Mend.io Supply Chain Security

Six Golden Rules for Software and Application Security - The six golden rules for you to follow to improve your software and application security 2

Six Golden Rules for Software and Application Security

Learn the six golden rules for software and application security.. Stay safe during Cybersecurity Awareness Month 2022!

Read More
Six Golden Rules for Software and Application Security - npm Massive Dependency Confusion Attack

Cybercriminals targeted users of packages with a total of 1.5 billion weekly downloads on npm

Stay informed about the latest supply chain security incident targeting npm users. Learn about the malicious packages and more.

Read More
Six Golden Rules for Software and Application Security - npm Massive Dependency Confusion Attack

Popular Cryptocurrency Exchange dYdX Has Had Its NPM Account Hacked

dYdX, a popular cryptocurrency exchange, had its NPM account hacked in a supply chain attack. Learn how to protect against similar attacks.

Read More
Six Golden Rules for Software and Application Security - 1000X650 2

Mend API Helps Make SBOMs Simple

Learn how Mend API simplifies the creation of SBOMs for better supply chain security. Stay ahead in DevSecOps with our automated tool.

Read More
Six Golden Rules for Software and Application Security - Todays Security Tidbit An Encrypted JSON File Containings Malicious Code

Today’s Security Tidbit: An Encrypted JSON File Containing Malicious Code

Discover how encrypted JSON files are being used to hide malicious code. Learn about the latest security findings and how to protect your apps.

Read More
Six Golden Rules for Software and Application Security - blog blog image

3 Critical Best Practices of Software Supply Chain Security

Learn about the 3 critical best practices of software supply chain security to protect your organization from malicious packages.

Read More
Six Golden Rules for Software and Application Security - Integration of Diffend via Artifactory plugin

Introducing Mend Supply Chain Defender Integration with JFrog Artifactory

Discover how Mend Supply Chain Defender integrates with JFrog Artifactory to block malicious software threats in your code base.

Read More
Six Golden Rules for Software and Application Security - Brand Announce navy 1920 1080 scaled 1

WhiteSource is Now Mend: You Code, We Cure

Mend, formerly WhiteSource, focuses on automating application security with a remediation-first approach for open source and custom code.

Read More
Six Golden Rules for Software and Application Security - What is the NIST Supply Chain Risk Management Program

What is the NIST Supply Chain Risk Management Program?

Discover the NIST Supply Chain Risk Management Program.. Learn how to manage cybersecurity risks in digital supply chains effectively.

Read More
Six Golden Rules for Software and Application Security - Automated Software Supply Chain Attacks

Automated Software Supply Chain Attacks: Should You be Worried?

Learn why automated software supply chain attacks are a growing threat. Discover how to protecting your org from malicious NPM packages.

Read More
Six Golden Rules for Software and Application Security - How To Mitigate Ruby Supply Chain Security Risks

Best Practices For Managing Ruby Supply Chain Security Risks

Understand the types of Ruby supply chain attacks. Learn the best practices for preventing supply chain security risks in your Ruby projects.

Read More
Six Golden Rules for Software and Application Security - supply chain risk managment guide

A Guide To Implementing Software Supply Chain Risk Management

Learn how to implement software supply chain risk management to safeguard your critical assets. Discover best practices, & more.

Read More
Six Golden Rules for Software and Application Security - The Source series

Popular JavaScript Library ua-parser-js Compromised via Account Takeover

Popular JavaScript library ua-parser-js was compromised via account takeover, releasing malicious versions.

Read More
Six Golden Rules for Software and Application Security - Supply Chain zero trust blog

Using Zero Trust to Mitigate Supply Chain Risks

Discover how Zero Trust can help mitigate supply chain risks and enhance your software security.

Read More
Six Golden Rules for Software and Application Security - Supply Chain Security Update How Secure is Composer

Supply Chain Security Update: How Secure is Composer?

Stay updated on supply chain security with our blog post on the vulnerability in Composer. Learn how the issue was detected and fixed.

Read More
Six Golden Rules for Software and Application Security - The Source series

Securing Your Package Manager’s Lockfiles

Learn how to secure your package manager's lockfiles to protect your application from supply chain risks and ensure version consistency.

Read More

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.