Blog Amir Shahmiri

Amir Shahmiri

Senior Sales Engineer at Mend.io, specializing in application security and software supply chain risk.
- what is an AI BOM blog post

What is an AI Bill of Materials (AI BOM)?

Learn how to create and automate an AI BOM.

Read More
- Blog graphic Gen AI Security

What is Generative AI Security?

Learn what generative AI in cybersecurity is and how to secure against threats.

Read More
- blog a guide to standard SBOM formats

What Is A Software Bill of Materials (SBOM) & 4 Critical Benefits

Learn how SBOMs improve transparency, security, and compliance.

Read More
- Blog PR Forge

Introducing Mend Forge

Explore Mend Forge—Mend.io’s AI-native innovation engine

Read More
- Blog cover Prompt hardening

What is AI system prompt hardening?

Learn how to protect AI apps with secure prompt hardening techniques.

Read More
- Blog graphic Deploying Gen AI Guardrails@2x

Deploying Gen AI Guardrails for Compliance, Security and Trust

Explore AI guardrails for generative AI.

Read More
- Blog What is Application Security Posture Management ASPM

What Is Application Security Posture Management (ASPM)?

Discover how ASPM improves risk visibility, reduces alert fatigue, and accelerates secure development.

Read More
- Blog image What is SCA @2x

What is Software Composition Analysis (SCA)?

Learn about Software Composition Analysis (SCA) and how it helps manage open source code to reduce security risks.

Read More
- Blog image Prompt injection

What Is a Prompt Injection Attack? Types, Examples & Defenses

Learn what prompt injection attacks are and how to defend against 4 key types.

Read More
- Blog image SCA tools 1

Best Software Composition Analysis (SCA) Tools: Top 6 Solutions in 2025

Learn what SCA tools do and how they help secure your open source dependencies.

Read More
- Blog image AI Pen Testing

What Is AI Penetration Testing and 5 Techniques

Explore AI penetration testing and five essential techniques.

Read More
- Application Security The Complete Guide blog post 2048x1334.png

Best Application Security Testing Tools: Top 10 Tools in 2025

Learn how AST tools secure software and how to choose the right one.

Read More
- Blog Best SAST Solutions

Best SAST Solutions: How to Choose Between the Top 11 Tools in 2025

Explore the best SAST tools of 2025.

Read More
- Blog PR image Cursor Mend

Securing AI code at the source: Mend.io now integrates with Cursor AI Code Editor

Mend.io now integrates with Cursor to secure AI-generated code in real time

Read More
- Blog image Kubernetes Security Risks and Critical Best Practices@2x

Kubernetes Security Risks and Critical Best Practices

Learn about Kubernetes Security Best Practices, a crucial aspect of managing containerized workflows at scale.

Read More
- Linkedin AI Security 1

AI Security Guide: Protecting models, data, and systems from emerging threats

Learn how to protect AI systems with practical strategies and security frameworks.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!