Blog Tiffany Jennings

Tiffany Jennings Head of Content

Tiffany Jennings is Head of Content at Mend.io. She oversees editorial strategy and thought leadership across Mend.io’s digital channels, bringing complex AppSec topics to life through creative storytelling, expert insights, and helping technology find its human voice.
3 Critical Best Practices of Software Supply Chain Security - blog blog image

3 Critical Best Practices of Software Supply Chain Security

Learn about the 3 critical best practices of software supply chain security to protect your organization from malicious packages.

Read More
3 Critical Best Practices of Software Supply Chain Security - cloud architecture security

Cloud Security Architecture: A Practical Guide

Learn about Cloud Security Architecture. Understand the importance, core principles, and threats to secure your cloud environment effectively.

Read More
3 Critical Best Practices of Software Supply Chain Security - Integration of Diffend via Artifactory plugin

Introducing Mend Supply Chain Defender Integration with JFrog Artifactory

Discover how Mend Supply Chain Defender integrates with JFrog Artifactory to block malicious software threats in your code base.

Read More
3 Critical Best Practices of Software Supply Chain Security - Brand Announce navy 1920 1080 scaled 1

From WhiteSource to Mendβ€”A Rebrand Journey

From WhiteSource to Mendβ€”A Rebrand Journey. Follow our evolution from open source to all code application security.

Read More
3 Critical Best Practices of Software Supply Chain Security - Vulnerability Remediation A Practical Guide

Vulnerability Remediation: A Practical Guide

Practical guide to vulnerability remediation for developers & security teams. Learn how to detect, prioritize, fix, & monitor vulnerabilities.

Read More
3 Critical Best Practices of Software Supply Chain Security - What is the NIST Supply Chain Risk Management Program

What is the NIST Supply Chain Risk Management Program?

Discover the NIST Supply Chain Risk Management Program.. Learn how to manage cybersecurity risks in digital supply chains effectively.

Read More
3 Critical Best Practices of Software Supply Chain Security - Blog Why Vulnerability Management Must Go Beyond CVSS to Priority Scoring

Why Vulnerability Management Must Go Beyond CVSS to Priority Scoring

Learn why vulnerability management must go beyond CVSS to priority scoring for better open source security and remediation prioritization.

Read More
3 Critical Best Practices of Software Supply Chain Security - Blog image 2 Assessment Tools

5 Vulnerability Assessment Scanning Tools: 5 Solutions Compared

Discover the top 5 vulnerability assessment scanning tools and learn how to prioritize and remediate vulnerabilities to secure your org.

Read More
3 Critical Best Practices of Software Supply Chain Security - spring4shell best practices

Get the Response to Spring4Shell Right: Best Practices for Immediate Remediation

Learn best practices for immediate remediation of the Spring4Shell vulnerability, including detection, and prioritization.

Read More
3 Critical Best Practices of Software Supply Chain Security -

Spring4Shell Zero-Day Vulnerability: Information and Remediation for CVE-2022-22965

Learn about the Spring4Shell Zero-Day Vulnerability CVE-2022-22965 with information, updates, mitigation guidance, and more.

Read More
3 Critical Best Practices of Software Supply Chain Security - Set a benchmark of false positives with SAST tools

How To Set A Benchmark Of False Positives With SAST Tools

Learn how to set benchmarks for false positives in SAST tools to enhance application security and improve developer efficiency.

Read More
3 Critical Best Practices of Software Supply Chain Security - SAST blogs banners blog image

SAST vs. SCA: 7 Key Differences

Discover the 7 key differences between SAST and SCA tools in application security.

Read More
3 Critical Best Practices of Software Supply Chain Security - CVE 2021 44142 Vulnerability 2

CVE-2021-44142: Vulnerability in Samba Enables Bad Actors to Execute Arbitrary Code as Root

CVE-2021-44142 allows bad actors to execute arbitrary code as root on Samba. Learn about the vulnerability, exploit, and how to fix it.

Read More
3 Critical Best Practices of Software Supply Chain Security - CVE 2021 4034 pwnkit

CVE-2021-4034: A Walkthrough of Pwnkit β€” the Latest Linux Privileges Escalation Vulnerability

Dive into CVE-2021-4034 PwnKit vulnerability: learn how a simple out-of-bounds access in Linux's pkexec can lead to root system privileges.

Read More
3 Critical Best Practices of Software Supply Chain Security - top open source licenses explained post

Open Source Licenses Trends and Predictions

Open source licenses in 2022. Permissive licenses are on the rise, while copyleft licenses like GPL are decreasing in popularity.

Read More
3 Critical Best Practices of Software Supply Chain Security - Chief Scientists series featured

Best Practices for Dealing With Log4j

Learn best practices for dealing with Log4j vulnerabilities, prevent future risks by sanitizing user input, and secure your App with our tips.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!Β