Mend.io Blog

You can’t rely on open source for security — not even when ai is involved

You can’t rely on open source for security — not even when AI is involved

LATEST
Learn more

Filter & Search

4 steps developers should take to use npm securely - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvkzjbmztdjmjeyodgucg5njnzlcnnpb249mdawmczzawc9mmeymjmzyjhlytgyywjimzaznmjiyjfin2y2otkwodi

4 Steps Developers Should Take To Use npm Securely

Discover 4 essential steps developers should take to enhance npm security. Learn how to manage npm packages, update packages, & more.

Read More Read More
4 steps developers should take to use npm securely - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvkzgu5nwq1mzi5ytaucg5njnzlcnnpb249mdawmczzawc9otazntljzji3zjdlnguxmdm5ztm5yzgxndqyowm3otc

5 Free Developer Tools We’re Grateful For

Discover five free developer tools that support DevSecOps and help developers create secure, high-quality software.

Read More Read More
4 steps developers should take to use npm securely -

Welcome to Mend, Renovate!

Mend Renovate offers a free open-source tool for updating dependencies, crucial for application security. Stay up-to-date and secure.

Read More Read More
4 steps developers should take to use npm securely - 8 inb

Renovate is Now Part of Mend

Renovate is now part of Mend, offering free developer tools. Strengthened open source, free offerings.

Read More Read More
4 steps developers should take to use npm securely - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvkymfjnjawotuyodkucg5njnzlcnnpb249mdawmczzawc9otk2ywizoti3yzdlmtcynjc3ywm5ngiwnta4yzi1oda

Fitting Continuous Testing Into Your DevOps Pipeline

Learn how to fit continuous testing into your DevOps pipeline to streamline software development, improve quality, & shorten release cycles.

Read More Read More
4 steps developers should take to use npm securely - go

GO Modules Vulnerability Disclosure

Learn about the GO Modules Vulnerability Disclosure by Renovate, how the issue was resolved, and the improvements made to enhance security.

Read More Read More
4 steps developers should take to use npm securely - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvkytgzm2vhzgy5zgeucg5njnzlcnnpb249mdawmczzawc9ogm0mgiwy2y4yjbmntc0yzc5mwnhzwu2mgnlnthknju

Sudo Vulnerability Cheat Sheet: Learn All About CVE-2019-14287

Learn all about the Sudo vulnerability CVE-2019-14287. Find out how it works and how to protect your system.

Read More Read More
4 steps developers should take to use npm securely - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvkowywzgu2ogy0ngmucg5njnzlcnnpb249mdawmczzawc9oti1zjg3mdi5mtc0zgi5nwvjzdi1ogziywrjymi3nda

Container Security Scanning — Top Tools You Should Already Be Using

Learn about the top container security tools you should be using to secure your containerized applications.

Read More Read More
4 steps developers should take to use npm securely -

Mend for Developers: New Integrations for GitLab Core and Eclipse IDE

Discover new integrations for GitLab Core & Eclipse IDE with Mend for Developers, enabling secure coding practices & vulnerability management.

Read More Read More
4 steps developers should take to use npm securely -

Top 5 Git Security Mistakes

Learn about the top 5 Git security mistakes to avoid compromising your code and repositories.

Read More Read More
4 steps developers should take to use npm securely - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvkodm0ogrjztzkn2iucg5njnzlcnnpb249mdawmczzawc9zjrmnda4ndq0njy0otcyy2u1mzyzogu2zde1ytnmnje

Security Advisories Play a Critical Role in Keeping Our Software Safe

Learn about security advisories. Discover popular advisories like Microsoft Security, National Vulnerability Database, and Apache Security.

Read More Read More
4 steps developers should take to use npm securely -

Security Automation: Where Does It Fit In Your Secure SDLC?

Discover the importance of security automation in your Secure SDLC. Learn how to use automated tools to enhance your software development.

Read More Read More
4 steps developers should take to use npm securely - ahviptcynte0jmntzd1pdgvtzwrpdg9yaw1hz2umzmlszw5hbwu9axrlbwvkaxrvcmltywdlxzvkmjcyndm5y2iwmzcuanbnjnzlcnnpb249mdawmczzawc9mjm3owrmzwe0ztu0zdfkmdjkzmuyownmndcynjg2mju3d

Introducing Mend Advise for IntelliJ IDEA

Discover Mend Advise for IntelliJ IDEA, a new tool for developers to identify and manage vulnerabilities in open source components.

Read More Read More
4 steps developers should take to use npm securely -

Top 5 Go Vulnerabilities That You Should Know

Discover the top 5 vulnerabilities in Google's Go programming language that developers should be aware of to secure their products.

Read More Read More
4 steps developers should take to use npm securely -

Top 5 New Open Source Security Vulnerabilities in May 2019

The top 5 new open source security vulnerabilities in May 2019, including SQLite, Symfony, Linux kernel, fstream, and ecstatic.

Read More Read More
4 steps developers should take to use npm securely -

Docker Container Monitoring: Protect Your Investment

Learn how to effectively monitor Docker containers to protect your investment. Understand the challenges, what to monitor, and tools.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.