Articles by Tag #applicationsecurity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

280+ Leaky Skills: How OpenClaw & ClawHub Are Exposing API Keys and PII

Discover how 7.1% of AI agent skills are designed to leak secrets, PII, and API keys through LLM context. Learn to defend with Evo & mcp-scan.

Learn More 15 1Feb 6

Modern Web Authentication Security: JWT, Cookies, CSRF, and Common Developer Mistakes

A practical guide to understanding authentication security - what breaks, why it breaks, and how...

Learn More 0 0Dec 21 '25

Snyk and uv, Better Together

Snyk and uv have teamed up to provide high-performance package management with native security for Python-based AI development. Build, install, and secure your AI-native applications from inception with Snyk’s native support for the uv ecosystem.

Learn More 0 0Feb 25

OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

Application Layer security through the lens of mythic architecture—where intention becomes action and...

Learn More 0 0Jan 8

Agentic Container Security with Snyk MCP Server

Learn how Snyk's MCP server brings agentic security to container workflows. Automate vulnerability scanning and base image recommendations directly within your AI-powered IDE.

Learn More 2 0Aug 14 '25

50+ Common Web Application Vulnerabilities Explained

Modern organizations increasingly rely on cloud-based platforms to deliver seamless digital...

Learn More 9 1Jan 11

Snyk for Government Achieves FedRAMP Moderate Authorization: A Milestone for Secure Government Software

Snyk for Government is our FedRAMP Moderate authorized solution for the public sector. This authorization underscores our unwavering commitment to providing secure development solutions that meet the rigorous standards of the Federal Risk and Authorization Management Program (FedRAMP).

Learn More 0 2Jun 7 '25

The Hidden Costs of False Positives in Healthtech Security

Explore strategies to reduce false positives and enhance healthtech security with Snyk’s AI-powered platform. Increase efficiency and protect sensitive data effectively.

Learn More 0 0Aug 6 '25

Minimizing False Positives: Enhancing Security Efficiency

Discover how enhanced security tools reduce false positives and streamline threat detection for more effective cybersecurity management.

Learn More 0 0Jul 3 '25

Understanding Application Security: Best Practices, Common Threats, and Essential Tools

In today's digital world, securing applications is more important than ever. With cyber threats on...

Learn More 0 0Apr 23 '25

Finding Software Flaws Early in the Development Process Provides Clear ROI

The Consortium for Information and Software Quality estimated that the cost of poor software quality in the United States reached $2.41 trillion in 2022. As we will show, it makes sense that the cost of poor software quality is so high. It’s also completely avoidable, and software flaws must be avoided with the world’s increased dependency on software.

Learn More 0 1Jun 13 '25

Colonel Clustered: Finding Outliers in Burp Intruder

Colonel Clustered is a newly released Burp Suite extension designed to enhance the analysis of HTTP...

Learn More 0 0Jan 21

JWT in Mobile Apps: 5 Mistakes That Lead to Account Takeover

JWTs are widely used in mobile apps for authentication — but architectural misuse of JWTs remains one...

Learn More 0 0Feb 23

API Key Management Best Practices for Developer Teams

Discover essential API key management best practices to secure your applications, prevent data breaches, and streamline development workflows. Learn how to protect your digital assets effectively.

Learn More 0 0Feb 17

Mastering Automated Vulnerability Scanning for Your CI/CD Pipeline

Discover how to seamlessly integrate automated vulnerability scanning into your CI/CD pipeline to enhance security, catch flaws early, and accelerate development cycles.

Learn More 0 0Feb 17

Ethical Hacking: Securing Your Applications in the Age of Cybercrime

In today's digital landscape, where cybercrime is on the rise, securing your applications has never...

Learn More 0 0Feb 16

SafeDev Talk on Compliance

Security isn’t just about fixing bugs; it’s about proving you’re compliant. Join us for a free talk...

Learn More 0 0Jul 11 '25

Understanding Application Security Best Practices for Protecting Your Website in 2025

In today's digital age, application security is critical for protecting your website and user data...

Learn More 0 0Oct 13 '25

How to Balance Speed and Security in Low-Code Application Development?

Low-code platforms are innovative yet compromise security owing to speed. Over 65% of application...

Learn More 0 0Nov 12 '25

How VAPT Enables Effective Bug Fixing — And How Visibility Drives Trust

In today’s digital-first world, software bugs are no longer just development issues—they are...

Learn More 0 0Dec 17 '25

Building a Security-First Development Workflow with AI

Discover how to integrate AI into your development process to build a robust, security-first workflow. Learn about AI-powered tools for threat modeling, code analysis, and incident response.

Learn More 0 0Feb 17

Why Automated Triage and Remediation Is Critical for Modern AppSec

Modern application security programs generate an overwhelming volume of findings across code,...

Learn More 0 0Dec 31 '25