Mend.io Blog

Mini shai-hulud is back: 172 npm and pypi packages compromised in latest wave

Mini Shai-Hulud Is Back: 172 npm and PyPI Packages Compromised in Latest Wave

LATEST
Learn more

Filter & Search

What are the key considerations for vulnerability prioritization? - large blog image

What Are The Key Considerations for Vulnerability Prioritization?

Learn how to prioritize vulnerabilities in your code with key considerations such as severity, exploitability, reachability, and more.

Read More Read More
What are the key considerations for vulnerability prioritization? - large blog image 1

How to Maximize the Value from Your SAST Tool

Learn how to maximize the value from your SAST tool with tactics to optimize security, measure new findings, address backlogs, and more.

Read More Read More
What are the key considerations for vulnerability prioritization? - large blog 1 2

Introducing the Mend Open Source Risk Report

Discover the latest insights on open source risk management in the Mend Open Source Risk Report.

Read More Read More
What are the key considerations for vulnerability prioritization? - large risks and benefits of updating dependencies

The Risks and Benefits of Updating Dependencies

Updating software dependencies is vital to software and application security, but there are challenges. Learn the risks associated with updating dependencies, why they occur, and how you can address them.

Read More Read More
What are the key considerations for vulnerability prioritization? - large image

Risks Faced by Cloud-Native Apps and How to Assess Them

Learn about the risks faced by cloud-native apps and how to assess them.. Understand the challenges and benefits of cloud-based applications.

Read More Read More
What are the key considerations for vulnerability prioritization? - blog 1

Mend SCA Action within Amazon CodeCatalyst Brings Additional Application Security to Developers

Learn about Mend SCA integration within Amazon CodeCatalyst for enhanced application security. Simplifying AWS vulnerability detection.

Read More Read More
What are the key considerations for vulnerability prioritization? - untitled 1

Shift-Left Testing and Its Benefits

Learn about the benefits of shift-left testing in software development, including improved security, efficiency, and cost savings.

Read More Read More
What are the key considerations for vulnerability prioritization? - aws blog

Integrating Dependency Management Into Cloud Services: The Mend-AWS Partnership

Discover how Mend partners with AWS to integrate dependency management into cloud services, reducing vulnerabilities.

Read More Read More
What are the key considerations for vulnerability prioritization? - large blog 1 1

Announcing Mend SCA for Bitbucket Cloud Integration

Discover Mend SCA's new integration with Bitbucket Cloud for seamless open source risk detection and remediation. Learn more now!

Read More Read More
What are the key considerations for vulnerability prioritization? - java script

Improving Your Zero-Day Readiness in JavaScript

Learn how to improve your zero-day readiness in JavaScript to protect against data breaches and cyber attacks.

Read More Read More
What are the key considerations for vulnerability prioritization? - devops blog post

Why Your DevOps Platform Needs a Security Partner to Safeguard Your Software

Learn why your DevOps platform needs a security partner to safeguard your software. Mend.io provides application security and DevSecOps.

Read More Read More
What are the key considerations for vulnerability prioritization? - devsecops a comprehensive guide to securely managing your devops workflow

DevSecOps: A Comprehensive Guide to Securely Managing Your DevOps Workflow

Get to know all about DevSecOps and the main tools and practices that organizations should adopt in order to implement a DevSecOps pipeline.

Read More Read More
What are the key considerations for vulnerability prioritization? - modern appsec programs run on automation

Modern AppSec Programs Run on Automation

Learn how modern Application Security Programs leverage automation to combat cyber threats, improve efficiency, and reduce costs.

Read More Read More
What are the key considerations for vulnerability prioritization? - big blog post

Top Three User Priorities for Software Composition Analysis

Discover the top three user priorities for Software Composition Analysis including application security, DevSecOps, and license compliance.

Read More Read More
What are the key considerations for vulnerability prioritization? - openssl alert

Advisory: New OpenSSL Critical Security Vulnerability

Learn about the new OpenSSL critical security vulnerabilities CVE-2022-3786 and CVE-2022-3602. Discover their impact, and protect your systems.

Read More Read More
What are the key considerations for vulnerability prioritization? - blog post

A Rash of Recent CVEs in Go

Discover the recent CVEs affecting Go programming language and their impact on popular applications like Docker and Kubernetes.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.