Mend.io Application Security

The 10 Best Security Conferences to Attend in 2021 - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmZjZkYTAxNmE5OTUuanBnJnZlcnNpb249MDAwMCZzaWc9NDA0OTg1MWQ1NDU5ODg5ODhlMDY2MWRjZDkwMzdhYzQ

The 10 Best Security Conferences to Attend in 2021

Discover the top 10 security conferences to attend in 2021, whether in-person or virtually.

Read More
The 10 Best Security Conferences to Attend in 2021 -

Top 10 Open Source Vulnerabilities In 2020

Discover the top 10 open source vulnerabilities in 2020, including Lodash, Jackson-databind, HtmlUnit, and more.

Read More
The 10 Best Security Conferences to Attend in 2021 -

What You Need To Know About Application Security Testing Orchestration

Discover the importance of Appsec Testing Orchestration in the evolving security threat landscape. Learn how to manage tools effectively.

Read More
The 10 Best Security Conferences to Attend in 2021 - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViZjU0MjhkM2Q3ZTIuanBnJnZlcnNpb249MDAwMCZzaWc9ZjJhODZkNDNjOTNlNDE1YmU0NDNiZjYzYjE5MjkyOGI

Apache Struts Vulnerabilities Pose ‘Stay or Go’ Question

Stay informed about the latest Apache Struts vulnerabilities and the ongoing debate of whether to continue using the framework or migrate off it.

Read More
The 10 Best Security Conferences to Attend in 2021 - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkY2Q0OWViYzNjYmYucG5nJnZlcnNpb249MDAwMCZzaWc9NzRjMDIzMjE1OGYzZWY2ZjA2YWM5YjA5YzliZDZjZmI

What Is CVSS v3.1? Understanding The New CVSS

Learn about the Common Vulnerability Scoring System (CVSS) v3.1 & how it measures severity, not risk, in assessing security vulnerabilities.

Read More
The 10 Best Security Conferences to Attend in 2021 -

White Box Testing Guide

Learn about White Box Testing in software development with this comprehensive guide. Understand the types, techniques, tools, advantages.

Read More
The 10 Best Security Conferences to Attend in 2021 - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmOTljM2JhYTI3ZjMucG5nJnZlcnNpb249MDAwMCZzaWc9MzVkYWU4MjE4YjIyNmJkNzI5OGJjMGFjYmY2ZTQzOTg

Top Tips for Getting Started With a Software Composition Analysis Solution

Top tips for starting with a software composition analysis solution. Build a team, set goals beyond scanning, understand the data model, make policies work, start small.

Read More
The 10 Best Security Conferences to Attend in 2021 - Vulnerability Prioritization Image blog

Be Wise — Prioritize: Software Security Vulnerability Prioritization

Learn how to prioritize software security vulnerabilities effectively to ensure your team is addressing the most urgent threats first.

Read More
The 10 Best Security Conferences to Attend in 2021 - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmNmM2YTg2YjQ0NDMucG5nJnZlcnNpb249MDAwMCZzaWc9ZDAwMjkwYmY5ZWRiMGZiZmM3OGFjMGZiZjJlNDUwOGM

Black Box Testing: What You Need to Know

Learn all about black box testing in application security & quality assurance. Discover techniques, & tools and more.

Read More
The 10 Best Security Conferences to Attend in 2021 - Top 7 Questions to Ask When Evaluating a SCA Solution

Top 7 Questions to Ask When Evaluating a Software Composition Analysis Solution

Discover the top 7 questions to ask when evaluating a Software Composition Analysis solution for managing open source components.

Read More
The 10 Best Security Conferences to Attend in 2021 - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmNWEwYWFjMjEzMjUucG5nJnZlcnNpb249MDAwMCZzaWc9ZTQ3NDVjY2VhZTk4ZTI1MGFhMDA3YzAwYjEwMzVkZDU

Top 9 Code Review Tools for Clean and Secure Source Code

Discover the top 9 code review tools for clean and secure source code, essential for detecting errors and defects before production.

Read More
The 10 Best Security Conferences to Attend in 2021 - Gota track them all

Open Source Vulnerability Databases

Discover the top open source vulnerability databases beyond NVD. Learn how to track and remediate vulnerabilities in your software.

Read More
The 10 Best Security Conferences to Attend in 2021 -

Why You Need an Open Source Vulnerability Scanner

Learn why you need an open source vulnerability scanner to protect your applications from cyber attacks.

Read More
The 10 Best Security Conferences to Attend in 2021 -

The SaaS Loophole in GPL Open Source Licenses

Discover the SaaS loophole in GPL open source licenses and how it affects software distribution. Learn about the AGPL solution.

Read More
The 10 Best Security Conferences to Attend in 2021 -

3 Essential Steps for Vulnerability Remediation Process

Master vulnerability remediation with our 3-step guide. Find out how to identify, prioritize, and fix vulnerabilities.

Read More
The 10 Best Security Conferences to Attend in 2021 -

All About IAST — Interactive Application Security Testing

Learn all about Interactive Application Security Testing (IAST). Understand how IAST compares to SAST and DAST, its pros and cons.

Read More