Mend.io Blog

You can’t rely on open source for security — not even when ai is involved

You can’t rely on open source for security — not even when AI is involved

LATEST
Learn more

Filter & Search

Iot application security - internet of things

IoT Application Security

Learn about the importance of IoT application security and the risks associated with vulnerabilities.

Read More Read More
Iot application security - whens the right time for an open source audit

When’s the Right Time for an Open Source Audit?

Learn about the importance of open source audits to gain visibility, compliance, and security. Understand when and why you need an audit.

Read More Read More
Iot application security - itemeditorimage 5b321692d95bf

3 Key Considerations for DevOps Automation

Learn about the 3 key considerations for DevOps automation. Understand the importance of automation tools in achieving agile goals.

Read More Read More
Iot application security -

Software Development Life Cycle: Finding a Model That Works

Learn about different software development life cycle models like Waterfall, Agile, and Hybrid.

Read More Read More
Iot application security - secure coding a practical guide

Secure Coding: A Practical Guide

Learn about the importance of secure coding in software development. Discover practical tips and principles to ensure your code is secure.

Read More Read More
Iot application security - scanners2

Advance From Open Source Code Scanner to Software Composition Analysis Solution

Discover why it's essential to advance from open source code scanners to software composition analysis solutions. Learn about the pitfalls of outdated scanners and the benefits of modern tools.

Read More Read More
Iot application security - 100 million court case for open source license compliance post

The $100 Million Court Case for Open Source License Compliance

Discover the $100 million court case for open source license compliance between CoKinetic Systems and Panasonic.

Read More Read More
Iot application security - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvly2u2njewyzvim2uucg5njnzlcnnpb249mdawmczzawc9zdy2mty1njrjyzrhzta3owfmngm4mmvmzthlmtk5nzi

Forrester’s State of Application Security, 2020: Key Takeaways

Discover Forrester’s key findings on application security in 2020. Learn why app vulnerabilities are a major threat and how to strengthen your security practices.

Read More Read More
Iot application security - gdpr

How Does GDPR Impact Open Source Security Expectations?

Learn about how GDPR impacts open source security expectations and the importance of using automated Software Composition Analysis tools to ensure compliance and protect user data.

Read More Read More
Iot application security - devsecops vs secdevops post

DevSecOps vs. SecDevOps: A Rose by Any Other Name?

Explore the difference between DevSecOps and SecDevOps. Learn how security practices have evolved in the software development life cycle.

Read More Read More
Iot application security -

May Open Source Security Vulnerabilities Snapshot

Stay up to date with May's open source security vulnerabilities. Learn about common vulnerabilities, severity breakdown, and more.

Read More Read More
Iot application security - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvjzde0njzmogjjodiuanbnjnzlcnnpb249mdawmczzawc9ztzkmja1ndbknme5ndayzgy4zgq5mjdizmu2ywzim2i

Top Tools and Tips to Improve Your DevOps Pipeline

Discover top tools and tips to enhance your DevOps pipeline. Learn about CI/CD, security, and automation for successful software development.

Read More Read More
Iot application security - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvlywfhzmvjmjziotyucg5njnzlcnnpb249mdawmczzawc9zmfkzwmzywi3ywvingu5ndg5mte3nwmyzdk5zwu2zte

Observability: What You Need to Know

Learn about observability in DevOps and IT. Understand the importance of observability in today's complex software systems.

Read More Read More
Iot application security -

Open Source Analysis Extends Your Visibility

Discover how open source analysis can extend your visibility into your codebase, manage components, and mitigate security risks.

Read More Read More
Iot application security - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvlogm5yziynty0otyucg5njnzlcnnpb249mdawmczzawc9ndcwyzlmm2nizti4nzjhmme0zwywnmy1ymrlodqzymu

April Open Source Security Vulnerabilities Snapshot

Stay up to date with April's OSS Vulnerabilities Snapshot. Learn about the rise in vulnerabilities, severity breakdown, top CWEs, and more.

Read More Read More
Iot application security - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvjytm0nmrjowy5mtyuanbnjnzlcnnpb249mdawmczzawc9ndyzm2jkyznmzdzinjg0ntyzndbmm2i5zwezytmzy2e

Mastering Kubernetes Pod Security Best Practices

Learn about Kubernetes pod security policies and best practices for securing your Kubernetes environment.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.