Mend.io Blog

Poisoned axios: npm account takeover, 50 million downloads, and a rat that vanishes after install

Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install

LATEST
Learn more

Filter & Search

Best practices of highly effective appsec programs - best practices of highly effective appsec programs

Best Practices of Highly Effective AppSec Programs

Discover best practices for highly effective AppSec. Learn about dependency management, DevSecOps, and more.

Read More Read More
Best practices of highly effective appsec programs - renovate enterprise edition launch

Mend.io Launches Mend Renovate Enterprise Edition

Mend Renovate Enterprise Edition offers unlimited scalability and premium features for enterprise-level dependency management.

Read More Read More
Best practices of highly effective appsec programs - secure code warrior integration launch

Add to Your AppSec Arsenal with Mend.io’s Integration with Secure Code Warrior®

Learn more about Mend.io's integration with Secure Code Warrior®.

Read More Read More
Best practices of highly effective appsec programs - death in the sdlc

Let’s Embrace Death in the Software Development Lifecycle

Learn why it's important to let software products die gracefully rather than become zombies, affecting security and functionality over time.

Read More Read More
Best practices of highly effective appsec programs - esg report release 1

New ESG Research Report Outlines Best Practices for Effective Application Security Programs

New ESG Research Report reveals best practices for application security programs. Learn how to prevent incidents and secure software apps.

Read More Read More
Best practices of highly effective appsec programs - why the us government continues to push for software supply chain security

Why The US Government Continues to Push for Software Supply Chain Security

Discover why the US government is prioritizing software supply chain security. Learn about CISA's goals and objectives at the SOSS Summit.

Read More Read More
Best practices of highly effective appsec programs - owasp 2023 api security top ten

The Latest Trends in API Security: The 2023 OWASP API Security Top Ten

Discover the latest OWASP API Security Top Ten for 2023. Understand key vulnerabilities and how to safeguard your applications.

Read More Read More
Best practices of highly effective appsec programs - why dependency management reduces your enterprises technical debt

Why Dependency Management Reduces Your Enterprise’s Technical Debt

Learn how dependency management can reduce technical debt in your enterprise. Find out how outdated dependencies can lead to security risks.

Read More Read More
Best practices of highly effective appsec programs - five reasons you need automatic software updates for your application

Cybersecurity Awareness Month 2023: Five Reasons You Need Automatic Software Updates for Your Application Security.

To mark Cybersecurity Awareness Month 2023, discover five key reasons why automated software updates are so vital for your application security.

Read More Read More
Best practices of highly effective appsec programs -

Vulnerability Assessment: A Guide

Learn about the importance of vulnerability assessments in improving security posture. Understand the process, misconceptions, tools, & more.

Read More Read More
Best practices of highly effective appsec programs - what role should dependency management play as the regulation of the software supply chain escalates

What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates?

Discover the importance of dependency management in securing the software supply chain as regulations escalate.

Read More Read More
Best practices of highly effective appsec programs - attackers are using automation software vendors must catch up

Adversaries Are Using Automation. Software Vendors Must Catch Up

Discover the importance of automation in cybersecurity and how software vendors can stay ahead of adversaries.

Read More Read More
Best practices of highly effective appsec programs - how to communicate the value of your company with sboms

What Is SBOM Software and Why It Matters

Learn how to effectively communicate the value of your company with Software Bill of Materials (SBOMs).

Read More Read More
Best practices of highly effective appsec programs - software supply chain security post

Software Supply Chain Security: The Basics and Four Critical Best Practices

Learn about software supply chain security basics and best practices to prevent attacks.

Read More Read More
Best practices of highly effective appsec programs - how software supply chain security regulation will develop and what it will look like

How Software Supply Chain Security Regulation Will Develop, and What Will It Look Like?

Discover how software supply chain security regulations are evolving and what they mean for businesses.

Read More Read More
Best practices of highly effective appsec programs - why legal regulation shifts responsibility for software supply chain security to vendors

Why Legal Regulation Shifts Responsibility for Software Supply Chain Security to Vendors

Discover why legal regulations are shifting responsibility for software supply chain security to vendors.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.