Mend.io Blog

Introducing mend. Io’s ai security dashboard: a clear view into ai risk

Introducing Mend.io’s AI Security Dashboard: A Clear View into AI Risk

LATEST
Learn more

Filter & Search

Securing the software supply chain: key findings from the mend open source risk report - securing the software supply chain mend open source risk report

Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report

Discover key findings from the Mend Open Source Risk Report on securing the software supply chain. Watch the webinar for more insights.

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - ci cd and the promise of agile transformation

CI/CD and the Promise of Agile Transformation

Discover how CI/CD drives agile transformation in software development. Learn about continuous integration, delivery, and best practices.

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - cisos guide to appsec innovation

The CISO’s Guide to Application Security Innovation

Learn how to enhance your application security program with tips from "The CISO's Guide to Application Security Innovation."

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - open source license management tools

Open Source License Management Tools: Features and Best Practices

Learn about the best practices and key features of open source license management tools. Stay compliant with legal requirements.

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - building a modern application security strategy part 2

Building a Modern AppSec Strategy: How to Secure Applications

Learn how to build a modern AppSec strategy to secure applications in the face of evolving threats. Explore tactics, trends, and best practices.

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - docker container security challenges and best practices post

Docker Container Security: Challenges and Best Practices

Learn about the challenges and best practices of securing Docker containers, and why securing containers is vital for application security.

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - large blog image 4

Open Source License Management Tools: Challenges, Opportunities, and What to Look Out For

Learn about the challenges and opportunities of open source license management tools. Understand how to choose the right tool for your org.

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - yandex data leak triggers malicious package publication 1

Yandex Data Leak Triggers Malicious Package Publication

Discover how the Yandex data leak triggered malicious package publication, leading to supply chain security risks.

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - manage risk effectively in cloud native environments 1

How to Manage Risk Effectively in Cloud-Native Environments

Learn how to effectively manage risk in cloud-native environments. Explore the vulnerabilities, risks, and best practices for security.

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - building a modern application security strategy

Building a Modern Application Security Strategy. Part One: Threats, Opportunities, and Challenges

Building a modern application security strategy is crucial in today's threat landscape. Learn about threats, opportunities, and challenges.

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - large blog image 2 1

Why do we need a new approach to SAST?

Discover why a new approach to SAST is essential for modern businesses. Learn the pros and cons of old and new SAST tools.

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - large blog

What Threatens Kubernetes Security and What Can You Do About It?

Learn about the threats to Kubernetes security and how to protect your containerized applications.

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - blog image

Malicious Code Deletes Directories If You Do Not Have a License

Discover how malicious code can delete directories if you don't have a license. Learn about supply chain security and license compliance.

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - large blog 1 3

Mend’s Trends for 2023

Stay ahead of cyber threats with Mend's Trends for 2023. Experts predict a rise in AI-driven cybercrime and open source vulnerabilities.

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - large blog 3

Why Open Source License Management Matters

Learn why open source license management is crucial for businesses in the face of rising vulnerabilities and cyber threats.

Read More Read More
Securing the software supply chain: key findings from the mend open source risk report - large blog image 2

How to Make a Case for Buying SCA

Learn why software composition analysis is crucial in combating open source vulnerabilities and how to make a compelling case for buying SCA.

Read More Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!