                      - | 
                    
                    
                    
                      | DevOps Security best practices | 
                      Jamie Smith | 
                      Mar 16, 2021 | 
                      1487 |  
                      - | 
                    
                    
                    
                      | The 4 best DevSecOps tools for a secure DevOps workflow | 
                      Liran Tal | 
                      Jan 23, 2024 | 
                      1583 |  
                      - | 
                    
                    
                    
                      | Essential AI Tools to Boost Developer Productivity and Security | 
                      Liqian Lim (林利蒨) | 
                      Mar 01, 2024 | 
                      1385 |  
                      - | 
                    
                    
                    
                      | What is the BSD License? Top 10 questions answered | 
                      Jamie Smith | 
                      Sep 22, 2020 | 
                      969 |  
                      - | 
                    
                    
                    
                      | 4 Advantages of using AI code review | 
                      Rory McNamara | 
                      Nov 29, 2023 | 
                      1152 |  
                      - | 
                    
                    
                    
                      | Python Code Review Tools | 
                      Liran Tal | 
                      Aug 12, 2022 | 
                      1276 |  
                      - | 
                    
                    
                    
                      | Why you should implement an automated code review process | 
                      Liran Tal | 
                      Dec 20, 2021 | 
                      1222 |  
                      - | 
                    
                    
                    
                      | Unlocking the power of multi-cloud security | 
                      Vandana Verma Sehgal | 
                      Apr 25, 2023 | 
                      1147 |  
                      - | 
                    
                    
                    
                      | Supply Chain Security Risks & Best Practice | 
                      Liran Tal | 
                      Apr 04, 2023 | 
                      1102 |  
                      - | 
                    
                    
                    
                      | What are security misconfigurations and how can you prevent them? | 
                      Rory McNamara | 
                      Nov 01, 2021 | 
                      932 |  
                      - | 
                    
                    
                    
                      | Getting started at a new organization | 
                      Manoj Nair | 
                      Jan 27, 2022 | 
                      791 |  
                      - | 
                    
                    
                    
                      | OWASP API Security Top 10 Risks | 
                      Liran Tal | 
                      Sep 23, 2022 | 
                      1816 |  
                      - | 
                    
                    
                    
                      | 8 proven code review best practices for developers | 
                      Liran Tal | 
                      Jan 14, 2022 | 
                      1316 |  
                      - | 
                    
                    
                    
                      | OWASP Top 10 Vulnerabilities | 
                      Liran Tal | 
                      Oct 15, 2020 | 
                      2504 |  
                      - | 
                    
                    
                    
                      | How to implement DevSecOps in 4 steps | 
                      Jamie Smith | 
                      Jun 22, 2023 | 
                      1316 |  
                      - | 
                    
                    
                    
                      | Software Supply Chain Security Tools: Types, Features & Considerations | 
                      Jamie Smith | 
                      Aug 02, 2023 | 
                      1306 |  
                      - | 
                    
                    
                    
                      | 5 application security assessment steps | 
                      Daniel Berman | 
                      Aug 31, 2021 | 
                      1029 |  
                      - | 
                    
                    
                    
                      | 5 potential risks of open source software | 
                      Liran Tal | 
                      Jun 29, 2021 | 
                      1436 |  
                      - | 
                    
                    
                    
                      | C++ in the wild: Which industries use C++? | 
                      Liran Tal | 
                      Apr 29, 2022 | 
                      1070 |  
                      - | 
                    
                    
                    
                      | Developer-first supply chain security | 
                      Jamie Smith | 
                      Sep 19, 2023 | 
                      1330 |  
                      - | 
                    
                    
                    
                      | Top 5 Docker Security Vulnerabilities | 
                      Liran Tal | 
                      Oct 31, 2022 | 
                      1036 |  
                      - | 
                    
                    
                    
                      | Asset-first application security: What is it and how can it help | 
                      Daniel Berman | 
                      Nov 03, 2023 | 
                      1156 |  
                      - | 
                    
                    
                    
                      | The Importance of Container Monitoring | 
                      Jamie Smith | 
                      Mar 02, 2022 | 
                      1013 |  
                      - | 
                    
                    
                    
                      | Cloud security challenges | 
                      Rory McNamara | 
                      May 19, 2022 | 
                      2423 |  
                      - | 
                    
