Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
NPM Supply Chain Attack: Sophisticated Multi-Chain Cryptocurrency Drainer Infiltrates Popular Packages
A sophisticated npm supply chain attack compromised popular packages
Why AI Security Tools Are Different and 9 Tools to Know in 2025
Discover 9 AI security tools that protect data, models, and runtime.
Understanding Bias in Generative AI: Types, Causes & Consequences
Learn what bias in generative AI is, its causes, and consequences.
58 Generative AI Statistics to Know in 2025
Explore 58 key generative AI stats for 2025.
SBOM Security: 6 Key Components and Top 3 Use Cases
Discover 6 core components and 3 top use cases of SBOM security.
What is an AI Bill of Materials (AI BOM)?
Learn how to create and automate an AI BOM.
What is Generative AI Security?
Learn what generative AI in cybersecurity is and how to secure against threats.
The Hallucinated Package Attack: Slopsquatting
Learn how AI-generated code can lead to fake package installs and attacks.
The Complete Guide to SBOM Software Bill of Materials
Learn how SBOMs improve transparency, security, and compliance.
Introducing Mend Forge
Explore Mend Forge—Mend.io’s AI-native innovation engine
What is AI system prompt hardening?
Learn how to protect AI apps with secure prompt hardening techniques.
Deploying Gen AI Guardrails for Compliance, Security and Trust
Explore AI guardrails for generative AI.
Why Patch Management is Important and How to Get It Right
Discover why patch management is one of the most critical and overlooked pillars of application security. Learn how to streamline your patching process and automate it.
Best AI Red Teaming Tools: Top 7 Solutions in 2025
AI Red Teaming tools help teams simulate real life scenarios. They zero in on a more practical question: how does your AI system really behaves.
What Is Application Security Posture Management (ASPM)?
Discover how ASPM improves risk visibility, reduces alert fatigue, and accelerates secure development.
Automated Dependency Management Made Simple
Learn why automating dependency updates is crucial for software security and efficiency. Discovertools like to streamline the process.
Join our subscriber list to get the latest news and updates
Thanks for signing up!