{"id":3492,"date":"2022-01-18T00:23:10","date_gmt":"2022-01-18T00:23:10","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/"},"modified":"2022-01-18T00:23:10","modified_gmt":"2022-01-18T00:23:10","slug":"how-snyks-approach-to-application-security-remedies-shift-left-shortcomings","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/","title":{"rendered":"How Snyk&#8217;s approach to application security remedies shift-left shortcomings"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<br \/><img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2022\/01\/Liran-Tal-AWS-Startup-Showcase-CC-S2-E1.jpg\" \/><\/p>\n<div>\n<p>Software developers rarely have it easy. From writing, editing and pushing code to fixing the bugs and security issues that show up through production, the expectations most organizations have of their dev teams are immense.<\/p>\n<p>The \u201cshift-left\u201d approach was conceived to root out security problems at the earliest stage of development, but in some ways, it\u2019s added to the degree of complexities facing developers.<\/p>\n<p><span class=\"transcript-item inside-selection active\">\u201cThe landscape is changing, both developer and security;<\/span>\u00a0<span class=\"transcript-item inside-selection\">it\u2019s just not what it was before,\u201d said\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/talliran\/\">Liran Tal<\/a> (pictured), director of developer advocacy at Synk Ltd., a<\/span>\u00a0developer focused all-in-one\u00a0platform for securing code, dependencies, containers and infrastructure as code.\u00a0\u201cA<span class=\"transcript-item inside-selection\">nd what we\u2019re seeing is developers need to be empowered.<\/span>\u00a0<span class=\"transcript-item inside-selection\">They need some help,<\/span>\u00a0<span class=\"transcript-item inside-selection\">just working through all of those security issues,<\/span>\u00a0<span class=\"transcript-item inside-selection\">security incidents happening,<\/span>\u00a0<span class=\"transcript-item inside-selection\">using open-source, building cloud-native applications.\u201d<\/span><\/p>\n<p>The modern development arena is changing, and so a few mainstay practices don\u2019t quite apply as seamlessly as they used to. Proactivity is an element that\u2019s missing in the traditional shift-left process and is desperately needed in today\u2019s landscape, according to Tal.<\/p>\n<p><span style=\"font-weight: 400;\">Tal spoke with Lisa Martin, host of theCUBE, SiliconANGLE Media\u2019s livestreaming studio, in advance of the upcoming\u00a0<\/span><a href=\"https:\/\/aws.events.cube365.net\/startup\/s2e1\/content\/Videos\/HpauRJcnoa9MiaxjK?utm_source=siliconangle&amp;utm_medium=broadcast_page&amp;utm_campaign=preeventCCSnyk&amp;utm_id=aws_startups_showcase_s2e1\"><span style=\"font-weight: 400;\">AWS Startup Showcase: Open Cloud Innovations<\/span><\/a><span style=\"font-weight: 400;\"> event. They discussed the modern app security threat landscape and how devs can conveniently stay in front of any threats. <\/span><i><span style=\"font-weight: 400;\">(* Disclosure below.)<\/span><\/i><\/p>\n<h3>Easing developer frustration<\/h3>\n<p>Snyk\u2019s developer security platform funnels directly into\u00a0development tools, workflows and automation pipelines,\u00a0making it easy to spot vulnerabilities and security threats ahead of time, according to Tal, whose job is squarely focused on helping developers take full advantage of the platform\u2019s wealth of security and DevOps features.<\/p>\n<p><span class=\"transcript-item inside-selection active\">\u201cWhat we needed to do is basically<\/span>\u00a0<span class=\"transcript-item inside-selection\">put those developer security tools<\/span><span class=\"transcript-item inside-selection\">,<\/span>\u00a0<span class=\"transcript-item inside-selection\">which is what Snyk is building, this whole security platform\u201d into the developers\u2019 hands at the scale and speed required, Tal added. \u201cSo, for example, i<\/span>nstead<span class=\"transcript-item inside-selection\">\u00a0of just finding security issues<\/span>\u00a0<span class=\"transcript-item inside-selection\">in open-source dependencies \u2026 you<\/span>\u00a0can<span class=\"transcript-item inside-selection\">\u00a0actually open a pull request<\/span>\u00a0<span class=\"transcript-item inside-selection\">to your source codes version and management systems,\u201d Tal explained.<\/span><\/p>\n<p>Another part of Snyk\u2019s rapid response approach to detecting code vulnerabilities is embedding extensions within integrated development environments. In doing so, security issues and probable points of failure are detected the moment work is saved. This represents a sharp contrast to other application security testing tools that run in the background and give summarized reports after a set time duration. Snyk\u2019s approach is especially more valuable given the fact that developers today work with faster timelines than ever before and need to deploy quickly and constantly.