Blog Tiffany Jennings

Tiffany Jennings Head of Content

Tiffany Jennings is Head of Content at Mend.io. She oversees editorial strategy and thought leadership across Mend.io’s digital channels, bringing complex AppSec topics to life through creative storytelling, expert insights, and helping technology find its human voice.
Security Automation: Where Does It Fit In Your Secure SDLC? -

Security Automation: Where Does It Fit In Your Secure SDLC?

Discover the importance of security automation in your Secure SDLC. Learn how to use automated tools to enhance your software development.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkMjcyNDM5Y2IwMzcuanBnJnZlcnNpb249MDAwMCZzaWc9MjM3OWRmZWE0ZTU0ZDFkMDJkZmUyOWNmNDcyNjg2MjU3D

Introducing Mend Advise for IntelliJ IDEA

Discover Mend Advise for IntelliJ IDEA, a new tool for developers to identify and manage vulnerabilities in open source components.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? -

Top 5 Go Vulnerabilities That You Should Know

Discover the top 5 vulnerabilities in Google's Go programming language that developers should be aware of to secure their products.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? -

Top 5 New Open Source Security Vulnerabilities in May 2019

The top 5 new open source security vulnerabilities in May 2019, including SQLite, Symfony, Linux kernel, fstream, and ecstatic.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? -

Docker Container Monitoring: Protect Your Investment

Learn how to effectively monitor Docker containers to protect your investment. Understand the challenges, what to monitor, and tools.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjZDE2Yjg1NjQ5ZWUuanBnJnZlcnNpb249MDAwMCZzaWc9MjRkNWUyMzEwZTZiZWVhZWZkZDFjZGE0MzNiNDY3NGY3D

Top 5 Open Source Vulnerabilities for April 2019

The top 5 open source vulnerabilities for April 2019. From Apache Tomcat to Kubernetes, be proactive with your vulnerability management.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjYzEzNDRkNWQzY2IuanBnJnZlcnNpb249MDAwMCZzaWc9N2YwNThlOWE2ZjNmMmQyNGRhNzVhODI2NjU4NWRkYWI

Key Takeaways from Stack Overflow’s 2019 Developer Survey

Key takeaways from Stack Overflow's 2019 Developer Survey, including popular programming languages, tools, and industry trends.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? -

How the Heartbleed Vulnerability Shaped OpenSSL as We Know It

Discover how the Heartbleed vulnerability shaped OpenSSL, leading to investment in open source projects and a shift in community mindset.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? - Is One Programming Language More Secure Than The Rest

Is One Programming Language More Secure Than The Rest?

Discover which programming language is the most secure. Find out how popular languages measure up in terms of security.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjNzdiZDMyNDVhYjAuanBnJnZlcnNpb249MDAwMCZzaWc9NTViMWVlZTEyM2YyNTIyMmQ5ZDlkNjQzMzU5ZTJhNDU

Top 5 Docker Vulnerabilities You Should Know

Learn about the top 5 Docker vulnerabilities that could put your product at risk. Stay informed and secure your containers with these tips.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjNmE3OWJkMDc3ZjguanBnJnZlcnNpb249MDAwMCZzaWc9N2U2ZWYyNTI1Njk2YThjZTNmNjU0MTQ5ZmVjN2JlMzg

Experience over Best Practices- Interview with CyberArk’s WhiteHat Hacker Len Noe

Interview with CyberArk’s WhiteHat Hacker Len Noe. Learn how hackers switch to become white hat hackers for the public good.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? -

3 Crucial Tips for Smarter Container Security Scanning

Discover smarter container security scanning & improve your security by signing images, avoiding root access, and vulnerability scans.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjNDgyMjdiMWU1ZDMuanBnJnZlcnNpb249MDAwMCZzaWc9OTdhYjFiZmQ0MGJlZjA4OWIyYjRjNTc0OGIyZmE5ZWM3D

SweetAlert2 β€” Mend’s Open Source Project of the Month for January 2019

Explore Mend's SweetAlert2. Learn how this customizable, responsive, and accessible tool can enhance your development process.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? -

SecOps: How Security and Operation Teams Can Work Better Together

Learn how Security and Operations teams can work better together in the DevSecOps era. Tips for implementing SecOps.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjMzcwMDllNzdiNmIuanBnJnZlcnNpb249MDAwMCZzaWc9OWE4NjZhYzM3ZWY1ODI5MWZiZjhkMWE3ZmVhYTM2OTc

Top 10 New Open Source Security Vulnerabilities in 2018

Discover the top 10 new open source security vulnerabilities in 2018, including Linux Kernel, Drupal, AngularJS, and more.

Read More
Security Automation: Where Does It Fit In Your Secure SDLC? - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjMzMyYzhjYjQyZmQuanBnJnZlcnNpb249MDAwMCZzaWc9MTBhNThjZjY0OTk4M2RkNGM3YmNkNjZkYjM0YmE2ZTA

Sometimes A Vulnerability Isn’t So Vulnerable

Discover how sometimes a vulnerability isn't as big of a threat as you may think. Learn about effective vs ineffective vulnerabilities.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!Β