Blog Tiffany Jennings

Tiffany Jennings Head of Content

Tiffany Jennings is Head of Content at Mend.io. She oversees editorial strategy and thought leadership across Mend.io’s digital channels, bringing complex AppSec topics to life through creative storytelling, expert insights, and helping technology find its human voice.
All About Open Source Attribution Reports -

All About Open Source Attribution Reports

Learn all about open source attribution reports and how they help ensure compliance with open source licenses.

Read More
All About Open Source Attribution Reports -

3 Essential Steps for Vulnerability Remediation Process

Master vulnerability remediation with our 3-step guide. Find out how to identify, prioritize, and fix vulnerabilities.

Read More
All About Open Source Attribution Reports -

All About IAST β€” Interactive Application Security Testing

Learn all about Interactive Application Security Testing (IAST). Understand how IAST compares to SAST and DAST, its pros and cons.

Read More
All About Open Source Attribution Reports - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViNDRhZWE0YWM2NWIuanBnJnZlcnNpb249MDAwMCZzaWc9ZWY3NGE3Zjk3Yzk2NWY5ZWJmZGQzMzA3M2I1OTEwODA

Best Practices for Open Source Governance

Learn best practices for open source governance to manage risks, avoid vulnerabilities, and ensure compliance.

Read More
All About Open Source Attribution Reports - internet of things

IoT Application Security

Learn about the importance of IoT application security and the risks associated with vulnerabilities.

Read More
All About Open Source Attribution Reports - Whens the Right Time for an Open Source Audit

When’s the Right Time for an Open Source Audit?

Learn about the importance of open source audits to gain visibility, compliance, and security. Understand when and why you need an audit.

Read More
All About Open Source Attribution Reports - itemeditorimage 5b321692d95bf

3 Key Considerations for DevOps Automation

Learn about the 3 key considerations for DevOps automation. Understand the importance of automation tools in achieving agile goals.

Read More
All About Open Source Attribution Reports -

Software Development Life Cycle: Finding a Model That Works

Learn about different software development life cycle models like Waterfall, Agile, and Hybrid.

Read More
All About Open Source Attribution Reports - Secure Coding A Practical Guide

Secure Coding: A Practical Guide

Learn about the importance of secure coding in software development. Discover practical tips and principles to ensure your code is secure.

Read More
All About Open Source Attribution Reports - scanners2

Advance From Open Source Code Scanner to Software Composition Analysis Solution

Discover why it's essential to advance from open source code scanners to software composition analysis solutions. Learn about the pitfalls of outdated scanners and the benefits of modern tools.

Read More
All About Open Source Attribution Reports - 100 Million Court Case For Open Source License Compliance post

The $100 Million Court Case for Open Source License Compliance

Discover the $100 million court case for open source license compliance between CoKinetic Systems and Panasonic.

Read More
All About Open Source Attribution Reports - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlY2U2NjEwYzViM2UucG5nJnZlcnNpb249MDAwMCZzaWc9ZDY2MTY1NjRjYzRhZTA3OWFmNGM4MmVmZThlMTk5NzI

Forrester’s State of Application Security, 2020: Key Takeaways

Discover Forrester’s key findings on application security in 2020. Learn why app vulnerabilities are a major threat and how to strengthen your security practices.

Read More
All About Open Source Attribution Reports - gdpr

How Does GDPR Impact Open Source Security Expectations?

Learn about how GDPR impacts open source security expectations and the importance of using automated Software Composition Analysis tools to ensure compliance and protect user data.

Read More
All About Open Source Attribution Reports - devsecops vs secdevops post

DevSecOps vs. SecDevOps: A Rose by Any Other Name?

Explore the difference between DevSecOps and SecDevOps. Learn how security practices have evolved in the software development life cycle.

Read More
All About Open Source Attribution Reports -

May Open Source Security Vulnerabilities Snapshot

Stay up to date with May's open source security vulnerabilities. Learn about common vulnerabilities, severity breakdown, and more.

Read More
All About Open Source Attribution Reports - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjZDE0NjZmOGJjODIuanBnJnZlcnNpb249MDAwMCZzaWc9ZTZkMjA1NDBkNmE5NDAyZGY4ZGQ5MjdiZmU2YWZiM2I

Top Tools and Tips to Improve Your DevOps Pipeline

Discover top tools and tips to enhance your DevOps pipeline. Learn about CI/CD, security, and automation for successful software development.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!Β 

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.