Blog Tiffany Jennings

Tiffany Jennings Head of Content

Tiffany Jennings is Head of Content at Mend.io. She oversees editorial strategy and thought leadership across Mend.io’s digital channels, bringing complex AppSec topics to life through creative storytelling, expert insights, and helping technology find its human voice.
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - what role should dependency management play as the regulation of the software supply chain escalates

What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates?

Discover the importance of dependency management in securing the software supply chain as regulations escalate.

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - 12 most exploited vulnerabilities

Are You Protected from the 12 Most Exploited Vulnerabilities?

Stay informed about the 12 most exploited vulnerabilities in 2022 & how to protect your software supply chain with AppSec tools and practices.

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - brandjacking

What Risks Do You Run from Brandjacking, and How Do You Overcome Them?

Learn about the risks of brandjacking & how to overcome them with application security tools & practices. Protect your org from cyber threats.

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - cybersecurity risks posed by typosquatting and how you can beat them

What Cybersecurity Risks Does Typosquatting Pose, and How Can You Beat Them?

Find out what typosquatting is, why it is such a threat, and what you can do to stop it.

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - why is software vulnerability patching crucial for your software and application security

Why is Software Vulnerability Patching Crucial for Your Software and Application Security?

Learn why software vulnerability patching is crucial for your software and application security. Discover best practices, challenges, and tools.

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - software supply chain compliance ensuring security and trust in your software and applications

Software Supply Chain Compliance: Ensuring Security and Trust in Your Software and Applications

Learn about software supply chain compliance and security to protect your organization from risks and ensure trust.

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - how does slsa help strengthen software supply chain security

How Does SLSA Help Strengthen Software Supply Chain Security?

Learn how SLSA enhances software supply chain security with levels of protection. Understand the risks, benefits, and best practices.

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - why you should avoid copy and paste code

Why You Should Avoid Copy and Paste Code

Discover why copying and pasting code can compromise your software’s security, quality, and compliance with licensing.

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - top 10 questions about the apache license blog

Top 10 Questions About the Apache License

Explore the Apache License terms and ensure compliance.

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - why is cybersecurity now a global governmental concern blog

Why is Cybersecurity Now a Global Governmental Concern?

What do Australia’s cybersecurity plans teach us all about the need for advanced application security?

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - poor application security health could kill you blog

Warning: Poor Application Security Health Could Kill You

Learn how poor application security can have deadly consequences in the healthcare sector. Discover the new FDA guidance and tools.

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - new eu cybersecurity regulation blog e1680808776743

Why the Need for Application Security Intensifies as EU Tightens Cybersecurity Requirements

Learn why the need for application security grows as the EU tightens cybersecurity requirements. Understand the impact on organizations.

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - ten women in tech who changed our world

Ten Women in Tech Who Changed Our World

Discover ten pioneering women in tech who changed the world. Learn about their visionary work and revolutionary outcomes.

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - how do fintech firms handle vulnerabilities like spring4shell e1679407541804

What Can Fintech Firms Do When Vulnerabilities Like Spring4Shell Hit Them?

Learn how the Fintech sector can tackle vulnerabilities like Spring4Shell with speed and efficiency using the Mend platform.

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - international womens day blog

Mend’s Women Lead the Way

Discover how Mend's talented women in tech are leading the way in application security and community. Insights, advice, and career highlights.

Read More
What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates? - finos report state of open source in financial services

FINOS: The State of Open Source in Financial Services

Explore the state of open source in financial services with FINOS. Discover key findings on adoption, benefits, challenges.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!Β 

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.