Security Testing in 2025: Testing Apps, AI, Cloud Native, and More
Learn about key trends in modern security and the OWASP Top 10.
The Top 10 Questions about the GPL License – Answered!
Learn about the GPL License and its compliance requirements.
What Are OWASP Top 10 Threats & When Will the Top 10 Be Updated?
Stay updated on the latest in application security with the OWASP Top 10 vulnerabilities.
Why AI Red Teaming Is the Next Must-Have in Enterprise Security
Learn why red teaming is key to securing today’s enterprise AI systems.
Application Security Testing: Security Scanning and Runtime Protection Tools
Learn about the differences between security scanning and runtime protection in application security testing. Explore tools and tech.
Best AI Red Teaming Providers: Top 5 Vendors in 2025
AI Red Teaming providers are specialized companies that simulate adversarial attacks on AI systems to uncover vulnerabilities, biases, and harmful behaviors before these systems are deployed.
OWASP Dependency Check: How Does It Work?
Learn how OWASP Dependency Check helps secure open source components.
Top Ten Tips to Choose a Great SAST Tool
The top ten tips for choosing a SAST tool for application security. Integration, automation, and scalability are key factors to consider.
Dynamic Application Security Testing: DAST Basics
Learn about dynamic application security testing (DAST).
Best AI Red Teaming Companies: Top 10 Providers in 2025
AI Red Teaming companies help software and security teams to better understand how their AI application behaves under adversarial attacks.
Introducing Mend’s Integration with Microsoft Defender for Cloud
Mend.io now integrates with Microsoft Defender for Cloud, bringing intelligent open source security insights into cloud workflows.
Top AI Red Teaming Solutions and How to Choose
Learn what AI red teaming solutions solve, how they work, and how to choose the right fit.
Mend.io & HeroDevs Partnership: Eliminate Risks in Deprecated Package
Announcing an exclusive partnership between Mend.io and HeroDevs to provide support for deprecated packages.
Vector and Embedding Weaknesses in AI Systems
Learn how to secure embeddings against poisoning, leakage, and inversion attacks.
MITRE CVE Program Uncertainty: Mend.io’s commitment to uninterrupted vulnerability protection
Mend.io continues to deliver uninterrupted, multi-source vulnerability protection.
The Value Dashboard: Measure and Showcase Your Security Impact
Track, measure, and prove your AppSec impact with the Mend.io Value Dashboard.
Join our subscriber list to get the latest news and updates
Thanks for signing up!