Mend.io Application Security

You can’t rely on open source for security β€” not even when AI is involved - Blog Cover Open Source Security with AI

You can’t rely on open source for security β€” not even when AI is involved

Learn how to manage OSS risk and build remediation that actually lands.

Read More
You can’t rely on open source for security β€” not even when AI is involved - Blog BlackDuck SAST

Understanding Black Duck SAST: Pros/Cons and Technical Architecture

A detailed review of Black Duck SAST plus a Mend SAST alternative.

Read More
You can’t rely on open source for security β€” not even when AI is involved - Blog BlackDuck SCA

Black Duck SCA: Pros/Cons, Architecture, and Quick Tutorial

A detailed review of Black Duck SCA plus a Mend SCA alternative.

Read More
You can’t rely on open source for security β€” not even when AI is involved - Blog Veracode SAST

Understanding Veracode SAST: Pros/Cons, Architecture, and Pricing

A detailed review of Veracode SAST plus a Mend SAST alternative.

Read More
You can’t rely on open source for security β€” not even when AI is involved - Blog Veracode SCA

Veracode SCA Solution Overview: Features, Limitations, and Tutorial

A detailed review of Veracode SCA plus a Mend SCA alternative.

Read More
You can’t rely on open source for security β€” not even when AI is involved - Announcement post Azi Cohen

Mend Leadership Update: Building on Our Momentum for the Next Phase of Growth

An update on Mend.io's leadership as we enter the next phase of growth.

Read More
You can’t rely on open source for security β€” not even when AI is involved - ServiceNow Blog Featured image

Why AppSec and Network Risk Management Must Be Unified in the Modern Enterprise

See how Mend.io’s ServiceNow integration unifies application, network, and operational risk.

Read More
You can’t rely on open source for security β€” not even when AI is involved - blog post npm fake font packages

NPM User Flooding Registry with Fake Font Packages

Analysis of an npm account flooding the registry with malformed font packages.

Read More
You can’t rely on open source for security β€” not even when AI is involved - Blog critical CVE 2025 55182

From Zero to RCE: How a Single HTTP Request Compromises React and Next.js Applications

Discover a critical security flaw that enables remote code execution in React Server Components.

Read More
You can’t rely on open source for security β€” not even when AI is involved - Mend Wiz integration graphic

Mend.io + Wiz: A New Code-to-Cloud Integration for Accurate, Context-Driven Risk Prioritization

See how Mend.io and Wiz deliver true code-to-cloud visibility.

Read More
You can’t rely on open source for security β€” not even when AI is involved - Blog cover Top 7 AST providers post 1

Best Application Security Testing Providers: Top 7 in 2025

Discover how AST providers help teams find and fix vulnerabilities.

Read More
You can’t rely on open source for security β€” not even when AI is involved - Blog Zero day Shai hulud V2

Shai-Hulud: The Second Coming

See how the latest Shai-Hulud attack works.

Read More
You can’t rely on open source for security β€” not even when AI is involved - Best SAST Tools Top 10 Solutions in 2025

Best SAST tools: Top 10 solutions in 2025

Explore the top 10 SAST tools of 2025.

Read More
You can’t rely on open source for security β€” not even when AI is involved - Blog banner Risk Reduction Dashboard 2

AppSec metrics fail, Mend.io’s Risk Reduction Dashboard fixes it

See how Mend.io's Risk Reduction Dashboard works.

Read More
You can’t rely on open source for security β€” not even when AI is involved - Best Application Security Testing providers

Best Application Security Testing Services to Know

Discover the best Application Security Testing (AST) services in 2025.

Read More
You can’t rely on open source for security β€” not even when AI is involved - Open Source Security post

Ultimate Guide to Open Source Security: Risks, Attacks & Defenses

Explore top risks and proven open source security strategies.

Read More

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.