Mend.io Application Security

Serverless Security Explained - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkNTUyM2RmNWY3YTguanBnJnZlcnNpb249MDAwMCZzaWc9YzU0MzJiNGFiNDk5MmRkZTA3ZTIyOTllZjFhZWIwNmQ

Serverless Security Explained

Learn about serverless security in the cloud ecosystem, including best practices like staying up to date, least privilege, and more.

Read More
Serverless Security Explained - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVhZjJmYzgzZDFiNGUuanBnJnZlcnNpb249MDAwMCZzaWc9MjU4MzhkYjc5NTE2YjIzODJlY2Q5MjBjYWUzZGQwODA

Top 3 Open Source Risks and How to Beat Them

Discover the top 3 open source risks: security vulnerabilities, licensing compliance, and quality issues. Learn how to mitigate these risks.

Read More
Serverless Security Explained - itemeditorimage 601bd3b6e3633

Gray Box Testing Guide

Discover the comprehensive guide to gray box testing, a blend of black and white box methods, to enhance your application's security.

Read More
Serverless Security Explained -

Microservices Architecture: Security Strategies and Best Practices

Learn about microservices architecture and the security strategies and best practices needed to protect your organization's systems.

Read More
Serverless Security Explained - API Security in a Digitally Transformed World blog

API Security in a Digitally Transformed World

Learn about API security. Understand the importance of securing APIs and the best practices to protect your organization.

Read More
Serverless Security Explained - blog pic

White Hat Hacking – Not What You Expect

Discover the world of white hat hacking and the importance of ethical hackers in open source projects.

Read More
Serverless Security Explained -

CVE (Common Vulnerabilities and Exposures) — What is it and how to understand it

What are CVEs and how are they published? What kind of information do CVEs offer about security vulnerabilities in publicly released software?

Read More
Serverless Security Explained - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmZjZkYTAxNmE5OTUuanBnJnZlcnNpb249MDAwMCZzaWc9NDA0OTg1MWQ1NDU5ODg5ODhlMDY2MWRjZDkwMzdhYzQ

The 10 Best Security Conferences to Attend in 2021

Discover the top 10 security conferences to attend in 2021, whether in-person or virtually.

Read More
Serverless Security Explained -

Top 10 Open Source Vulnerabilities In 2020

Discover the top 10 open source vulnerabilities in 2020, including Lodash, Jackson-databind, HtmlUnit, and more.

Read More
Serverless Security Explained -

What You Need To Know About Application Security Testing Orchestration

Discover the importance of Appsec Testing Orchestration in the evolving security threat landscape. Learn how to manage tools effectively.

Read More
Serverless Security Explained - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViZjU0MjhkM2Q3ZTIuanBnJnZlcnNpb249MDAwMCZzaWc9ZjJhODZkNDNjOTNlNDE1YmU0NDNiZjYzYjE5MjkyOGI

Apache Struts Vulnerabilities Pose ‘Stay or Go’ Question

Stay informed about the latest Apache Struts vulnerabilities and the ongoing debate of whether to continue using the framework or migrate off it.

Read More
Serverless Security Explained - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkY2Q0OWViYzNjYmYucG5nJnZlcnNpb249MDAwMCZzaWc9NzRjMDIzMjE1OGYzZWY2ZjA2YWM5YjA5YzliZDZjZmI

What Is CVSS v3.1? Understanding The New CVSS

Learn about the Common Vulnerability Scoring System (CVSS) v3.1 & how it measures severity, not risk, in assessing security vulnerabilities.

Read More
Serverless Security Explained -

White Box Testing Guide

Learn about White Box Testing in software development with this comprehensive guide. Understand the types, techniques, tools, advantages.

Read More
Serverless Security Explained - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmOTljM2JhYTI3ZjMucG5nJnZlcnNpb249MDAwMCZzaWc9MzVkYWU4MjE4YjIyNmJkNzI5OGJjMGFjYmY2ZTQzOTg

SCA vs SBOM: Getting Started With Software Composition Analysis

Top tips for starting with a software composition analysis solution. Build a team, set goals beyond scanning, understand the data model, make policies work, start small.

Read More
Serverless Security Explained - Vulnerability Prioritization Image blog

Be Wise — Prioritize: Software Security Vulnerability Prioritization

Learn how to prioritize software security vulnerabilities effectively to ensure your team is addressing the most urgent threats first.

Read More
Serverless Security Explained - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmNmM2YTg2YjQ0NDMucG5nJnZlcnNpb249MDAwMCZzaWc9ZDAwMjkwYmY5ZWRiMGZiZmM3OGFjMGZiZjJlNDUwOGM

Black Box Testing: What You Need to Know

Learn all about black box testing in application security & quality assurance. Discover techniques, & tools and more.

Read More