Mend.io Blog

You can’t rely on open source for security — not even when ai is involved

You can’t rely on open source for security — not even when AI is involved

LATEST
Learn more

Filter & Search

Top 15 security experts to follow on twitter - top 15 appsec experts to follow 1

Top 15 Security Experts to Follow on Twitter

Discover the top 15 security experts to follow on Twitter for the latest updates on application security. Engage with thought leaders.

Read More Read More
Top 15 security experts to follow on twitter - nist 400x850 2a

NIST 800-171 Sets New Standards for CUI Data Protection

Learn about NIST 800-171 standards for protecting Controlled Unclassified Information (CUI) and how they impact contractors.

Read More Read More
Top 15 security experts to follow on twitter - dollarphotoclub 67040756 scaled 1

Open Source vs. Free Software — What is The Difference?

Explore the difference between open source and free software in the tech industry. Learn about the origins, philosophies, and implications.

Read More Read More
Top 15 security experts to follow on twitter - migrating to cloud 1

How to Navigate Migrating to Cloud in a Regulated Environment

Learn strategies for compliance, risk management, and secure cloud adoption in financial and healthcare sectors.

Read More Read More
Top 15 security experts to follow on twitter - facebooke mit

Facebook React Finally Relicensed Under MIT Open Source License

Facebook React has been relicensed under the MIT Open Source License, replacing the controversial BSD + Patents license.

Read More Read More
Top 15 security experts to follow on twitter - the true story behind the equifax data breach 1

The Equifax Breach: Who’s to Blame?

Learn about the Equifax data breach, who's to blame, and the importance of staying on top of open source libraries and vulnerabilities.

Read More Read More
Top 15 security experts to follow on twitter - serverless security

What Risks Does Serverless Computing Pose to Your Application Security?

Explore the risks of serverless computing on application security. Learn how to navigate security concerns in the digital world.

Read More Read More
Top 15 security experts to follow on twitter - serverless computing

6 Reasons Serverless Computing Can Take the Cloud to the Next Level

Learn 6 key benefits, including scalability, cost efficiency, and multi-language support in serverless computing and the cloud industry.

Read More Read More
Top 15 security experts to follow on twitter - ai opens source 2

Leveraging AI for Open Source Management

Discover how AI is revolutionizing open source software management. Learn how automated solutions can help track, detect, and mitigate.

Read More Read More
Top 15 security experts to follow on twitter - bug bounty

3 Million Reasons Bug Bounty Programs are a Win-Win

Explore how bug bounty programs offer a win-win for cybersecurity, enabling companies to leverage global talent for robust app security.

Read More Read More
Top 15 security experts to follow on twitter - single page application

5 (Practical) Tips to Help You Secure Your Single Page Application

What is A Single Page Application Jeff Nibler describes Single Page Applications (SPAs) as the latest evolution in web application design. With SPAs, various JavaScript libraries and tools such as...

Read More Read More
Top 15 security experts to follow on twitter - 6 most vulnerable open source projects

Are You Using One of the Top 6 Most Vulnerable Open Source Projects?

Discover the top six vulnerable open source projects, including Apache Tomcat and Struts2, and learn why updating these components is crucial.

Read More Read More
Top 15 security experts to follow on twitter - continuouse tools

Comprehensive Comparison of Continuous Integration Tools

Explore a comprehensive comparison of popular Continuous Integration tools like Jenkins, TeamCity, Bamboo, Travis CI, and Microsoft TFS/VSTS.

Read More Read More
Top 15 security experts to follow on twitter - crowdsourcing

Crowdsourcing and Open Source – Friends or Foes?

Dive into the debate on crowdsourcing and open source. Understand their differences, similarities, and how they both leverage community wisdom

Read More Read More
Top 15 security experts to follow on twitter - misra iso 26262 1

MISRA and ISO 26262: Compliance Is Key to Security

Discover the importance of compliance with MISRA and ISO 26262 standards for security in the transportation industry.

Read More Read More
Top 15 security experts to follow on twitter - apache struts vulenrability whitesource 1

An Apache Struts Vulnerability You Really Need to Fix

Discover the latest Apache Struts vulnerability & how it can impact your application security. Learn how to fix it and protect your apps.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.