Filter & Search

Cloud-Native Applications and Managing Their Dependencies

Learn how to manage dependencies in cloud-native applications efficiently. Explore best practices & tools to ensure & up-to-date software

Read More

Today’s Security Tidbit: An Encrypted JSON File Containing Malicious Code

Discover how encrypted JSON files are being used to hide malicious code. Learn about the latest security findings and how to protect your apps.

Read More

How to Conquer Remote Code Execution (RCE) in npm

Learn how to conquer Remote Code Execution (RCE) attacks in npm. Find out why npm is susceptible, the threats of RCE, and more.

Read More

How to Easily Update Node.js to the Latest Version

Learn how to easily update Node.js to the latest version on macOS, Linux, & Windows.

Read More

Update Docker Images & Containers To Latest Version

Learn how to efficiently update Docker images and containers to the latest version for improved security and performance.

Read More

Three Big Myths About Application Testing With SAST Tools

Discover the truth about Application Testing with SAST. Learn about common myths, integration, and reducing false positives for security.

Read More

Why and How You Should Automate Dependency Updates

Learn why automating dependency updates is crucial for software security and efficiency. Discovertools like to streamline the process.

Read More

A Brief Guide to Cloud-Native Applications, Technology, and Security 

A comprehensive guide to cloud-native applications, technology, and security. Learn about containers, microservices, CI/CD, and more.

Read More

Pride 2022: Supporting LGBTQ+ in Tech 

Celebrate Pride 2022 with Mend as we support LGBTQ+ in tech. Hear from employees on their experiences and advice for the tech workplace.

Read More

Six Steps to Achieve Zero Trust in Application Security

Discover six key steps to achieve zero trust in application security. Learn how to protect your organization from cyberattacks.

Read More

Single Author Uploaded 168 Packages to npm as Part of a Massive Dependency Confusion Attack

Discover how a single author uploaded 168 malicious npm packages in a dependency confusion attack. Learn how Mend blocked these threats.

Read More

3 Critical Best Practices of Software Supply Chain Security

Learn about the 3 critical best practices of software supply chain security to protect your organization from malicious packages.

Read More

3 New GitHub Features to Reinforce Your Code, Repo, and Dependency Security

Learn about the latest GitHub features to enhance your code security and dependency management. Stay ahead of vulnerabilities.

Read More

Cloud Security Architecture: A Practical Guide

Learn about Cloud Security Architecture. Understand the importance, core principles, and threats to secure your cloud environment effectively.

Read More

Introducing Mend Supply Chain Defender Integration with JFrog Artifactory

Discover how Mend Supply Chain Defender integrates with JFrog Artifactory to block malicious software threats in your code base.

Read More

From WhiteSource to Mend—A Rebrand Journey

From WhiteSource to Mend—A Rebrand Journey. Follow our evolution from open source to all code application security.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!