<\/p>\n<p>In the end, the platform makes it such that developers don\u2019t have to be security experts. By showing them the detected vulnerabilities and providing the tools and knowledge to fix those issues, Snyk is actively making devs more efficient, Tal pointed out.<\/p>\n<p>In other aspects of bridging the security knowledge gap for developers, there are also knowledge resources made available to safeguard setups like complex databases from known vulnerabilities.<\/p>\n<p>\u201c<span class=\"transcript-item inside-selection active\">As a\u00a0 highlight, there\u2019s a myriad of references<\/span>\u00a0<span class=\"transcript-item inside-selection\">that provide users with things like the pull requests,<\/span><span class=\"transcript-item inside-selection\">\u00a0fix dates, or the issue with where the vulnerability was discussed.<\/span>\u00a0<span class=\"transcript-item inside-selection\">Having all this information at hand allows for better context as to\u00a0<\/span>w<span class=\"transcript-item inside-selection\">hat made the vulnerability happen,\u201d Tal stated.<\/span><\/p>\n<h3>Bringing developers and security experts into a team<\/h3>\n<p>The software development and security functions of an organization aren\u2019t rendered completely separate from each other anymore. Consequently, organizations must work toward \u201ccreating a more cohesive environment for both these kinds of expertise to synergize towards mitigating security issues,\u201d\u00a0according to Tal.<\/p>\n<p>Snyk has partnered with Amazon Web Services Inc. for years now. Thus, there is a wide range of integrations within the platform, from the source code editor to code commits and container registries.<\/p>\n<p>\u201c<span class=\"transcript-item inside-selection summary\">So at the end of the day, <\/span><span class=\"transcript-item inside-selection summary\">Snyk is there to help users out<\/span>\u00a0<span class=\"transcript-item inside-selection summary\">and make sure that if we find any <\/span><span class=\"transcript-item inside-selection summary\">potential issues,<\/span>\u00a0<span class=\"transcript-item inside-selection summary\">anything from licenses<\/span>\u00a0<span class=\"transcript-item inside-selection summary\">to container vulnerabilities or just <\/span><span class=\"transcript-item inside-selection summary\">open-source code, it\u2019s mitigated at the source,\u201d Tal explained.<\/span><\/p>\n<p>The recent Log4Shell vulnerability was found in the <a href=\"https:\/\/siliconangle.com\/2022\/01\/09\/critical-h2-database-console-vulnerability-shares-similarities-log4j\/\">Java library called Log4J<\/a>. Using its ecosystem of teams manually finding these recorded events and an autonomous intelligence platform, Snyk is made aware of such vulnerabilities through notifications on the Chatter\u00a0API.<\/p>\n<p>\u201c<span class=\"transcript-item inside-selection active\">And at that point, before it goes to CVE requirement<\/span>\u00a0<span class=\"transcript-item inside-selection\">and things like that \u2026<\/span>\u00a0<span class=\"transcript-item inside-selection\">we find vulnerabilities really fast and can add them to the database.<\/span>\u00a0<span class=\"transcript-item inside-selection summary\">In summary, this was what we did<\/span>\u00a0<span class=\"transcript-item inside-selection summary\">with Log4Shell,\u201d Tal stated.<\/span><\/p>\n<p>As part of Snyk\u2019s recent commitment to further reach and improve the <a href=\"https:\/\/siliconangle.com\/2020\/01\/22\/snyk-focuses-on-28-million-developers-to-address-the-application-security-challenge-cubeconversations\/\">experiences of 28 million devs worldwide<\/a>, the company has leaned heavily into the power of community and shared experiences. One example is its developer website, which is a community of security and coding professionals trying to learn from each other. Another is the company\u2019s new slew of developer events, one of which is titled \u201cThe Big Fix\u201d and slated to launch February 25.<\/p>\n<p><span style=\"font-weight: 400;\">Watch the complete video interview below, and be sure to check out more of SiliconANGLE\u2019s and theCUBE\u2019s coverage of the <\/span><a href=\"https:\/\/aws.events.cube365.net\/startup\/s2e1\/content\/Videos\/HpauRJcnoa9MiaxjK?utm_source=siliconangle&amp;utm_medium=broadcast_page&amp;utm_campaign=preeventCCSnyk&amp;utm_id=aws_startups_showcase_s2e1\"><span style=\"font-weight: 400;\">AWS Startup Showcase: Open Cloud Innovations<\/span><\/a><span style=\"font-weight: 400;\"> event.<\/span><i><span style=\"font-weight: 400;\"> (* Disclosure: Snyk Ltd. sponsored this segment of theCUBE. Neither Snyk nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)<\/span><\/i><\/p>\n<p><iframe loading=\"lazy\" title=\"Liran Tal, Synk | CUBE Conversation\" width=\"720\" height=\"405\" data-lazy=\"true\" data-src=\"https:\/\/www.youtube.com\/embed\/owNNCYLYfPw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h5>Photo: SiliconANGLE<\/h5>\n<div class=\"silic-after-content\" id=\"silic-849038136\">\n<hr style=\"border: 1px solid; color: #d8d8d8; height: 0px; margin-top: 20px;\"\/>\n<h3><span style=\"font-size: 16px;\">Show your support for our mission by joining our Cube Club and Cube Event Community of experts. Join the community that includes Amazon Web Services and Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger and many more luminaries and experts.