Mend.io Blog

The butlerian jihad: compromised bitwarden cli deploys npm worm, poisons ai assistants, and dumps github secrets

The Butlerian Jihad: Compromised Bitwarden CLI Deploys npm Worm, Poisons AI Assistants, and Dumps GitHub Secrets

LATEST
Learn more

Filter & Search

Ai risk management: process, frameworks, and 5 mitigation methods - blog ai risk management

AI Risk Management: Process, Frameworks, and 5 Mitigation Methods

Learn how to identify, assess, and mitigate AI risks.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - blog claude code security

Why Claude Code Security Is a Big Moment for Application Security

Discover why enterprise scale requires more than just AI code review - it requires governance.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - blog best software composition analysis providers

Best Software Composition Analysis Providers: Top 5 in 2026

Explore key features of leading SCA providers.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - blog image agent configuration scanning

Securing the New Control Plane: Introducing Static Scanning for AI Agent Configurations

Announcing the launch of AI Agent Configuration Scanning.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - blog ai security testing

AI Security Testing: Threats, Approaches, and Defenses in 2026

Explore AI security testing methods.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - blog veracode competitors

Top 7 Veracode Competitors in 2026

Explore the top Veracode competitors in 2026.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - blog cover open source security with ai

You can’t rely on open source for security — not even when AI is involved

Learn how to manage OSS risk and build remediation that actually lands.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - blog top 10 open source vulnerabilities

Top Open Source Vulnerabilities In 2026

Discover the top open source vulnerabilities in 2026.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - blog blackduck competitors

Top 10 Black Duck Alternatives in 2026

Exploring the top Black Duck alternatives.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - blog blackduck sast

Understanding Black Duck SAST: Pros/Cons and Technical Architecture

A detailed review of Black Duck SAST plus a Mend SAST alternative.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - blog cover ai security maturity checklist

Introducing Mend.io’s AI Security Maturity Survey + Compliance Checklist available today

A new tool to help security teams quantify AI risk and prepare for 2026 regulations.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - blog best software composition analysis enterprise

Best Software Composition Analysis for Enterprise: Top 8 in 2026

Explore this guide to the best software composition analysis tools for large teams.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - llm red teaming blog image

LLM Red Teaming: Threats, Testing Process & Best Practices

A practical guide to LLM red teaming.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - blog blackduck sca

Black Duck SCA: Pros/Cons, Architecture, and Quick Tutorial

A detailed review of Black Duck SCA plus a Mend SCA alternative.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - automated red teaming

Automated Red Teaming: Capabilities, Pros/Cons, and Latest Trends

Learn how automated red teaming simulates cyberattacks at scale.

Read More Read More
Ai risk management: process, frameworks, and 5 mitigation methods - blog veracode sast

Understanding Veracode SAST: Pros/Cons, Architecture, and Pricing

A detailed review of Veracode SAST plus a Mend SAST alternative.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.