Mend.io Blog

What being a customer favorite in the forrester wave™: static application security testing solutions, q3 2025 really means

What Being a Customer Favorite in The Forrester Wave™: Static Application Security Testing Solutions, Q3 2025 Really Means

LATEST
Learn more

Filter & Search

8 considerations for thwarting malicious packages - eight considerations for thwarting malicious packages

8 Considerations for Thwarting Malicious Packages

Learn how to protect your code from malicious packages with these eight considerations. Stay ahead of supply chain security threats.

Read More Read More
8 considerations for thwarting malicious packages - what you can do to stop software supply chain attacks post

What You Can Do to Stop Software Supply Chain Attacks

Learn how to stop software supply chain attacks with SBOMs, best practices, and prioritizing known vulnerabilities. Protect your software.

Read More Read More
8 considerations for thwarting malicious packages - benefits of maintaining up to date dependencies

Five Key Application Security Best Practices and Benefits for Maintaining Up-to-Date Dependencies

Learn the five key application security best practices and benefits for maintaining up-to-date dependencies.

Read More Read More
8 considerations for thwarting malicious packages - how software supply chain attacks work and how to assess your software supply chain security

How Software Supply Chain Attacks Work, and How to Assess Your Software Supply Chain Security

Learn how software supply chain attacks work and how to to defend against malicious packages and data breaches.

Read More Read More
8 considerations for thwarting malicious packages - seven devsecops best practices challenges and how to address them

Seven DevSecOps Best Practices: Challenges and How to Address Them

Learn about the seven best practices for DevSecOps and how to address challenges in securing software supply chains.

Read More Read More
8 considerations for thwarting malicious packages - theres a new stealer variant in town and its using electron to stay fully undetected

There’s a New Stealer Variant in Town, and It’s Using Electron to Stay Fully Undetected

Discover the latest threat in town - a new info-stealer variant using Electron to remain undetected. Learn about its attack flow.

Read More Read More
8 considerations for thwarting malicious packages - a new version of mend for containers

A New Version of Mend for Containers is Here

Mend for Containers offers advanced security while helping DevSecOps teams identify threats, prioritize remediation, & enforce policies.

Read More Read More
8 considerations for thwarting malicious packages - brandjacking

What Risks Do You Run from Brandjacking, and How Do You Overcome Them?

Learn about the risks of brandjacking & how to overcome them with application security tools & practices. Protect your org from cyber threats.

Read More Read More
8 considerations for thwarting malicious packages - cybersecurity risks posed by typosquatting and how you can beat them

What Cybersecurity Risks Does Typosquatting Pose, and How Can You Beat Them?

Find out what typosquatting is, why it is such a threat, and what you can do to stop it.

Read More Read More
8 considerations for thwarting malicious packages - the new era of ai powered application security post

How Can Application Security Cope With The Challenges Posed by AI?

Discover the new era of AI-powered application security. Learn how to cope with the challenges posed by AI in the AppSec industry.

Read More Read More
8 considerations for thwarting malicious packages - why is software vulnerability patching crucial for your software and application security

Why is Software Vulnerability Patching Crucial for Your Software and Application Security?

Learn why software vulnerability patching is crucial for your software and application security. Discover best practices, challenges, and tools.

Read More Read More
8 considerations for thwarting malicious packages - ai security vulnerability and risk

The New Era of AI-Powered Application Security. Part Two: AI Security Vulnerability and Risk

Discover the new era of AI-powered application security. Learn about risks, and suggested approaches to cope with AI challenges.

Read More Read More
8 considerations for thwarting malicious packages - software supply chain compliance ensuring security and trust in your software and applications

Software Supply Chain Compliance: Ensuring Security and Trust in Your Software and Applications

Learn about software supply chain compliance and security to protect your organization from risks and ensure trust.

Read More Read More
8 considerations for thwarting malicious packages - ai powered application security evolution or revolution

The New Era of AI-Powered Application Security. Part One: AI-Powered Application Security: Evolution or Revolution?

Discover the new era of AI-powered application security. Learn about the evolution, benefits, and risks of AI in security.

Read More Read More
8 considerations for thwarting malicious packages - how does slsa help strengthen software supply chain security

How Does SLSA Help Strengthen Software Supply Chain Security?

Learn how SLSA enhances software supply chain security with levels of protection. Understand the risks, benefits, and best practices.

Read More Read More
8 considerations for thwarting malicious packages - why you should avoid copy and paste code

Why You Should Avoid Copy and Paste Code

Discover why copying and pasting code can compromise your software’s security, quality, and compliance with licensing.

Read More Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!