<\/span><\/h3>\n<\/div><\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/siliconangle.com\/2022\/01\/17\/snyks-approach-application-security-remedies-shift-left-shortcomings-awsshowcases2e1\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Software developers rarely have it easy. From writing, editing and pushing code to fixing the bugs and security issues that show up through production, the&#8230;<\/p>\n","protected":false},"author":1,"featured_media":3493,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-3492","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Snyk&#039;s approach to application security remedies shift-left shortcomings - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Snyk&#039;s approach to application security remedies shift-left shortcomings - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-18T00:23:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/Liran-Tal-AWS-Startup-Showcase-CC-S2-E1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/18\\\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/18\\\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"How Snyk&#8217;s approach to application security remedies shift-left shortcomings\",\"datePublished\":\"2022-01-18T00:23:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/18\\\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\\\/\"},\"wordCount\":955,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/18\\\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Liran-Tal-AWS-Startup-Showcase-CC-S2-E1.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/18\\\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/18\\\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/18\\\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\\\/\",\"name\":\"How Snyk's approach to application security remedies shift-left shortcomings - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/18\\\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/18\\\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Liran-Tal-AWS-Startup-Showcase-CC-S2-E1.jpg\",\"datePublished\":\"2022-01-18T00:23:10+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/18\\\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/18\\\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/18\\\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Liran-Tal-AWS-Startup-Showcase-CC-S2-E1.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Liran-Tal-AWS-Startup-Showcase-CC-S2-E1.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/01\\\/18\\\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Snyk&#8217;s approach to application security remedies shift-left shortcomings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Snyk's approach to application security remedies shift-left shortcomings - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/","og_locale":"en_US","og_type":"article","og_title":"How Snyk's approach to application security remedies shift-left shortcomings - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2022-01-18T00:23:10+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/Liran-Tal-AWS-Startup-Showcase-CC-S2-E1.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"How Snyk&#8217;s approach to application security remedies shift-left shortcomings","datePublished":"2022-01-18T00:23:10+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/"},"wordCount":955,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/Liran-Tal-AWS-Startup-Showcase-CC-S2-E1.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/","url":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/","name":"How Snyk's approach to application security remedies shift-left shortcomings - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/Liran-Tal-AWS-Startup-Showcase-CC-S2-E1.jpg","datePublished":"2022-01-18T00:23:10+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/Liran-Tal-AWS-Startup-Showcase-CC-S2-E1.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/Liran-Tal-AWS-Startup-Showcase-CC-S2-E1.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/01\/18\/how-snyks-approach-to-application-security-remedies-shift-left-shortcomings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"How Snyk&#8217;s approach to application security remedies shift-left shortcomings"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/3492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=3492"}],"version-history":[{"count":0,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/3492\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/3493"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=3492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=3492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=3492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}