Filter & Search

Mend.io & HeroDevs Partnership: Eliminate Risks in Deprecated Package

Announcing an exclusive partnership between Mend.io and HeroDevs to provide support for deprecated packages.

Read More

All About RAG: What It Is and How to Keep It Secure

Learn about retrieval-augmented generation, one complex AI system that developers are using.

Read More

Vital Signs of Software Dependencies: Understanding Package Health

Learn how package health data empowers developers to update safely and efficiently.

Read More

Cybersecurity Awareness Month: AI Safety for Friends and Family

This blog is for your friends and family working outside of the security and technical industries.

Read More

Don’t Treat DAST Like Dessert

DAST is an essential part of a nutritious application security diet—not just a once-a-quarter treat.

Read More

The Power of Platform-Native Consolidation in Application Security

Streamline workflows, consolidate data, boost security posture, and empower developers to focus on innovation.

Read More

What is the KEV Catalog?

A quick guide to the Known Exploited Vulnerabilities (KEV) catalog.

Read More

Application Security — The Complete Guide

Explore our application security complete guide and find key trends, testing methods, best practices, and tools to safeguard your software.

Read More

Introducing the Mend AppSec Platform

The Mend AppSec platform offers customers everything needed to build proactive application security through one solution, at one price.

Read More

ASPM and Modern Application Security

Gartner’s 2024 Hype Cycle for Application Security: ASPM moves from peak to trough.

Read More

Shining a Light on Shadow AI: What It Is and How to Find It

Find out more about shadow AI and the risks of leaving it uncovered.

Read More

Black Hat 2024: AI, AI, and Everything Else

Chris Lindsey shares his takeaways from another exciting Black Hat conference

Read More

Dude, Where’s My Documentation?

When the zero day hits the fan, can you find the information you need?

Read More

Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification

Explore LLMs in cybersecurity research: analyzing vulnerability data, sifting through CVE information, and enhancing digital safety.

Read More

A Guide to Open Source Software

Learn more about how organizations can use open source software to innovate while minimizing risk.

Read More

SAST – All About Static Application Security Testing

Learn about Static Application Security Testing (SAST). Understand the importance, benefits, & how to choose the right SAST tool for your org.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!