                    
                    
                      | Defense in Depth | 
                      Daniel Berman | 
                      Feb 29, 2024 | 
                      1430 |  
                      - | 
                    
                    
                    
                      | Top AWS Security Risks & Prevention | 
                      Rory McNamara | 
                      Mar 02, 2023 | 
                      1256 |  
                      - | 
                    
                    
                    
                      | Top 8 DevSecOps Best Practices - Build Securely | 
                      Liran Tal | 
                      Sep 26, 2022 | 
                      1074 |  
                      - | 
                    
                    
                    
                      | 15 Application Security Best Practices | 
                      Daniel Berman | 
                      Oct 08, 2020 | 
                      1573 |  
                      - | 
                    
                    
                    
                      | Secrets Management: Tools & Best Practice | 
                      Jamie Smith | 
                      Jun 26, 2023 | 
                      1318 |  
                      - | 
                    
                    
                    
                      | Product Security vs. Application Security: What’s the Difference? | 
                      Rory McNamara | 
                      Jul 21, 2023 | 
                      1390 |  
                      - | 
                    
                    
                    
                      | 6 tips for managing your open source components | 
                      Liran Tal | 
                      Apr 26, 2022 | 
                      1364 |  
                      - | 
                    
                    
                    
                      | 4 Enterprise-level security best practices | 
                      Manoj Nair | 
                      Jul 20, 2023 | 
                      617 |  
                      - | 
                    
                    
                    
                      | 4 steps of the Vulnerability Remediation Process | 
                      Liran Tal, Jamie Smith | 
                      Feb 16, 2021 | 
                      1699 |  
                      - | 
                    
                    
                    
                      | 7 best Java code review tools for developers | 
                      Liran Tal | 
                      Jan 14, 2022 | 
                      1375 |  
                      - | 
                    
                    
                    
                      | AppSec Maturity Models | 
                      Rory McNamara | 
                      Mar 08, 2024 | 
                      1120 |  
                      - | 
                    
                    
                    
                      | Cybersecurity Hygiene 101 | 
                      Liran Tal | 
                      Mar 02, 2023 | 
                      1594 |  
                      - | 
                    
                    
                    
                      | High profile AWS breaches & how to avoid them | 
                      Jamie Smith | 
                      Jun 07, 2023 | 
                      1197 |  
                      - | 
                    
                    
                    
                      | 5 cloud application security best practices | 
                      Jamie Smith | 
                      Jun 27, 2021 | 
                      842 |  
                      - | 
                    
                    
                    
                      | API Security Guide | 
                      Liran Tal | 
                      Apr 25, 2023 | 
                      1338 |  
                      - | 
                    
                    
                    
                      | Did you make the *security* naughty or nice list this year? | 
                      Mariah Gresham | 
                      Dec 18, 2024 | 
                      590 |  
                      - | 
                    
                    
                    
                      | 4 tips for securing GenAI-assisted development | 
                      Sarah Conway | 
                      Dec 18, 2024 | 
                      859 |  
                      - | 
                    
                    
                    
                      | New year, new security goals: Improve your AppSec in 2025 | 
                      Mariah Gresham | 
                      Jan 01, 2025 | 
                      729 |  
                      - | 
                    
                    
                    
                      | Securing the Digital Future: AppSec Best Practices in Digital Banking | 
                      Hiroko Nakano | 
                      Jan 06, 2025 | 
                      587 |  
                      - | 
                    
                    
                    
                      | Securing GenAI Development with Snyk | 
                      Liqian Lim (林利蒨) | 
                      Jan 09, 2025 | 
                      697 |  
                      - | 
                    
                    
                    
                      | Snyk Recognized as Trusted Partner and Innovator by JPMorganChase | 
                      Ken Mellert | 
                      Jan 14, 2025 | 
                      294 |  
                      - | 
                    
                    
                    
                      | BFI’s Journey in Digital Transformation: A Fireside Chat on Elevating Application Security and Developer Experience | 
                      Hiroko Nakano | 
                      Jan 15, 2025 | 
                      506 |  
                      - | 
                    
                    
                    
                      | Snyk Security Labs Testing Update: Cursor.com AI Code Editor | 
                      Danny Allan | 
                      Jan 14, 2025 | 
                      688 |  
                      6 | 
                    
