Mend.io Blog

Introducing system prompt hardening: production-ready protection for system prompts

Introducing System Prompt Hardening: production-ready protection for system prompts

LATEST
Learn more

Filter & Search

Building a modern application security strategy. Part one: threats, opportunities, and challenges - building a modern application security strategy

Building a Modern Application Security Strategy. Part One: Threats, Opportunities, and Challenges

Building a modern application security strategy is crucial in today's threat landscape. Learn about threats, opportunities, and challenges.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - large blog image 2 1

Why do we need a new approach to SAST?

Discover why a new approach to SAST is essential for modern businesses. Learn the pros and cons of old and new SAST tools.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - large blog

What Threatens Kubernetes Security and What Can You Do About It?

Learn about the threats to Kubernetes security and how to protect your containerized applications.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - blog image

Malicious Code Deletes Directories If You Do Not Have a License

Discover how malicious code can delete directories if you don't have a license. Learn about supply chain security and license compliance.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - large blog 1 3

Mend’s Trends for 2023

Stay ahead of cyber threats with Mend's Trends for 2023. Experts predict a rise in AI-driven cybercrime and open source vulnerabilities.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - large blog 3

Why Open Source License Management Matters

Learn why open source license management is crucial for businesses in the face of rising vulnerabilities and cyber threats.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - large blog image 2

SCA Security: How to Make a Strong Business Case for Software Composition Analysis

Learn why software composition analysis is crucial in combating open source vulnerabilities and how to make a compelling case for buying SCA.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - large blog hero

Everything You Need to Know About Application Security Best Practices

Learn the top 10 application security best practices to protect your software from vulnerabilities and attacks. Ensure your apps are secure.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - python blue

Preventing SQL Injections With Python

Learn how to prevent SQL injections in Python to protect your web application from attacks. Follow best practices and stay up-to-date.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - python

Asynchronous Programming in Python – Understanding The Essentials

Learn about asynchronous programming in Python, its benefits, implementation, & tools like AsyncIO & Twisted to write efficient code.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - large blog image

What Are The Key Considerations for Vulnerability Prioritization?

Learn how to prioritize vulnerabilities in your code with key considerations such as severity, exploitability, reachability, and more.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - large blog image 1

How to Maximize the Value from Your SAST Tool

Learn how to maximize the value from your SAST tool with tactics to optimize security, measure new findings, address backlogs, and more.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - large blog 1 2

Introducing the Mend Open Source Risk Report

Discover the latest insights on open source risk management in the Mend Open Source Risk Report.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - large risks and benefits of updating dependencies

The Risks and Benefits of Updating Dependencies

Updating software dependencies is vital to software and application security, but there are challenges. Learn the risks associated with updating dependencies, why they occur, and how you can address them.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - large image

Risks Faced by Cloud-Native Apps and How to Assess Them

Learn about the risks faced by cloud-native apps and how to assess them.. Understand the challenges and benefits of cloud-based applications.

Read More Read More
Building a modern application security strategy. Part one: threats, opportunities, and challenges - blog 1

Mend SCA Action within Amazon CodeCatalyst Brings Additional Application Security to Developers

Learn about Mend SCA integration within Amazon CodeCatalyst for enhanced application security. Simplifying AWS vulnerability detection.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

Mend.io @ RSAC 2026

See what’s next for AI Security Testing and AppSec.