Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
The Complete Guide to Prototype Pollution Vulnerabilities
Learn all about Prototype Pollution vulnerabilities in this complete guide. Understand how they work, how to mitigate them, and more.
How Packages’ External Resources Threaten Your Supply Chain
Learn how external resources in packages can threaten your supply chain security, & discover ways to mitigate these risks to protect your org.
Nurturing the Next Generation of Software and Security Pros – 5 Nonprofits We Love
Discover 5 nonprofits nurturing the next generation of software and security professionals, addressing the tech talent shortage.
Azure Static Web Apps
An introduction to Azure Static Web Apps, that can host almost any flavor of static web app, and contain a generous free plan with SSL.
Penetration Testing — A Detailed Guide
Learn about the importance of penetration testing in securing your web applications. Find vulnerabilities before attackers exploit them.
Cloud Computing Security: A Primer
Learn about cloud computing security, challenges, and best practices. Stay ahead of cybersecurity threats with expert advice from Mend.io.
Patch Management Best Practices
TLearn about patch management best practices to protect your organization from vulnerabilities. Follow these eight practices.
Celebrating Pride: LGBTQ+ Open Source Projects and Programs We Love
Celebrate Pride with Mend's favorite LGBTQ+ open source projects and programs. Join the movement for equality & inclusivity in tech comunity
Research Shows Over 100,000 Libraries Affected By Maven Vulnerability CVE-2021-26291
Research reveals over 100,000 libraries affected by Maven vulnerability CVE-2021-26291. Learn about the risks, fixes, and implications.
How To Secure Docker Images With Encryption Through Containers
Learn how to secure Docker images with encryption through Containerd. Encrypt your Docker containers to protect sensitive data.
Supply Chain Security — 10 Tips That Won’t Slow Development Down
Learn how to protect your software development process from supply chain attacks with these 10 tips that won't slow down your development.
5 Steps to Get Your Developers to Care More About Security
Learn how to bridge the gap between developers and security with these 5 steps. Make security a top priority.
How To Manage Python Dependencies
Master Python dependency management with pip & explore alternatives like Pipenv and Poetry. Ensure secure, stable, and performant Python apps.
9 Best DevSecOps Tools To Integrate Throughout The DevOps Pipeline
Discover the 9 best DevSecOps tools to integrate into your DevOps pipeline. Learn how these tools can help you automate security, & more.
Docker Vs. Kubernetes: A Detailed Comparison
A detailed comparison of Docker vs. Kubernetes, explaining their differences and similarities. Learn how they complement each other.
Best Practices For Managing Docker Dependencies
Learn best practices for managing Docker dependencies to ensure reliable, consistent application performance.
Join our subscriber list to get the latest news and updates
Thanks for signing up!