                    
                    
                      | Understanding the EU’s Cyber Resilience Act (CRA) | 
                      Ben Desjardins | 
                      Jan 22, 2025 | 
                      1105 |  
                      - | 
                    
                    
                    
                      | Sneak Peek into Fetch the Flag CTF 2025 | 
                      Gina Fitzpatrick | 
                      Jan 21, 2025 | 
                      293 |  
                      - | 
                    
                    
                    
                      | Reviving DevSecOps: How Snyk’s new framework builds trust and collaboration | 
                      Ben Desjardins | 
                      Jan 23, 2025 | 
                      793 |  
                      - | 
                    
                    
                    
                      | Introducing Snyk Accelerate powered by Accenture | 
                      Taylor Buie | 
                      Jan 28, 2025 | 
                      1079 |  
                      - | 
                    
                    
                    
                      | Consolidate Security Findings with Snyk and Google Security Command Center | 
                      Daniel Berman | 
                      Feb 06, 2025 | 
                      701 |  
                      - | 
                    
                    
                    
                      | Do not pass GO - Malicious Package Alert | 
                      Vandana Verma Sehgal | 
                      Feb 12, 2025 | 
                      477 |  
                      - | 
                    
                    
                    
                      | The First Round of Changes to Match Snyk's Design Language | 
                      Snyk Team | 
                      Jan 23, 2025 | 
                      703 |  
                      - | 
                    
                    
                    
                      | Can Snyk Find Weak Cryptographic Algorithms? Bye Bye MD5 | 
                      Liran Tal | 
                      Feb 25, 2025 | 
                      582 |  
                      - | 
                    
                    
                    
                      | Celebrating Black History Month 2025 at Snyk | 
                      Snyk Team | 
                      Feb 26, 2025 | 
                      708 |  
                      - | 
                    
                    
                    
                      | Snyk’s Fetch the Flag CTF is More Than Just a CTF | 
                      John Hammond | 
                      Feb 20, 2025 | 
                      784 |  
                      - | 
                    
                    
                    
                      | Incorporating security by design: Managing risk in DevSecOps | 
                      Ben Desjardins | 
                      Feb 25, 2025 | 
                      844 |  
                      - | 
                    
                    
                    
                      | Does Claude 3.7 Sonnet Generate Insecure Code? | 
                      Stephen Thoemmes | 
                      Feb 26, 2025 | 
                      571 |  
                      - | 
                    
                    
                    
                      | Solving Security Challenges with Snyk Code and Symbolic AI | 
                      Liran Tal | 
                      Feb 27, 2025 | 
                      916 |  
                      - | 
                    
                    
                    
                      | Leveraging Generative AI with DevSecOps for Enhanced Security | 
                      Stephen Thoemmes | 
                      Feb 27, 2025 | 
                      1059 |  
                      - | 
                    
                    
                    
                      | ChatGPT and Secure Coding: Benefits and Security Vulnerabilities of ChatGPT-Generated Code | 
                      Stephen Thoemmes | 
                      Mar 04, 2025 | 
                      907 |  
                      - | 
                    
                    
                    
                      | Can Snyk Detect JWT Security Issues? | 
                      Liran Tal | 
                      Mar 04, 2025 | 
                      1201 |  
                      - | 
                    
                    
                    
                      | The rising trend of malicious packages in open source ecosystems | 
                      Idan Digmi | 
                      Mar 23, 2023 | 
                      1000 |  
                      - | 
                    
                    
                    
                      | Learn about API security risks with the new Snyk Learn Learning Path | 
                      Michael Biocchi | 
                      Mar 06, 2025 | 
                      319 |  
                      - | 
                    
                    
                    
                      | Fetch the Flag CTF 2025 Community Writeups | 
                      Gina Fitzpatrick | 
                      Mar 05, 2025 | 
                      240 |  
                      - | 
                    
                    
                    
                      | Introducing Snyk Accelerate with Accenture | 
                      Taylor Buie | 
                      Jan 28, 2025 | 
                      880 |  
                      - | 
                    
                    
                    
                      | 6 Software Composition Analysis (SCA) best practices | 
                      Liran Tal | 
                      Apr 27, 2022 | 
                      1010 |  
                      - | 
                    
