Three Big Myths About Application Testing With SAST Tools
Discover the truth about Application Testing with SAST. Learn about common myths, integration, and reducing false positives for security.
A Brief Guide to Cloud-Native Applications, Technology, and Security
A comprehensive guide to cloud-native applications, technology, and security. Learn about containers, microservices, CI/CD, and more.
Pride 2022: Supporting LGBTQ+ in Tech
Celebrate Pride 2022 with Mend as we support LGBTQ+ in tech. Hear from employees on their experiences and advice for the tech workplace.
Six Steps to Achieve Zero Trust in Application Security
Discover six key steps to achieve zero trust in application security. Learn how to protect your organization from cyberattacks.
Single Author Uploaded 168 Packages to npm as Part of a Massive Dependency Confusion Attack
Discover how a single author uploaded 168 malicious npm packages in a dependency confusion attack. Learn how Mend blocked these threats.
3 Critical Best Practices of Software Supply Chain Security
Learn about the 3 critical best practices of software supply chain security to protect your organization from malicious packages.
3 New GitHub Features to Reinforce Your Code, Repo, and Dependency Security
Learn about the latest GitHub features to enhance your code security and dependency management. Stay ahead of vulnerabilities.
Cloud Security Architecture: A Practical Guide
Learn about Cloud Security Architecture. Understand the importance, core principles, and threats to secure your cloud environment effectively.
Introducing Mend Supply Chain Defender Integration with JFrog Artifactory
Discover how Mend Supply Chain Defender integrates with JFrog Artifactory to block malicious software threats in your code base.
From WhiteSource to Mend—A Rebrand Journey
From WhiteSource to Mend—A Rebrand Journey. Follow our evolution from open source to all code application security.
WhiteSource is Now Mend: You Code, We Cure
Mend, formerly WhiteSource, focuses on automating application security with a remediation-first approach for open source and custom code.
Vulnerability Remediation: A Practical Guide
Practical guide to vulnerability remediation for developers & security teams. Learn how to detect, prioritize, fix, & monitor vulnerabilities.
New Typosquatting Attack on npm Package ’colors’ Using Cross language Technique Explained
Discover the latest typosquatting attack on the npm package 'colors' using a cross-language technique.
Impact Analysis: RubyGems Critical CVE-2022-29176 Unauthorized Package Takeover
Impact Analysis of RubyGems Critical CVE-2022-29176 Unauthorized Package Takeover. Learn about the vulnerability, impact assessment, and more
What is the NIST Supply Chain Risk Management Program?
Discover the NIST Supply Chain Risk Management Program.. Learn how to manage cybersecurity risks in digital supply chains effectively.
Why Vulnerability Management Must Go Beyond CVSS to Priority Scoring
Learn why vulnerability management must go beyond CVSS to priority scoring for better open source security and remediation prioritization.
Join our subscriber list to get the latest news and updates
Thanks for signing up!