Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
Why Vulnerability Management Must Go Beyond CVSS to Priority Scoring
Learn why vulnerability management must go beyond CVSS to priority scoring for better open source security and remediation prioritization.
AWS Targeted by a Package Backfill Attack
Discover how AWS was targeted by a malicious package backfill attack, the methods used by attackers, and how to protect against such attacks.
5 Vulnerability Assessment Scanning Tools: 5 Solutions Compared
Discover the top 5 vulnerability assessment scanning tools and learn how to prioritize and remediate vulnerabilities to secure your org.
Get the Response to Spring4Shell Right: Best Practices for Immediate Remediation
Learn best practices for immediate remediation of the Spring4Shell vulnerability, including detection, and prioritization.
Spring4Shell: What to Expect and How to Prepare
Learn about the Spring4Shell vulnerability (CVE-2022-22965), its potential impact, and how to prepare your Java applications.
Automated Software Supply Chain Attacks: Should You be Worried?
Learn why automated software supply chain attacks are a growing threat. Discover how to protecting your org from malicious NPM packages.
Spring4Shell Zero-Day Vulnerability: Information and Remediation for CVE-2022-22965
Learn about the Spring4Shell Zero-Day Vulnerability CVE-2022-22965 with information, updates, mitigation guidance, and more.
How To Set A Benchmark Of False Positives With SAST Tools
Learn how to set benchmarks for false positives in SAST tools to enhance application security and improve developer efficiency.
How To Address SAST False Positives In Application Security Testing
Address SAST false positives in your application security testing. Explore causes, preventive measures, and the benefits of using Mend SAST.
Best Practices For Managing Ruby Supply Chain Security Risks
Understand the types of Ruby supply chain attacks. Learn the best practices for preventing supply chain security risks in your Ruby projects.
A Guide To Implementing Software Supply Chain Risk Management
Learn how to implement software supply chain risk management to safeguard your critical assets. Discover best practices, & more.
SAST vs. SCA: 7 Key Differences
Discover the 7 key differences between SAST and SCA tools in application security. Learn how they integrate into the SDLC process.
Mend SAST: The Next Generation of Application Security
Learn about our innovative approach to detecting and remediating custom code vulnerabilities for a more secure future.
Five Critically Important Facts About npm Package Security
Learn about the five critical facts about npm package security, including how attackers exploit trust, default behaviors, and dependency hell.
A Malicious Package Found Stealing AWS AIM data on npm has Similarities To Capital One Hack
Discover how a malicious package found stealing AWS AIM data on npm has similarities to the Capital One hack. Learn about the threat.
CVE-2021-44142: Vulnerability in Samba Enables Bad Actors to Execute Arbitrary Code as Root
CVE-2021-44142 allows bad actors to execute arbitrary code as root on Samba. Learn about the vulnerability, exploit, and how to fix it.
Join our subscriber list to get the latest news and updates
Thanks for signing up!