Blog Tiffany Jennings

Tiffany Jennings Head of Content

Tiffany Jennings is Head of Content at Mend.io. She oversees editorial strategy and thought leadership across Mend.io’s digital channels, bringing complex AppSec topics to life through creative storytelling, expert insights, and helping technology find its human voice.
OWASP Dependency Check: How Does It Work? - Blog OWASP Dependency Check

OWASP Dependency Check: How Does It Work?

Learn how OWASP Dependency Check helps secure open source components.

Read More
OWASP Dependency Check: How Does It Work? - Blog image Top Ten Tips to Choose a Great SAST Tool@2x

Top Ten Tips to Choose a Great SAST Tool

The top ten tips for choosing a SAST tool for application security. Integration, automation, and scalability are key factors to consider.

Read More
OWASP Dependency Check: How Does It Work? - Dynamic Application Security Testing DAST Basics 1

Dynamic Application Security Testing: DAST Basics

Learn about dynamic application security testing (DAST).

Read More
OWASP Dependency Check: How Does It Work? - Best AI Red Teaming Companies Top 10 Providers in 2025@2x

Best AI Red Teaming Companies: Top 10 Providers in 2025

AI Red Teaming companies help software and security teams to better understand how their AI application behaves under adversarial attacks.

Read More
OWASP Dependency Check: How Does It Work? - Mend Microsoft partnership post

Introducing Mend’s Integration with Microsoft Defender for Cloud

Mend.io now integrates with Microsoft Defender for Cloud, bringing intelligent open source security insights into cloud workflows.

Read More
OWASP Dependency Check: How Does It Work? - Mend and HeroDevs partnership

Mend.io & HeroDevs Partnership: Eliminate Risks in Deprecated Package

Announcing an exclusive partnership between Mend.io and HeroDevs to provide support for deprecated packages.

Read More
OWASP Dependency Check: How Does It Work? - mitre cve program uncertainty blog

MITRE CVE Program Uncertainty: Mend.io’s commitment to uninterrupted vulnerability protection

Mend.io continues to deliver uninterrupted, multi-source vulnerability protection.

Read More
OWASP Dependency Check: How Does It Work? - Introducing the value dashboard blog post

The Value Dashboard: Measure and Showcase Your Security Impact

Track, measure, and prove your AppSec impact with the Mend.io Value Dashboard.

Read More
OWASP Dependency Check: How Does It Work? - Mend AI Premium

Introducing Mend AI Premium

Robust AI governance and threat detection with Mend AI Premium.

Read More
OWASP Dependency Check: How Does It Work? - The Top 11 Web Vulnerability Scanners

The Top 11 Web Vulnerability Scanners

Discover the top 11 web vulnerability scanners and learn why they are essential for protecting your web applications from hackers.

Read More
OWASP Dependency Check: How Does It Work? - Jetbrains Partnership blog

Mend.io and JetBrains Partner to Bring Enhanced Code Security to Developers

Announcing a partnership between Mend.io and JetBrains for IDE and Qodana.

Read More
OWASP Dependency Check: How Does It Work? - Mend Renovate Enterprise Cloud launch blog

Mend Renovate Enterprise Cloud: Dependency Updates at Scale

Announcing the launch of our cloud-based solution for automated dependency updates.

Read More
OWASP Dependency Check: How Does It Work? - the Software Composition Analysis Software Landscape Q4 2024 post

Mend.io is a Strong Performer in the Forrester Waveβ„’ Software Composition Analysis, Q4 2024

See why Mend.io is recognized as a Strong Performer in The Forrester Waveβ„’ Software Composition Analysis (SCA) Q4 2024 report.

Read More
OWASP Dependency Check: How Does It Work? - iac blog

Infrastructure as Code: How It Works & Top Tools in 2025

Learn about Infrastructure as Code (IaC) best practices, benefits, and tools.

Read More
OWASP Dependency Check: How Does It Work? - Application Security The Complete Guide blog post

What Is Application Security? Types, Tools and Best Practices

Explore our application security complete guide and find key trends, testing methods, best practices, and tools to safeguard your software.

Read More
OWASP Dependency Check: How Does It Work? - big data sea

Bigger Data, Bigger Problems: Three Major Challenges in Big Data Security

Discover the challenges of big data security: data sources, infrastructure, and technology issues, and how to keep your big data secure.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!Β