Mend.io Blog

Introducing system prompt hardening: production-ready protection for system prompts

Introducing System Prompt Hardening: production-ready protection for system prompts

LATEST
Learn more

Filter & Search

Ten women in tech who changed our world - ten women in tech who changed our world

Ten Women in Tech Who Changed Our World

Discover ten pioneering women in tech who changed the world. Learn about their visionary work and revolutionary outcomes.

Read More Read More
Ten women in tech who changed our world - shift to the cloud and implications for application security

The Shift to the Cloud and its Implications for Application Security

Learn about the implications of shifting applications to the cloud on application security. Understand the shared responsibility.

Read More Read More
Ten women in tech who changed our world - how do fintech firms handle vulnerabilities like spring4shell e1679407541804

What Can Fintech Firms Do When Vulnerabilities Like Spring4Shell Hit Them?

Learn how the Fintech sector can tackle vulnerabilities like Spring4Shell with speed and efficiency using the Mend platform.

Read More Read More
Ten women in tech who changed our world - five key principles of modern application security e1678917349838

The Five Key Principles of Modern Application Security

Discover the key principles of modern application security. Learn how to secure your software and protect against evolving threats.

Read More Read More
Ten women in tech who changed our world - international womens day blog

Mend’s Women Lead the Way

Discover how Mend's talented women in tech are leading the way in application security and community. Insights, advice, and career highlights.

Read More Read More
Ten women in tech who changed our world - finos report state of open source in financial services

FINOS: The State of Open Source in Financial Services

Explore the state of open source in financial services with FINOS. Discover key findings on adoption, benefits, challenges.

Read More Read More
Ten women in tech who changed our world - who should take responsibility for application security

Just Who Exactly Should Take Responsibility for Application Security?

Explore the complexities of application security responsibility in the age of DevSecOps and supply chain breaches. Who should take the lead?

Read More Read More
Ten women in tech who changed our world - securing the software supply chain mend open source risk report

Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report

Discover key findings from the Mend Open Source Risk Report on securing the software supply chain. Watch the webinar for more insights.

Read More Read More
Ten women in tech who changed our world - ci cd and the promise of agile transformation

CI/CD and the Promise of Agile Transformation

Discover how CI/CD drives agile transformation in software development. Learn about continuous integration, delivery, and best practices.

Read More Read More
Ten women in tech who changed our world - cisos guide to appsec innovation

The CISO’s Guide to Application Security Innovation

Learn how to enhance your application security program with tips from "The CISO's Guide to Application Security Innovation."

Read More Read More
Ten women in tech who changed our world - open source license management tools

Open Source License Management Tools: Features and Best Practices

Learn about the best practices and key features of open source license management tools. Stay compliant with legal requirements.

Read More Read More
Ten women in tech who changed our world - building a modern application security strategy part 2

Building a Modern AppSec Strategy: How to Secure Applications

Learn how to build a modern AppSec strategy to secure applications in the face of evolving threats. Explore tactics, trends, and best practices.

Read More Read More
Ten women in tech who changed our world - docker container security challenges and best practices post

Docker Container Security: Challenges and Best Practices

Learn about the challenges and best practices of securing Docker containers, and why securing containers is vital for application security.

Read More Read More
Ten women in tech who changed our world - large blog image 4

Open Source License Management Tools: Challenges, Opportunities, and What to Look Out For

Learn about the challenges and opportunities of open source license management tools. Understand how to choose the right tool for your org.

Read More Read More
Ten women in tech who changed our world - yandex data leak triggers malicious package publication 1

Yandex Data Leak Triggers Malicious Package Publication

Discover how the Yandex data leak triggered malicious package publication, leading to supply chain security risks.

Read More Read More
Ten women in tech who changed our world - manage risk effectively in cloud native environments 1

How to Manage Risk Effectively in Cloud-Native Environments

Learn how to effectively manage risk in cloud-native environments. Explore the vulnerabilities, risks, and best practices for security.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

Mend.io @ RSAC 2026

See what’s next for AI Security Testing and AppSec.