Blog Tiffany Jennings

Tiffany Jennings Head of Content

Tiffany Jennings is Head of Content at Mend.io. She oversees editorial strategy and thought leadership across Mend.io’s digital channels, bringing complex AppSec topics to life through creative storytelling, expert insights, and helping technology find its human voice.
Penetration Testing β€” A Detailed Guide - Artboard 57

Penetration Testing β€” A Detailed Guide

Learn about the importance of penetration testing in securing your web applications. Find vulnerabilities before attackers exploit them.

Read More
Penetration Testing β€” A Detailed Guide - Cloud Security Blog

Cloud Computing Security: A Primer

Learn about cloud computing security, challenges, and best practices. Stay ahead of cybersecurity threats with expert advice from Mend.io.

Read More
Penetration Testing β€” A Detailed Guide - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkMGI0MjYyODFhOGEuanBnJnZlcnNpb249MDAwMCZzaWc9MzBlYjYyNzZkZmY0ZmRlYmUzNTU4N2QwMWY2NzIyMDE

Patch Management Best Practices

TLearn about patch management best practices to protect your organization from vulnerabilities. Follow these eight practices.

Read More
Penetration Testing β€” A Detailed Guide - Pride Blog 01 1

Celebrating Pride: LGBTQ+ Open Source Projects and Programs We Love

Celebrate Pride with Mend's favorite LGBTQ+ open source projects and programs. Join the movement for equality & inclusivity in tech comunity

Read More
Penetration Testing β€” A Detailed Guide - Maven Vulnerability blog 1

Research Shows Over 100,000 Libraries Affected By Maven Vulnerability CVE-2021-26291

Research reveals over 100,000 libraries affected by Maven vulnerability CVE-2021-26291. Learn about the risks, fixes, and implications.

Read More
Penetration Testing β€” A Detailed Guide - I LOVE SECURITY 1

5 Steps to Get Your Developers to Care More About Security

Learn how to bridge the gap between developers and security with these 5 steps. Make security a top priority.

Read More
Penetration Testing β€” A Detailed Guide - itemeditorimage 5b21100e36577

9 Best DevSecOps Tools To Integrate Throughout The DevOps Pipeline

Discover the 9 best DevSecOps tools to integrate into your DevOps pipeline. Learn how these tools can help you automate security, & more.

Read More
Penetration Testing β€” A Detailed Guide - Docker vs Kubernetes Detailed Comparison blog

Docker Vs. Kubernetes: A Detailed Comparison

A detailed comparison of Docker vs. Kubernetes, explaining their differences and similarities. Learn how they complement each other.

Read More
Penetration Testing β€” A Detailed Guide - technical due diligence checklist

Top Tips for Technical Due Diligence Process

Review our top tips for technical due diligence process including architecture, people, processes, IP, and roadmap.

Read More
Penetration Testing β€” A Detailed Guide -

Open Source License Comparison: Connecting and Contrasting The Dots

Delve into the world of open source license comparison. Learn about permissive vs. copyleft licenses, limitations, permissions, and more.

Read More
Penetration Testing β€” A Detailed Guide - Supply chian executive order

Biden’s Cybersecurity Executive Order Focuses on Supply Chain Attacks

Learn about Biden's Cybersecurity Executive Order focused on supply chain attacks & how Mend can help developers create more secure software.

Read More
Penetration Testing β€” A Detailed Guide - Dependencies blin spot

Why Open Source Dependencies Are Your Blind Spot?

Discover why open source dependencies can be a blind spot for developers. Learn how to gain control and visibility over your dependencies.

Read More
Penetration Testing β€” A Detailed Guide - Artboard 1 copy

Reducing Enterprise AppSec Risks: Ponemon Report Key Takeaways

Reduce Enterprise AppSec risks with key takeaways from the Ponemon Report. Learn why application layer security is crucial and more.

Read More
Penetration Testing β€” A Detailed Guide - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViYzcyYmQyYmZhNmYuanBnJnZlcnNpb249MDAwMCZzaWc9OWMwOGVlODVjMDcyMjU2OTI0M2M3YTlmNjRhYjdjODk

Open Source Vulnerabilities Overview: Apache Struts vs. Spring

Learn about the open source vulnerabilities in Apache Struts and Spring frameworks, their handling of security issues, and how to manage them.

Read More
Penetration Testing β€” A Detailed Guide - supply chain management1 1

Overcoming Software Supply Chain Risk

Discover how to overcome software supply chain risk in the development landscape. Gain control and visibility over your software components.

Read More
Penetration Testing β€” A Detailed Guide - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMDRiNGFhZWQzYTQucG5nJnZlcnNpb249MDAwMCZzaWc9ZGU0NWFjMjI0Mjc1MGNiZmNlZmE2MzAzZDNiZGE2NTk

How To Secure Your SDLC The Right Way

Learn how to secure your software development life cycle (SDLC). Discover the importance of integrating security throughout the SDLC.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!Β