Three New Supply Chain Attack Methods You Should Be Aware Of
Learn about Imposter Library, Brandjacking, and Security Research Smokescreen methods. Stay informed on the latest supply chain attack methods.
Overcoming Software Supply Chain Risk
Discover how to overcome software supply chain risk in the development landscape. Gain control and visibility over your software components.
How To Secure Your SDLC The Right Way
Learn how to secure your software development life cycle (SDLC). Discover the importance of integrating security throughout the SDLC.
Developer Security Champions Rule the DevSecOps Revolution
Discover how developer security champions play a crucial role in the DevSecOps revolution, promoting secure coding best practices.
Welcome to Mend, Diffend!
Mend welcomes Diffend, an innovative software supply chain security service, to improve open source risk management.
Docker Image Security Scanning: What It Can and Can’t Do
Learn about Docker image security scanning and its limitations. Understand how scanning works, why it's important, and more.
All About Mend’s 2021 Open Source Security Vulnerabilities Report
Learn all about Mend's 2021 Open Source Security Vulnerabilities Report, including new challenges, common vulnerabilities, and more.
About Open Source Vulnerability Scanning & Why You Need It
Learn why open source vulnerability scanning is crucial for your software security. Find out how to select the best scanner.
Finding the Best Coding Easter Eggs
Discover the best coding Easter eggs in this blog post by Mend.io. From Google search to Mozilla Firefox, uncover hidden surprises in tech.
Forrester’s State Of Application Security Report, 2021: Key Takeaways
Forrester's State Of Application Security Report for 2021 highlights key trends and recommendations for effective AppSec strategies in a rapidly evolving digital world.
3 Reasons Why Open Source Software is More Secure than Commercial Software
Discover why open source software is often more secure than commercial software, and the benefits of using open source components.
Top 3 Open Source Risks And How To Overcome Them
Learn about the top 3 open source risks and how to overcome them. Discover security, licensing compliance, and quality risks.
The Top 10 Linux Kernel Vulnerabilities You Must Know
Stay informed about the most critical Linux kernel vulnerabilities. Our guide covers the top 10 CVEs and offers tips for maintaining security.
Mend on Mend
Discover how Mend practices what they preach by using their own software to develop secure products.
The Internet of Things Is Everywhere. Are You Secure?
Discover the importance of securing your IoT devices with tips on network and device security, application layer protection.
Your Guide to Open Source vs. Proprietary Software Security
Learn about the differences between open source and proprietary software security in this comprehensive guide.
Join our subscriber list to get the latest news and updates
Thanks for signing up!