Blog Tiffany Jennings

Tiffany Jennings Head of Content

Tiffany Jennings is Head of Content at Mend.io. She oversees editorial strategy and thought leadership across Mend.io’s digital channels, bringing complex AppSec topics to life through creative storytelling, expert insights, and helping technology find its human voice.
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - securing the software supply chain mend open source risk report

Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report

Discover key findings from the Mend Open Source Risk Report on securing the software supply chain. Watch the webinar for more insights.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - CI CD and the promise of agile transformation

CI/CD and the Promise of Agile Transformation

Discover how CI/CD drives agile transformation in software development. Learn about continuous integration, delivery, and best practices.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - open source license management tools

Open Source License Management Tools: Features and Best Practices

Learn about the best practices and key features of open source license management tools. Stay compliant with legal requirements.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - building a modern application security strategy part 2

Building a Modern AppSec Strategy: How to Secure Applications

Learn how to build a modern AppSec strategy to secure applications in the face of evolving threats. Explore tactics, trends, and best practices.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - docker container security challenges and best practices post

Docker Container Security: Challenges and Best Practices

Learn about the challenges and best practices of securing Docker containers, and why securing containers is vital for application security.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - Building a Modern Application Security Strategy

Building a Modern Application Security Strategy. Part One: Threats, Opportunities, and Challenges

Building a modern application security strategy is crucial in today's threat landscape. Learn about threats, opportunities, and challenges.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - large Blog 3

Why Open Source License Management Matters

Learn why open source license management is crucial for businesses in the face of rising vulnerabilities and cyber threats.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - large blog hero

Everything You Need to Know About Application Security Best Practices

Learn the top 10 application security best practices to protect your software from vulnerabilities and attacks. Ensure your apps are secure.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - Untitled 1

Shift-Left Testing and Its Benefits

Learn about the benefits of shift-left testing in software development, including improved security, efficiency, and cost savings.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - aws blog

Integrating Dependency Management Into Cloud Services: The Mend-AWS Partnership

Discover how Mend partners with AWS to integrate dependency management into cloud services, reducing vulnerabilities.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - devops blog post

Why Your DevOps Platform Needs a Security Partner to Safeguard Your Software

Learn why your DevOps platform needs a security partner to safeguard your software. Mend.io provides application security and DevSecOps.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - DevSecOps A Comprehensive Guide to Securely Managing Your DevOps Workflow

DevSecOps: A Comprehensive Guide to Securely Managing Your DevOps Workflow

Get to know all about DevSecOps and the main tools and practices that organizations should adopt in order to implement a DevSecOps pipeline.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - big blog post

Top Three User Priorities for Software Composition Analysis

Discover the top three user priorities for Software Composition Analysis including application security, DevSecOps, and license compliance.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - blog post

A Rash of Recent CVEs in Go

Discover the recent CVEs affecting Go programming language and their impact on popular applications like Docker and Kubernetes.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - 1000x650 Blog Image

Vulnerability Research: Here’s How it Works at Mend.ioΒ 

Discover how vulnerability research works at Mend, a focus on open source vulnerabilities and different methods to protect against threats.

Read More
Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report - The six golden rules for you to follow to improve your software and application security 2

Six Golden Rules for Software and Application Security

Learn the six golden rules for software and application security.. Stay safe during Cybersecurity Awareness Month 2022!

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!Β 

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.