Mend.io Application Security

Vulnerability Remediation: A Practical Guide - Vulnerability Remediation A Practical Guide

Vulnerability Remediation: A Practical Guide

Practical guide to vulnerability remediation for developers & security teams. Learn how to detect, prioritize, fix, & monitor vulnerabilities.

Read More
Vulnerability Remediation: A Practical Guide - What is the NIST Supply Chain Risk Management Program

What is the NIST Supply Chain Risk Management Program?

Discover the NIST Supply Chain Risk Management Program.. Learn how to manage cybersecurity risks in digital supply chains effectively.

Read More
Vulnerability Remediation: A Practical Guide - Blog Why Vulnerability Management Must Go Beyond CVSS to Priority Scoring

Why Vulnerability Management Must Go Beyond CVSS to Priority Scoring

Learn why vulnerability management must go beyond CVSS to priority scoring for better open source security and remediation prioritization.

Read More
Vulnerability Remediation: A Practical Guide - news AWS target

AWS Targeted by a Package Backfill Attack

Discover how AWS was targeted by a malicious package backfill attack, the methods used by attackers, and how to protect against such attacks.

Read More
Vulnerability Remediation: A Practical Guide - Blog image 2 Assessment Tools

5 Vulnerability Assessment Scanning Tools: 5 Solutions Compared

Discover the top 5 vulnerability assessment scanning tools and learn how to prioritize and remediate vulnerabilities to secure your org.

Read More
Vulnerability Remediation: A Practical Guide - spring4shell best practices

Get the Response to Spring4Shell Right: Best Practices for Immediate Remediation

Learn best practices for immediate remediation of the Spring4Shell vulnerability, including detection, and prioritization.

Read More
Vulnerability Remediation: A Practical Guide -

Spring4Shell Zero-Day Vulnerability: Information and Remediation for CVE-2022-22965

Learn about the Spring4Shell Zero-Day Vulnerability CVE-2022-22965 with information, updates, mitigation guidance, and more.

Read More
Vulnerability Remediation: A Practical Guide - Set a benchmark of false positives with SAST tools

How To Set A Benchmark Of False Positives With SAST Tools

Learn how to set benchmarks for false positives in SAST tools to enhance application security and improve developer efficiency.

Read More
Vulnerability Remediation: A Practical Guide - blog how to address SAST false positives in application security testing

How To Address SAST False Positives In Application Security Testing

Address SAST false positives in your application security testing. Explore causes, preventive measures, and the benefits of using Mend SAST.

Read More
Vulnerability Remediation: A Practical Guide - SAST blogs banners blog image

SAST vs. SCA: 7 Key Differences

Discover the 7 key differences between SAST and SCA tools in application security. Learn how they integrate into the SDLC process.

Read More
Vulnerability Remediation: A Practical Guide - SAST blog hero

Mend SAST: The Next Generation of Application Security

Learn about our innovative approach to detecting and remediating custom code vulnerabilities for a more secure future.

Read More
Vulnerability Remediation: A Practical Guide - Five Critically Important Facts About npm Package Security

Five Critically Important Facts About npm Package Security

Learn about the five critical facts about npm package security, including how attackers exploit trust, default behaviors, and dependency hell.

Read More
Vulnerability Remediation: A Practical Guide - CVE 2021 44142 Vulnerability 2

CVE-2021-44142: Vulnerability in Samba Enables Bad Actors to Execute Arbitrary Code as Root

CVE-2021-44142 allows bad actors to execute arbitrary code as root on Samba. Learn about the vulnerability, exploit, and how to fix it.

Read More
Vulnerability Remediation: A Practical Guide - CVE 2021 4034 pwnkit

CVE-2021-4034: A Walkthrough of Pwnkit — the Latest Linux Privileges Escalation Vulnerability

Dive into CVE-2021-4034 PwnKit vulnerability: learn how a simple out-of-bounds access in Linux's pkexec can lead to root system privileges.

Read More
Vulnerability Remediation: A Practical Guide - Chief Scientists series featured

Best Practices for Dealing With Log4j

Learn best practices for dealing with Log4j vulnerabilities, prevent future risks by sanitizing user input, and secure your App with our tips.

Read More
Vulnerability Remediation: A Practical Guide - Log4j CVEs images 44832

CVE-2021-44832: A New Medium Severity Vulnerability Was Found in Log4j

Learn about CVE-2021-44832 in Log4j and how to protect your applications. Stay informed about the latest cybersecurity vulnerabilities.

Read More

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.