                    
                    
                      | AI Code Generation: Code Security & Quality, Benefits, Risks & Top Tools | 
                      Stephen Thoemmes | 
                      Mar 11, 2025 | 
                      1122 |  
                      - | 
                    
                    
                    
                      | Snyk and ServiceNow: Streamlining Vulnerability Management with ServiceNow VR Assignment Rules | 
                      Sarah Conway | 
                      Mar 12, 2025 | 
                      556 |  
                      - | 
                    
                    
                    
                      | DevSecOps Automation Framework | 
                      Ben Desjardins | 
                      Mar 11, 2025 | 
                      795 |  
                      - | 
                    
                    
                    
                      | Snyk Helps Secure the Golang Bento Project | 
                      Phill Garrett | 
                      Mar 12, 2025 | 
                      401 |  
                      - | 
                    
                    
                    
                      | AI Risk Management: Benefits, Challenges, and Best Practices | 
                      Stephen Thoemmes | 
                      Mar 13, 2025 | 
                      968 |  
                      - | 
                    
                    
                    
                      | Responding and remediating: Best practices for handling security alerts | 
                      Ben Desjardins | 
                      Mar 13, 2025 | 
                      874 |  
                      - | 
                    
                    
                    
                      | Building a Culture of Secure Coding: Empowering Developers to Build Resilient Software | 
                      Akanchha Shrivastava | 
                      Mar 18, 2025 | 
                      1499 |  
                      - | 
                    
                    
                    
                      | Unburdening Developers From Vulnerability Fatigue with Snyk Delta Findings | 
                      Liran Tal | 
                      Mar 18, 2025 | 
                      1337 |  
                      - | 
                    
                    
                    
                      | Reconstructing the TJ Actions Changed Files GitHub Actions Compromise | 
                      Micah Silverman | 
                      Mar 17, 2025 | 
                      2139 |  
                      - | 
                    
                    
                    
                      | Overcoming AppSec Challenges in FinServ: How CIBC Balances Speed, Security, and Compliance | 
                      Snyk Team | 
                      Mar 20, 2025 | 
                      523 |  
                      - | 
                    
                    
                    
                      | CVE-2025-29927 Authorization Bypass in Next.js Middleware | 
                      Liran Tal | 
                      Mar 23, 2025 | 
                      681 |  
                      - | 
                    
                    
                    
                      | What is a Data Poisoning Attack? | 
                      Stephen Thoemmes | 
                      Mar 25, 2025 | 
                      852 |  
                      - | 
                    
                    
                    
                      | Governance in DevSecOps: Measuring and Improving Security Outcomes | 
                      Ben Desjardins | 
                      Mar 27, 2025 | 
                      1053 |  
                      - | 
                    
                    
                    
                      | Get Off My Lawn and Fix Your Vulnerabilities! | 
                      Randall Degges | 
                      Apr 01, 2025 | 
                      816 |  
                      - | 
                    
                    
                    
                      | Q&A Session with Snyk & John Hammond: Your Fetch the Flag Questions, Answered | 
                      Gina Fitzpatrick | 
                      Apr 01, 2025 | 
                      733 |  
                      - | 
                    
                    
                    
                      | Snyk Security Solution Now Integrated into Google Cloud's Gemini Code Assist | 
                      Liqian Lim (林利蒨) | 
                      Apr 09, 2025 | 
                      1426 |  
                      - | 
                    
                    
                    
                      | Snyk’s Statement on the MITRE CVEs Program Funding Update | 
                      Danny Allan | 
                      Apr 16, 2025 | 
                      362 |  
                      - | 
                    
                    
                    
                      | Snyk Partners with Nova8 to Empower Secure Development Across Latin America | 
                      Michael Daniels | 
                      Apr 15, 2025 | 
                      735 |  
                      - | 
                    
                    
                    
                      | Snyk Ushers in the Future of DAST: AI-Driven Security for the Age of AI-Driven Development | 
                      Manoj Nair | 
                      Apr 22, 2025 | 
                      880 |  
                      - | 
                    
                    
                    
                      | Black Hat Asia 2025: My Journey as a Reviewer, Speaker & Community Connector | 
                      Vandana Verma Sehgal | 
                      Apr 28, 2025 | 
                      938 |  
                      - | 
                    
