Benefits of VEX for SBOMs
SBOMs alone are overwhelming. Learn how VEX adds context, highlighting real threats for efficient risk management.
Mend.io is a Strong Performer in the Forrester Wave™ Software Composition Analysis, Q4 2024
See why Mend.io is recognized as a Strong Performer in The Forrester Wave™ Software Composition Analysis (SCA) Q4 2024 report.
All About RAG: What It Is and How to Keep It Secure
Learn about retrieval-augmented generation, one complex AI system that developers are using.
It‘s Cybersecurity Awareness Month-Let‘s Talk AppSec
October is Cybersecurity Awareness Month. Learn how to protect your software and reduce risks with AppSec tips.
Cybersecurity Awareness Month: AI Safety for Friends and Family
This blog is for your friends and family working outside of the security and technical industries.
Don’t Treat DAST Like Dessert
DAST is an essential part of a nutritious application security diet—not just a once-a-quarter treat.
The Power of Platform-Native Consolidation in Application Security
Streamline workflows, consolidate data, boost security posture, and empower developers to focus on innovation.
What is the KEV Catalog?
A quick guide to the Known Exploited Vulnerabilities (KEV) catalog.
Application Security — The Complete Guide
Explore our application security complete guide and find key trends, testing methods, best practices, and tools to safeguard your software.
Introducing the Mend AppSec Platform
The Mend AppSec platform offers customers everything needed to build proactive application security through one solution, at one price.
ASPM and Modern Application Security
Gartner's 2024 Hype Cycle for Application Security: ASPM moves from peak to trough.
Shining a Light on Shadow AI: What It Is and How to Find It
Find out more about shadow AI and the risks of leaving it uncovered.
Black Hat 2024: AI, AI, and Everything Else
Chris Lindsey shares his takeaways from another exciting Black Hat conference
Dude, Where’s My Documentation?
When the zero day hits the fan, can you find the information you need?
Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification
Explore LLMs in cybersecurity research: analyzing vulnerability data, sifting through CVE information, and enhancing digital safety.
A Guide to Open Source Software
Explore how to use open source software to innovate while minimizing risk.