Filter & Search

What are Malicious Packages? How Do They Work?

Learn about malicious packages, how they work, and the growing threat they pose to software supply chains.

Read More

A Guide to Standard SBOM Formats

Discover the importance of Software Bill of Materials (SBOM) and compare the three main formats – SPDX, CycloneDX, and SWID.

Read More

RSA Conference 2023: Key Takeaways From Our Five Favorite Sessions

RSA 2023 takeaways, including sessions on supply chain security, translating security for the board, & the psychology of DevSecOps.

Read More

Why is Cybersecurity Now a Global Governmental Concern?

What do Australia’s cybersecurity plans teach us all about the need for advanced application security?

Read More

Optimizing AppSec by Enhancing Integration with Jira

Enhance your AppSec by integrating with Jira. Learn how Mend’s new Jira Security integration can streamline your security processes.

Read More

Mend.io Achieves AWS Security Competency Status

Mend.io achieves AWS Security Competency status, demonstrating expertise in cloud security. Trusted partner with specialized software for AWS

Read More

Deceptive ‘Vibranced’ npm Package Discovered Masquerading as Popular ‘Colors’ Package

Discover the threat of the ‘Vibranced’ npm package masquerading as ‘Colors’. Learn about its stages of execution, obfuscation techniques.

Read More

Warning: Poor Application Security Health Could Kill You

Learn how poor application security can have deadly consequences in the healthcare sector. Discover the new FDA guidance and tools.

Read More

Why the Need for Application Security Intensifies as EU Tightens Cybersecurity Requirements

Learn why the need for application security grows as the EU tightens cybersecurity requirements. Understand the impact on organizations.

Read More

Why You Should Scan Your Applications in the Repository

Learn why scanning applications in the repository is crucial for application security. Shift left to detect and fix vulnerabilities.

Read More

Ten Women in Tech Who Changed Our World

Discover ten pioneering women in tech who changed the world. Learn about their visionary work and revolutionary outcomes.

Read More

The Shift to the Cloud and its Implications for Application Security

Learn about the implications of shifting applications to the cloud on application security. Understand the shared responsibility.

Read More

What Can Fintech Firms Do When Vulnerabilities Like Spring4Shell Hit Them?

Learn how the Fintech sector can tackle vulnerabilities like Spring4Shell with speed and efficiency using the Mend platform.

Read More

The Five Key Principles of Modern Application Security

Discover the key principles of modern application security. Learn how to secure your software and protect against evolving threats.

Read More

Kubernetes Security Best Practices

Learn about Kubernetes Security Best Practices, a crucial aspect of managing containerized workflows at scale.

Read More

Mend’s Women Lead the Way

Discover how Mend’s talented women in tech are leading the way in application security and community. Insights, advice, and career highlights.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!