Blog Tiffany Jennings

Tiffany Jennings Head of Content

Tiffany Jennings is Head of Content at Mend.io. She oversees editorial strategy and thought leadership across Mend.io’s digital channels, bringing complex AppSec topics to life through creative storytelling, expert insights, and helping technology find its human voice.
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - Cursor Incident

Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident

Cursor’s Composer 2 identified as Moonshot’s Kimi K2.5 exposing an AI governance gap.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - Blog AI driven project classification

Introducing AI-powered Contextual Project Classification: From severity scores to business risk

Find your most sensitive code and prioritize fixes.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - System Prompt Weakness Detection blog post

Introducing System Prompt Hardening: production-ready protection for system prompts

Secure your AI applications with system prompt hardening.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - Blog AI compliance

AI Compliance: 5 Key Frameworks, Challenges, and Best Practices

Discover how to manage bias, privacy, and shadow AI risks.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - Blog AI Risk Management

AI Risk Management: Process, Frameworks, and 5 Mitigation Methods

Learn how to identify, assess, and mitigate AI risks.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - Blog best software composition analysis providers

Best Software Composition Analysis Providers: Top 5 in 2026

Explore key features of leading SCA providers.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - Blog AI security testing

AI Security Testing: Threats, Approaches, and Defenses in 2026

Explore AI security testing methods.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - Blog Top 10 Open Source Vulnerabilities

Top Open Source Vulnerabilities In 2026

Discover the top open source vulnerabilities in 2026.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - Blog BlackDuck SAST

Understanding Black Duck SAST: Pros/Cons and Technical Architecture

A detailed review of Black Duck SAST plus a Mend SAST alternative.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - Blog cover AI Security Maturity Checklist

Introducing Mend.io’s AI Security Maturity Survey + Compliance Checklist available today

A new tool to help security teams quantify AI risk and prepare for 2026 regulations.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - Blog best software composition analysis enterprise

Best Software Composition Analysis for Enterprise: Top 8 in 2026

Explore this guide to the best software composition analysis tools for large teams.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - LLM Red Teaming Blog Image

LLM Red Teaming: Threats, Testing Process & Best Practices

A practical guide to LLM red teaming.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - Blog BlackDuck SCA

Black Duck SCA: Pros/Cons, Architecture, and Quick Tutorial

A detailed review of Black Duck SCA plus a Mend SCA alternative.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - automated Red Teaming

Automated Red Teaming: Capabilities, Pros/Cons, and Latest Trends

Learn how automated red teaming simulates cyberattacks at scale.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - Blog Veracode SAST

Understanding Veracode SAST: Pros/Cons, Architecture, and Pricing

A detailed review of Veracode SAST plus a Mend SAST alternative.

Read More
Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident - Blog Veracode SCA

Veracode SCA Solution Overview: Features, Limitations, and Tutorial

A detailed review of Veracode SCA plus a Mend SCA alternative.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!Β 

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.