A Brief Guide To Cloud-Native Applications, Tech, And Security 

A Brief Guide to Cloud-Native Applications, Technology, and Security 

A comprehensive guide to cloud-native applications, technology, and security. Learn about containers, microservices, CI/CD, and more.

Six Steps To Achieve Zero Trust In Application Security

Six Steps to Achieve Zero Trust in Application Security

Discover six key steps to achieve zero trust in application security. Learn how to protect your organization from cyberattacks.

PSingle Author Uploaded 168 Packages To NPM

Single Author Uploaded 168 Packages to npm as Part of a Massive Dependency Confusion Attack

Discover how a single author uploaded 168 malicious npm packages in a dependency confusion attack. Learn how Mend blocked these threats.

Cloud Security Architecture: A Practical Guide

Cloud Security Architecture: A Practical Guide

Learn about Cloud Security Architecture. Understand the importance, core principles, and threats to secure your cloud environment effectively.

Whitesource Is Now Mend: You Code, We Cure

From WhiteSource to Mend—A Rebrand Journey

From WhiteSource to Mend—A Rebrand Journey. Follow our evolution from open source to all code application security.

Whitesource Is Now Mend: You Code, We Cure

WhiteSource is Now Mend: You Code, We Cure

Mend, formerly WhiteSource, focuses on automating application security with a remediation-first approach for open source and custom code.

Vulnerability Remediation: A Practical Guide

Vulnerability Remediation: A Practical Guide

Practical guide to vulnerability remediation for developers & security teams. Learn how to detect, prioritize, fix, & monitor vulnerabilities.

What Is The NIST Supply Chain Risk Management Program?

What is the NIST Supply Chain Risk Management Program?

Discover the NIST Supply Chain Risk Management Program.. Learn how to manage cybersecurity risks in digital supply chains effectively.

Vulnerability Management - Go Beyond CVSS To Priority Scoring

Why Vulnerability Management Must Go Beyond CVSS to Priority Scoring

Learn why vulnerability management must go beyond CVSS to priority scoring for better open source security and remediation prioritization.

AWS Targeted By A Package Backfill Attack

AWS Targeted by a Package Backfill Attack

Discover how AWS was targeted by a malicious package backfill attack, the methods used by attackers, and how to protect against such attacks.

5 Vulnerability Assessment Tools To Get You Started

5 Vulnerability Assessment Scanning Tools: 5 Solutions Compared

Discover the top 5 vulnerability assessment scanning tools and learn how to prioritize and remediate vulnerabilities to secure your org.

Best Practices For Immediate Remediation With Spring4Shell

Get the Response to Spring4Shell Right: Best Practices for Immediate Remediation

Learn best practices for immediate remediation of the Spring4Shell vulnerability, including detection, and prioritization.

CVE-2022-22965: Spring4Shell Zero-Day Vulnerability

Spring4Shell Zero-Day Vulnerability: Information and Remediation for CVE-2022-22965

Learn about the Spring4Shell Zero-Day Vulnerability CVE-2022-22965 with information, updates, mitigation guidance, and more.

Determining A Benchmark Of False Positives With SAST Tools

How To Set A Benchmark Of False Positives With SAST Tools

Learn how to set benchmarks for false positives in SAST tools to enhance application security and improve developer efficiency.

Best SAST Tools: Top 7 Solutions Compared

Best SAST Tools: Top 7 Solutions Compared

Discover the top 7 Static Application Security Testing (SAST) Tools compared in this blog post. Learn about features, pricing, & languages.

How To Address SAST False Positives In Application Security Testing

Address SAST false positives in your application security testing. Explore causes, preventive measures, and the benefits of using Mend SAST.