Mend.io AI Security

The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - Shadow MCP blog graphic

The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase

MCP adoption is surging across industries, fundamentally reshaping how systems connect to AI models.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - Red Teaming blog graphic

Why AI Red Teaming Is the Next Must-Have in Enterprise Security

Learn why red teaming is key to securing today’s enterprise AI systems.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - Blog image Red teaming providers 1

Best AI Red Teaming Providers: Top 5 Vendors in 2025

AI Red Teaming providers are specialized companies that simulate adversarial attacks on AI systems to uncover vulnerabilities, biases, and harmful behaviors before these systems are deployed.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - AI Red teaming Companies

Best AI Red Teaming Companies: Top 10 Providers in 2025

AI Red Teaming companies help software and security teams to better understand how their AI application behaves under adversarial attacks.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - Blog image Red teaming solutions 1

Top AI Red Teaming Solutions and How to Choose

Learn what AI red teaming solutions solve, how they work, and how to choose the right fit.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - Vector and embedding weakness blog post

Vector and Embedding Weaknesses in AI Systems

Learn how to secure embeddings against poisoning, leakage, and inversion attacks.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - AI governance blog post

AI Governance in AppSec: The More Things Change, The More They Stay the Same

Learn how AppSec teams can extend existing security and compliance practices seamlessly to AI.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - Mend AI Premium

Introducing Mend AI Premium

Robust AI governance and threat detection with Mend AI Premium.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - Securing AI and AI Security blog post

Securing AI vs AI for security: What are we talking about?

This post breaks down the differences between securing AI, secure AI use, AI for security, and AI safety.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - owasp top 10 llm application vulnerabilities

2025 OWASP Top 10 for LLM Applications: A Quick Guide

An overview of the top vulnerabilities affecting large language model (LLM) applications.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - All About RAG blog post

All About RAG: What It Is and How to Keep It Secure

Learn about retrieval-augmented generation, one complex AI system that developers are using.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - Blog shining a light on shadow AI

Shining a Light on Shadow AI: What It Is and How to Find It

Find out more about shadow AI and the risks of leaving it uncovered.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - blog AI and malicious packages

Hallucinated Packages, Malicious AI Models, and Insecure AI-Generated Code

Worried about attackers using AI models to write malicious code? Here are three other ways AI model use can lead to attacks.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - quick guide to popular AI licenses

Quick Guide to Popular AI Licenses

Not all "open" AI licenses are truly open source. Learn more about the most popular licenses on Hugging Face.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - guide to the RAIL family of AI licenses

Responsible AI Licenses (RAIL): Here’s What You Need to Know

Learn about this family of licenses that seek to limit harmful use of AI models.

Read More
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase - how do I protect my AI model blog

How Do I Protect My AI Model?

Learn essential strategies to secure your AI models from theft, denial of service, and other threats, covering copyright issues, risk management, and secure storage practices

Read More