Mend.io Blog

Mend leadership update: building on our momentum for the next phase of growth

Mend Leadership Update: Building on Our Momentum for the Next Phase of Growth

LATEST
Learn more

Filter & Search

Vulnerability assessment: a guide -

Vulnerability Assessment: A Guide

Learn about the importance of vulnerability assessments in improving security posture. Understand the process, misconceptions, tools, & more.

Read More Read More
Vulnerability assessment: a guide - what role should dependency management play as the regulation of the software supply chain escalates

What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates?

Discover the importance of dependency management in securing the software supply chain as regulations escalate.

Read More Read More
Vulnerability assessment: a guide - attackers are using automation software vendors must catch up

Adversaries Are Using Automation. Software Vendors Must Catch Up

Discover the importance of automation in cybersecurity and how software vendors can stay ahead of adversaries.

Read More Read More
Vulnerability assessment: a guide - how to communicate the value of your company with sboms

What Is SBOM Software and Why It Matters

Learn how to effectively communicate the value of your company with Software Bill of Materials (SBOMs).

Read More Read More
Vulnerability assessment: a guide - software supply chain security post

Software Supply Chain Security: The Basics and Four Critical Best Practices

Learn about software supply chain security basics and best practices to prevent attacks.

Read More Read More
Vulnerability assessment: a guide - how software supply chain security regulation will develop and what it will look like

How Software Supply Chain Security Regulation Will Develop, and What Will It Look Like?

Discover how software supply chain security regulations are evolving and what they mean for businesses.

Read More Read More
Vulnerability assessment: a guide - why legal regulation shifts responsibility for software supply chain security to vendors

Why Legal Regulation Shifts Responsibility for Software Supply Chain Security to Vendors

Discover why legal regulations are shifting responsibility for software supply chain security to vendors.

Read More Read More
Vulnerability assessment: a guide - 12 most exploited vulnerabilities

Are You Protected from the 12 Most Exploited Vulnerabilities?

Stay informed about the 12 most exploited vulnerabilities in 2022 & how to protect your software supply chain with AppSec tools and practices.

Read More Read More
Vulnerability assessment: a guide - tips and tools for open source compliance post

Tips and Tools for Open Source Compliance

Learn how to manage open source compliance with tips, tools, and best practices.

Read More Read More
Vulnerability assessment: a guide - eight considerations for thwarting malicious packages

8 Considerations for Thwarting Malicious Packages

Learn how to protect your code from malicious packages with these eight considerations. Stay ahead of supply chain security threats.

Read More Read More
Vulnerability assessment: a guide - what you can do to stop software supply chain attacks post

What You Can Do to Stop Software Supply Chain Attacks

Learn how to stop software supply chain attacks with SBOMs, best practices, and prioritizing known vulnerabilities. Protect your software.

Read More Read More
Vulnerability assessment: a guide - benefits of maintaining up to date dependencies

Five Key Application Security Best Practices and Benefits for Maintaining Up-to-Date Dependencies

Learn the five key application security best practices and benefits for maintaining up-to-date dependencies.

Read More Read More
Vulnerability assessment: a guide - how software supply chain attacks work and how to assess your software supply chain security

How Software Supply Chain Attacks Work, and How to Assess Your Software Supply Chain Security

Learn how software supply chain attacks work and how to to defend against malicious packages and data breaches.

Read More Read More
Vulnerability assessment: a guide - seven devsecops best practices challenges and how to address them

Seven DevSecOps Best Practices: Challenges and How to Address Them

Learn about the seven best practices for DevSecOps and how to address challenges in securing software supply chains.

Read More Read More
Vulnerability assessment: a guide - theres a new stealer variant in town and its using electron to stay fully undetected

There’s a New Stealer Variant in Town, and It’s Using Electron to Stay Fully Undetected

Discover the latest threat in town - a new info-stealer variant using Electron to remain undetected. Learn about its attack flow.

Read More Read More
Vulnerability assessment: a guide - a new version of mend for containers

A New Version of Mend for Containers is Here

Mend for Containers offers advanced security while helping DevSecOps teams identify threats, prioritize remediation, & enforce policies.

Read More Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!