                    
                    
                      | Secure AI-Generated Code at Speed with Snyk and ServiceNow | 
                      Sarah Conway | 
                      May 01, 2025 | 
                      707 |  
                      - | 
                    
                    
                    
                      | Learn About Open Source Security Risks With the New Snyk Learn Learning Path | 
                      Michael Biocchi | 
                      May 05, 2025 | 
                      327 |  
                      - | 
                    
                    
                    
                      | Driving AI Security Innovation: Snyk Enhances Global Channel & GSI Partner Program | 
                      Cyndi Doyle | 
                      May 08, 2025 | 
                      606 |  
                      - | 
                    
                    
                    
                      | Security Testing for Single-Page Applications (SPAs) | 
                      Tiago Mendo | 
                      May 21, 2025 | 
                      995 |  
                      - | 
                    
                    
                    
                      | Snyk @ RSAC 2025 | 
                      Snyk Team | 
                      May 12, 2025 | 
                      686 |  
                      - | 
                    
                    
                    
                      | Snyk Report shows 88% of CISOs are concerned with current state of U.S. cyber readiness | 
                      Snyk Team | 
                      May 22, 2025 | 
                      873 |  
                      - | 
                    
                    
                    
                      | Snyk Learn in the Exosphere: Securing Space at HackSpaceCon | 
                      Michael Biocchi | 
                      May 23, 2025 | 
                      693 |  
                      - | 
                    
                    
                    
                      | Scaling Security Education with Snyk's New Learn Add-on | 
                      Michael Biocchi | 
                      May 29, 2025 | 
                      596 |  
                      - | 
                    
                    
                    
                      | AI Trust in Action: How Snyk Agent Redefines Secure Development | 
                      Brendan Hann | 
                      Jun 02, 2025 | 
                      1296 |  
                      - | 
                    
                    
                    
                      | Welcome to Snyk Labs: Charting the Course for AI-Native Security | 
                      Manoj Nair | 
                      May 28, 2025 | 
                      415 |  
                      - | 
                    
                    
                    
                      | AI Is Reshaping Software. Is Your Security Strategy Keeping Up? | 
                      Snyk Team | 
                      May 29, 2025 | 
                      906 |  
                      - | 
                    
                    
                    
                      | Introducing the Snyk AI Trust Platform | 
                      Brendan Hann | 
                      May 28, 2025 | 
                      1700 |  
                      - | 
                    
                    
                    
                      | Welcome-to-The New Era of AI-Driven Development | 
                      Snyk Team | 
                      May 29, 2025 | 
                      478 |  
                      - | 
                    
                    
                    
                      | From Risk to Resilience: Achieving HIPAA Standards in Your App | 
                      Tiago Mendo | 
                      Jun 04, 2025 | 
                      831 |  
                      - | 
                    
                    
                    
                      | The Future of Developer Upskilling Is Human-Led, AI-Supported | 
                      Kate Powers Burke | 
                      Jun 04, 2025 | 
                      912 |  
                      - | 
                    
                    
                    
                      | Humans at the Center: Redefining the Role of Developers in an AI-Powered Future | 
                      Snyk Team | 
                      Jun 05, 2025 | 
                      625 |  
                      - | 
                    
                    
                    
                      | Snyk for Government Achieves FedRAMP Moderate Authorization: A Milestone for Secure Government Software | 
                      Danny Allan | 
                      Jun 05, 2025 | 
                      683 |  
                      - | 
                    
                    
                    
                      | Transform Your AppSec Program With the Power of Snyk Analytics | 
                      Nastasha Casale | 
                      Jun 11, 2025 | 
                      1294 |  
                      - | 
                    
                    
                    
                      | Build Fast, Stay Secure: Guardrails for AI Coding Assistants | 
                      Ezra Tanzer | 
                      Jun 11, 2025 | 
                      1466 |  
                      - | 
                    
                    
                    
                      | Finding Software Flaws Early in the Development Process Provides Clear ROI | 
                      Nuno Loureiro | 
                      Jun 11, 2025 | 
                      771 |  
                      - | 
                    
                    
                    
                      | Why ANZ Technology Leaders Are Rethinking How AI, Speed, and Security Intersect | 
                      Lawrence Crowther | 
                      Jun 15, 2025 | 
                      892 |  
                      - |