Mend.io Blog

You can’t rely on open source for security — not even when ai is involved

You can’t rely on open source for security — not even when AI is involved

LATEST
Learn more

Filter & Search

Software supply chain attacks - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzywmmu1njg5mze4mgmucg5njnzlcnnpb249mdawmczzawc9odc0zgyznmewyti0mmjjy2y2ogrkzgy1ztq0zjeyzgu

Software Supply Chain Attacks

Discover the dangers of software supply chain. Learn how they work, why they are so dangerous, and how to strengthen them.

Read More Read More
Software supply chain attacks - azuredevops hero

Azure DevOps Services – Security Checklist

Control access, visibility, protect repositories, review audit logs, implement WAFs, with our Azure DevOps security checklist.

Read More Read More
Software supply chain attacks - nosql

When to Consider a NoSQL vs Relational Database

Learn when to consider using a NoSQL vs relational database in your org. Understand the benefits & where NoSQL may be the better option.

Read More Read More
Software supply chain attacks - using npm to install a specific version of a node. Js package

npm: How To Install A Specific Version of Node.js Package

Learn how to install a specific version of a Node.js package using npm, & check versions, install older versions, & use semantic versioning.

Read More Read More
Software supply chain attacks - rspa 1

RASP: The What, Why and How

Explore the world of RASP - Runtime Application Self-Protection in this informative blog post. Learn why developers need it.

Read More Read More
Software supply chain attacks - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvkntuym2rmnwy3ytguanbnjnzlcnnpb249mdawmczzawc9yzu0mzjingfindk5mmrkzta3ztiyotllzjfhzwiwnmq

Serverless Security Explained

Learn about serverless security in the cloud ecosystem, including best practices like staying up to date, least privilege, and more.

Read More Read More
Software supply chain attacks - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvhzjjmyzgzzdfinguuanbnjnzlcnnpb249mdawmczzawc9mju4mzhkyjc5nte2yjizodjly2q5mjbjywuzzgqwoda

Top 3 Open Source Risks and How to Beat Them

Discover the top 3 open source risks: security vulnerabilities, licensing compliance, and quality issues. Learn how to mitigate these risks.

Read More Read More
Software supply chain attacks - itemeditorimage 601bd3b6e3633

Gray Box Testing Guide

Discover the comprehensive guide to gray box testing, a blend of black and white box methods, to enhance your application's security.

Read More Read More
Software supply chain attacks - docker friends

What Are Docker Containers, and Should Your Company Adopt It?

Learn about Docker containers and whether your company should adopt them. Discover the benefits, challenges, and security considerations.

Read More Read More
Software supply chain attacks -

Microservices Architecture: Security Strategies and Best Practices

Learn about microservices architecture and the security strategies and best practices needed to protect your organization's systems.

Read More Read More
Software supply chain attacks - api security in a digitally transformed world blog

API Security in a Digitally Transformed World

Learn about API security. Understand the importance of securing APIs and the best practices to protect your organization.

Read More Read More
Software supply chain attacks - blog pic

White Hat Hacking – Not What You Expect

Discover the world of white hat hacking and the importance of ethical hackers in open source projects.

Read More Read More
Software supply chain attacks - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzywmdazzdnmytq4mwmucg5njnzlcnnpb249mdawmczzawc9nddhm2y3ytk4nguynzdjodzmzjm2yjiynzzjmgmzn2e

How to Set Up an Open Source Strategy

Learn how to set up an open source strategy for your software development org. Understand the key considerations, and implementation steps..

Read More Read More
Software supply chain attacks -

CVE (Common Vulnerabilities and Exposures) — What is it and how to understand it

What are CVEs and how are they published? What kind of information do CVEs offer about security vulnerabilities in publicly released software?

Read More Read More
Software supply chain attacks - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvmzjzkytaxnme5otuuanbnjnzlcnnpb249mdawmczzawc9nda0otg1mwq1ndu5odg5odhlmdy2mwrjzdkwmzdhyzq

The 10 Best Security Conferences to Attend in 2021

Discover the top 10 security conferences to attend in 2021, whether in-person or virtually.

Read More Read More
Software supply chain attacks -

Top 10 Open Source Vulnerabilities In 2020

Discover the top 10 open source vulnerabilities in 2020, including Lodash, Jackson-databind, HtmlUnit, and more.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.