Introducing the Mend AppSec Platform

The Mend AppSec platform offers customers everything needed to build proactive application security through one solution, at one price.

Read More

ASPM and Modern Application Security

Gartner’s 2024 Hype Cycle for Application Security: ASPM moves from peak to trough.

Read More

Shining a Light on Shadow AI: What It Is and How to Find It

Find out more about shadow AI and the risks of leaving it uncovered.

Read More

Black Hat 2024: AI, AI, and Everything Else

Chris Lindsey shares his takeaways from another exciting Black Hat conference

Read More

Dude, Where’s My Documentation?

When the zero day hits the fan, can you find the information you need?

Read More

Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification

Learn more about how organizations can use open source software to innovate while minimizing risk.

Read More

A Guide to Open Source Software

Learn more about how organizations can use open source software to innovate while minimizing risk.

Read More

SAST – All About Static Application Security Testing

Learn about Static Application Security Testing (SAST). Understand the importance, benefits, & how to choose the right SAST tool for your org.

Read More

Dependency Management: Protecting Your Code

Learn how to protect your application’s code with dependency management, and why automation is critical for effective dependency updates.

Read More

More than 100K sites impacted by Polyfill supply chain attack

The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.

Read More

Dependency Management vs Dependency Updates: What’s the Difference?

Keeping dependencies up to date is a big part of dependency management, but it’s not everything. Learn more about the differences between the two.

Read More

Hallucinated Packages, Malicious AI Models, and Insecure AI-Generated Code

Worried about attackers using AI models to write malicious code? Here are three other ways AI model use can lead to attacks.

Read More

Quick Guide to Popular AI Licenses

Not all “open” AI licenses are truly open source. Learn more about the most popular licenses on Hugging Face.

Read More

NVD Update: Help Has Arrived

There’s hope yet for the world’s most beleaguered vulnerability database.

Read More

Threat Hunting 101: Five Common Threats to Look For

Learn more about supply chain threats and where to find them.

Read More

Responsible AI Licenses (RAIL): Here’s What You Need to Know

Learn about this family of licenses that seek to limit harmful use of AI models.

Read More
1 2 3 4 30
Next

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!