Mend.io Application Security

The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Featured image The EU Cyber Resilience Act 1000x650

The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond

Everything companies need to know about EU CRA compliance before 2027.

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Blog Best SAST Solutions

Best SAST Solutions: How to Choose Between the Top 12 Tools in 2026

Compare 12 top SAST tools of 2026 and find the right fit for your team.

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Blog Zero day Visibility 1000x650

From Panic to Playbook: Modernizing Zero‑Day Response in AppSec

Learn how AppSec teams build a repeatable zero-day response workflow.

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - SAST All About Static Application Security Testing post

What Is SAST – Static Application Security Testing

Learn about Static Application Security Testing (SAST).

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Blog image SCA tools 1

Best Software Composition Analysis (SCA) Tools: Top Solutions in 2026

Learn what SCA tools do and how they help secure your open source dependencies.

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Blog PROJECT GLASSWING 1000x650

Anthropic’s Project Glasswing: How Claude Mythos is Changing the Rules for AppSec

See what AI-powered offense means for your AppSec & AI Security program.

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Docker Hardened Images integration

Container Security Without Context Is Just More Noise

Smarter container security with Docker Hardened Images.

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Blog cover Poisoned Axios

Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install

See how the attack works, what to look for, and how to remediate.

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Blog cover TEAM PCP part 3

Famous Telnyx Pypi Package compromised by TeamPCP

See how the attack works, what to look for, and how to remediate.

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Blog cover TEAM PCP attack V2

TeamPCP Supply Chain Attack Part 2: LiteLLM PyPI Credential Stealer

Check and fix your install for the new LiteLLM PyPI compromise.

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Blog cover CanisterWorm

CanisterWorm: The Self-Spreading npm Attack That Uses a Decentralized Server to Stay Alive

Deep dive into the self-spreading CanisterWorm.

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Blog Mend Partnership Expansion 1000x650

Mend.io Expands Its Global Infrastructure with a Dedicated Cloud Region in India

Local cloud infrastructure in India for data residency requirements.

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Blog Application Security Testing Solutions 1000x650

Best Application Security Testing Solutions: Top 12 in 2026

Compare SAST, DAST, IAST, and SCA solutions.

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Blog Claude code security

Why Claude Code Security Is a Big Moment for Application Security

Discover why enterprise scale requires more than just AI code review - it requires governance.

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Blog Veracode competitors

Top 7 Veracode Competitors in 2026

Explore the top Veracode competitors in 2026.

Read More
The EU Cyber Resilience Act: A Complete Compliance Guide for 2026 and Beyond - Blog Cover Open Source Security with AI

You can’t rely on open source for security β€” not even when AI is involved

Learn how to manage OSS risk and build remediation that actually lands.

Read More