Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
Six Golden Rules for Software and Application Security
Learn the six golden rules for software and application security.. Stay safe during Cybersecurity Awareness Month 2022!
Cybercriminals targeted users of packages with a total of 1.5 billion weekly downloads on npm
Stay informed about the latest supply chain security incident targeting npm users. Learn about the malicious packages and more.
Popular Cryptocurrency Exchange dYdX Has Had Its NPM Account Hacked
dYdX, a popular cryptocurrency exchange, had its NPM account hacked in a supply chain attack. Learn how to protect against similar attacks.
Typosquatting Malware Found in Composer Repository
Protect your PHP applications from typosquatting malware found in Composer Repository. Learn how attackers exploit vulnerabilities.
Mend API Helps Make SBOMs Simple
Learn how Mend API simplifies the creation of SBOMs for better supply chain security. Stay ahead in DevSecOps with our automated tool.
Cloud-Native Applications and Managing Their Dependencies
Learn how to manage dependencies in cloud-native applications efficiently. Explore best practices & tools to ensure & up-to-date software
Today’s Security Tidbit: An Encrypted JSON File Containing Malicious Code
Discover how encrypted JSON files are being used to hide malicious code. Learn about the latest security findings and how to protect your apps.
How to Conquer Remote Code Execution (RCE) in npm
Learn how to conquer Remote Code Execution (RCE) attacks in npm. Find out why npm is susceptible, the threats of RCE, and more.
How to Easily Update Node.js to the Latest Version
Learn how to easily update Node.js to the latest version on macOS, Linux, & Windows.
Update Docker Images & Containers To Latest Version
Learn how to efficiently update Docker images and containers to the latest version for improved security and performance.
Three Big Myths About Application Testing With SAST Tools
Discover the truth about Application Testing with SAST. Learn about common myths, integration, and reducing false positives for security.
A Brief Guide to Cloud-Native Applications, Technology, and Security
A comprehensive guide to cloud-native applications, technology, and security. Learn about containers, microservices, CI/CD, and more.
Pride 2022: Supporting LGBTQ+ in Tech
Celebrate Pride 2022 with Mend as we support LGBTQ+ in tech. Hear from employees on their experiences and advice for the tech workplace.
Six Steps to Achieve Zero Trust in Application Security
Discover six key steps to achieve zero trust in application security. Learn how to protect your organization from cyberattacks.
Single Author Uploaded 168 Packages to npm as Part of a Massive Dependency Confusion Attack
Discover how a single author uploaded 168 malicious npm packages in a dependency confusion attack. Learn how Mend blocked these threats.
3 Critical Best Practices of Software Supply Chain Security
Learn about the 3 critical best practices of software supply chain security to protect your organization from malicious packages.
Never miss a post. Opt-out at any time.
You’re all set to receive our latest posts.
Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.