Blog Tiffany Jennings

Tiffany Jennings Head of Content

Tiffany Jennings is Head of Content at Mend.io. She oversees editorial strategy and thought leadership across Mend.io’s digital channels, bringing complex AppSec topics to life through creative storytelling, expert insights, and helping technology find its human voice.
AI Code Review in 2025: Technologies, Challenges & Best Practices - AI Code Review

AI Code Review in 2025: Technologies, Challenges & Best Practices

Explore AI code review tools, challenges, and best practices.

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - Blog Mend AI Security Dashboard

Introducing Mend.io’s AI Security Dashboard: A Clear View into AI Risk

Discover Mend.io’s AI Security Dashboard.

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - Top Tools for Automating SBOMs

Top Tools for Automating SBOMs

Discover the top tools for automating SBOMs and how to create SBOMs effortlessly.

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - Why AI Security Tools Are Different and 9 Tools to Know in 2025@2x

Why AI Security Tools Are Different and 9 Tools to Know in 2025

Discover 9 AI security tools that protect data, models, and runtime.

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - Blog graphic Understanding Bias in Generative AI

Understanding Bias in Generative AI: Types, Causes & Consequences

Learn what bias in generative AI is, its causes, and consequences.

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - Blog graphic 58 Generative AI Statistics

58 Generative AI Statistics to Know in 2025

Explore 58 key generative AI stats for 2025.

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - SBOM Security 6 Key Components and Top 3 Use Cases

SBOM Security: 6 Key Components and Top 3 Use Cases

Discover 6 core components and 3 top use cases of SBOM security.

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - Blog graphic What is an AI BOM

What is an AI Bill of Materials (AI BOM)?

Learn how to create and automate an AI BOM.

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - Blog graphic Gen AI Security

What is Generative AI Security?

Learn what generative AI in cybersecurity is and how to secure against threats.

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - What Is A Software Bill of Materials SBOM 4 Critical Benefits

The Complete Guide to SBOM Software Bill of Materials

Learn how SBOMs improve transparency, security, and compliance.

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - Blog PR Forge

Introducing Mend Forge

Explore Mend Forgeβ€”Mend.io’s AI-native innovation engine

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - Blog cover Prompt hardening

What is AI system prompt hardening?

Learn how to protect AI apps with secure prompt hardening techniques.

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - Blog graphic Deploying Gen AI Guardrails@2x

Deploying Gen AI Guardrails for Compliance, Security and Trust

Explore AI guardrails for generative AI.

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - Blog graphic Patch Management

Why Patch Management is Important and How to Get It Right

Discover why patch management is one of the most critical and overlooked pillars of application security.

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - Blog What is Application Security Posture Management ASPM

What Is Application Security Posture Management (ASPM)?

Discover how ASPM improves risk visibility, reduces alert fatigue, and accelerates secure development.

Read More
AI Code Review in 2025: Technologies, Challenges & Best Practices - Blog image What is SCA @2x

What is Software Composition Analysis (SCA)?

Learn about Software Composition Analysis (SCA) and how it helps manage open source code to reduce security risks.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!Β