Mend.io Application Security

The National Vulnerability Database Explained -

The National Vulnerability Database Explained

Learn about the National Vulnerability Database (NVD), the largest database of known vulnerabilities. Find out how it differs from the CVE.

Read More
The National Vulnerability Database Explained -

Equifax Breach Year in Review: Vulnerabilities in Apache Struts Still Going Strong

Equifax breach review reveals vulnerabilities in Apache Struts are still unpatched by many companies. Learn why remediation is crucial.

Read More
The National Vulnerability Database Explained - itemeditorimage 5b7538bb4eb42

Zombies: Top 5 Open Source Vulnerabilities That Refuse To Die

Discover the top 5 open source vulnerabilities that still haunt developers. Learn how to protect your applications from security threats.

Read More
The National Vulnerability Database Explained - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViNDM1YjNmYmJmNjAuanBnJnZlcnNpb249MDAwMCZzaWc9ZGYwMmZmYjZhNDg2YzFkNGQ1NmJkNmQ0NTUzMmQzZmI

6 Open Source Software Security Concerns Dispelled

Discover and dispel 6 common concerns around using open source software in applications. Learn how to mitigate risks and harness its power.

Read More
The National Vulnerability Database Explained -

CVSS v3 Is Still Missing The Target For Prioritization

Learn about the flaws in the Common Vulnerability Scoring System and how it may impact security professionals.

Read More
The National Vulnerability Database Explained - Vulnerability Disclosure 1

Vulnerability Disclosure: Find the Bugs in Your Code Before the Hackers Do

Learn about vulnerability disclosure and how to find bugs in your code before hackers do.

Read More
The National Vulnerability Database Explained - owasp a9 1

You Can’t Ignore Using Components With Known Vulnerabilities

Learn why using components with known vulnerabilities is a major issue in application security and how to address it with OWASP guidelines.

Read More
The National Vulnerability Database Explained - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViMjI1NGM5OWY5ZWEuanBnJnZlcnNpb249MDAwMCZzaWc9NThhZGZjNmEwODc1ZDVjMWM3ZmE3OGQ3MGQyODc4Y2M

Known Open Source Vulnerabilities in Reusable Software Components: a Golden Goose For Hackers

Discover the risks of known open source vulnerabilities in reusable software components and how hackers exploit them.

Read More
The National Vulnerability Database Explained -

CVSS v3 Creates New Challenges For Developers

Learn about CVSS v3 and the challenges it brings for developers. Understand how to prioritize remediations & utilize effective usage analysis.

Read More
The National Vulnerability Database Explained -

Top 3 Challenges to Fintech in a Post-Equifax World

Discover the top 3 challenges for fintech in the post-Equifax era: stringent regulations, securing customer trust, and application security.

Read More
The National Vulnerability Database Explained - aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVhZDVlMTg5NGFiZWYuZ2lmJnZlcnNpb249MDAwMCZzaWc9ZjE1MWI3ZTEzODUwM2ViZDYyM2MzMzc3ZjFiNTFhOWE

The Equifax Hack: 6 Months Later, What Did We Learn?

The Equifax breach was the largest single breach in history, with 145.5 million records being uncovered. Today, 6 months later, we look at the industry and see what we have learned from Equifax.

Read More
The National Vulnerability Database Explained - top 5 of the month march2018

Top 5 New Open Source Vulnerabilities in March 2018

The top 5 new open source vulnerabilities in March 2018, including Drupal, Microsoft ChakraCore, Jackson-databind, Moment.js, and Marked.js.

Read More
The National Vulnerability Database Explained - top 15 Appsec experts to follow 1

Top 15 Security Experts to Follow on Twitter

Discover the top 15 security experts to follow on Twitter for the latest updates on application security. Engage with thought leaders.

Read More
The National Vulnerability Database Explained - The True Story Behind the Equifax Data Breach 1

The Equifax Breach: Who’s to Blame?

Learn about the Equifax data breach, who's to blame, and the importance of staying on top of open source libraries and vulnerabilities.

Read More
The National Vulnerability Database Explained - serverless security

What Risks Does Serverless Computing Pose to Your Application Security?

Explore the risks of serverless computing on application security. Learn how to navigate security concerns in the digital world.

Read More
The National Vulnerability Database Explained - AI opens source 2

Leveraging AI for Open Source Management

Discover how AI is revolutionizing open source software management. Learn how automated solutions can help track, detect, and mitigate.

Read More