Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
3 New GitHub Features to Reinforce Your Code, Repo, and Dependency Security
Learn about the latest GitHub features to enhance your code security and dependency management. Stay ahead of vulnerabilities.
Cloud Security Architecture: A Practical Guide
Learn about Cloud Security Architecture. Understand the importance, core principles, and threats to secure your cloud environment effectively.
Introducing Mend Supply Chain Defender Integration with JFrog Artifactory
Discover how Mend Supply Chain Defender integrates with JFrog Artifactory to block malicious software threats in your code base.
From WhiteSource to Mend—A Rebrand Journey
From WhiteSource to Mend—A Rebrand Journey. Follow our evolution from open source to all code application security.
WhiteSource is Now Mend: You Code, We Cure
Mend, formerly WhiteSource, focuses on automating application security with a remediation-first approach for open source and custom code.
Vulnerability Remediation: A Practical Guide
Practical guide to vulnerability remediation for developers & security teams. Learn how to detect, prioritize, fix, & monitor vulnerabilities.
New Typosquatting Attack on npm Package ’colors’ Using Cross language Technique Explained
Discover the latest typosquatting attack on the npm package 'colors' using a cross-language technique.
Impact Analysis: RubyGems Critical CVE-2022-29176 Unauthorized Package Takeover
Impact Analysis of RubyGems Critical CVE-2022-29176 Unauthorized Package Takeover. Learn about the vulnerability, impact assessment, and more
What is the NIST Supply Chain Risk Management Program?
Discover the NIST Supply Chain Risk Management Program.. Learn how to manage cybersecurity risks in digital supply chains effectively.
Why Vulnerability Management Must Go Beyond CVSS to Priority Scoring
Learn why vulnerability management must go beyond CVSS to priority scoring for better open source security and remediation prioritization.
AWS Targeted by a Package Backfill Attack
Discover how AWS was targeted by a malicious package backfill attack, the methods used by attackers, and how to protect against such attacks.
5 Vulnerability Assessment Scanning Tools: 5 Solutions Compared
Discover the top 5 vulnerability assessment scanning tools and learn how to prioritize and remediate vulnerabilities to secure your org.
Get the Response to Spring4Shell Right: Best Practices for Immediate Remediation
Learn best practices for immediate remediation of the Spring4Shell vulnerability, including detection, and prioritization.
Spring4Shell: What to Expect and How to Prepare
Learn about the Spring4Shell vulnerability (CVE-2022-22965), its potential impact, and how to prepare your Java applications.
Automated Software Supply Chain Attacks: Should You be Worried?
Learn why automated software supply chain attacks are a growing threat. Discover how to protecting your org from malicious NPM packages.
Spring4Shell Zero-Day Vulnerability: Information and Remediation for CVE-2022-22965
Learn about the Spring4Shell Zero-Day Vulnerability CVE-2022-22965 with information, updates, mitigation guidance, and more.
Never miss a post. Opt-out at any time.
You’re all set to receive our latest posts.
Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.