Semgrep Video Library

Browse our library of on-demand videos, including testimonials, industry information, and tutorials.

All Videos
application-security

From Doubt to Direction: What AI Really Means for AppSec

application-security

Breaking the False Positive Cycle: How Semgrep Helps Security Engineers Move Faster

application-security

Menos ruido, más código seguro: IA + Semgrep para un SAST inteligente

application-security

From AI to Action: Fixing Vulnerabilities Faster with Semgrep in Cursor

Announcements

Semgrep Summer ‘25 Release Highlights

application-security

Assistant Memories Interactive Demo

secure-coding

Secure Vibe Coding: Real-Time AI Guardrails with Semgrep MCP

application-security

MCP: Model, Context… Propaganda? What security teams need to know about the latest hyped up AI tech

application-security

AI Meets AppSec: Real vs. Hype?

secure-coding

How to do Secure Code Review with Vibe Coding IDEs

community

Engineering a Safer Future at LaunchDarkly

best-practices

How Fintechs Can Balance Innovation and Compliance

community

Modern Security Podcast: Bridging Security & Productivity with Systems Thinking

security

Redefining Security Investment: SAST Scans and DFPM

Announcements

Semgrep RuleWriting 201

announcements

Semgrep Spring '25 Release Highlights

security

Tainted Love: A Deep Dive into Semgrep’s Taint Mode Workshop

community

The Modern Security Podcast: The Art of Secure Guardrails: Lessons from GitHub

community

Winning Friends & Influencing Developers with Sandesh Anand

announcements

See What We’re Unveiling at Black Hat—Before Anyone Else

secure-coding

Artificial Risks: AI, Games, and Threats

Announcements

Scaling SAST with AI – How esure Built Secure Development at Speed

application-security

Real-World AppSec: What Actually Works in Practice

announcements

EMEA: New Features – AI-powered Memories & Enterprise-ready Scanning

application-security

Privacy by Design: Making Threat Modeling Work for Data Protection

application-security

The End of Static Security: How Context-Aware AI Is Changing SAST Forever

security

Common Vulnerabilities in GitHub Actions - And How to Protect Against Them

best-practices

Empower Your Builders: A Fireside Chat on Practical AppSec

secure-coding

Vibe Coding, But Make it Safe

application-security

[LATAM webinar] Rewriting the Rules of Static Analysis with AI

best-practices

Top 5 Metrics for Effective Security Leadership

secure-coding

Coding Securely Doesn’t Have to Be Boring: A Fireside Chat with Laura Bell Main

application-security

EMEA: 10xing your AppSec Program with AI and LLMs

application-security

The False Positives That SAST Tools Always Flag

announcements

Exclusive Preview of RSA 2025

application-security

Ditch the Distractions: Adaptive Noise Canceling for Code Scanning

application-security

Remediating your vulnerability backlog at scale with AI

secure-coding

How to Build the Ideal Security Workflow for Developers

community

Clint Collabs: Netflix’s Scott Behrens on the Difficulty of Building a Useful Paved Road & Where to Start

secure-coding

The Rules - October Session

secure-coding

Secure Guardrails Fundamentals: External Entity Injection

community

Automating Secure Guardrails: Leveraging SAST and Other Tools for Effective Implementation

open-sources

Secure Open Source Dependencies with Semgrep Supply Chain

secure-coding

The Rules September

community

Best Practices and Innovations in Software Supply Chain Security

application-security

How to take a guardrails approach to SAST with Semgrep Code

secure-coding

Case of the common vulnerability? Secure guardrails can help!

secure-coding

The Rules

community

Collaborating with Development Teams: How to Successfully Implement and Enforce Secure Guardrails

best-practices

Skynet or WALL-E? How AI is changing work for Security teams

application-security

Securing Solo: Maximize Your AppSec Efficiency and Cut the Noise

best-practices

You Should Be Using AI for AppSec

best-practices

Clint Collabs: Jason Chan on the Origin of the Paved Road

community

Building a Successful Security Champions Program: What Does it Take?

open-sources

Software Supply Chain Security; More Than Just Dependencies

best-practices

Maturing Your Threat Modeling Skills

security

How we implemented inter-file analysis to find the vulnerabilities that matter

application-security

How Yext built a vulnerability management program from scratch using Semgrep

best-practices

Down with the CISO with Nathan Case, CISO of Corsha

security

Clint Collabs: Chris Hughes and Securing your Software Supply Chain

best-practices

Fireside Chat: Protecting Your Digital Security with Leigh Honeywell

best-practices

Application Security Is Eating Cloud Security for Lunch

open-sources

How Merge finds and fixes vulnerabilities that matter

application-security

Training 101: Intro to Pro Engine

application-security

Training 101: Intro to Semgrep Supply Chain

application-security

Training 201: Understanding Reachability on Github with Semgrep Supply Chain

application-security

Floating the goat: How to use DevSecOps to secure OWASP WebGoat

application-security

10xing your AppSec Program with AI and LLMs

secure-coding

A Practical Approach to Secure Guardrails

application-security

AI-Powered AppSec: Automating Prioritization, Triage, and Remediation

application-security

Boost Development with Semgrep Assistant: Your Personal AI Security Engineer

best-practices

CISO Perspectives: The Role of AI in Security & Compliance

best-practices

Fireside Chat: Burning Down Organizational Risk

community

Founder Friday: re:Invent Reflections and AI Predictions

application-security

From Code to Cloud: Build Securely at Scale - Powered by AWS & Semgrep

security

Going Beyond the Benchmarks: Detecting Real-World JavaScript Vulnerabilities at Scale with Semgrep

best-practices

Scaling Securely: How Fintechs Can Stay Ahead of Threats & Regulations

best-practices

How to Choose the Right SAST Solution: Practical Insights from Security Experts

community

How to Swim in The Ocean of SCA

application-security

Mastering Security Headers with Scott Helme & Tanya Janca

application-security

Static analysis + LLMs: Making shift left finally work

application-security

Using Artificial Intelligence, Safely

community

Who Makes the Rules?