Mend.io Blog

Mend. Io expands ai native appsec to windsurf, copilot, claude code, and amazon q developer

Mend.io Expands AI Native AppSec to Windsurf, CoPilot, Claude Code, and Amazon Q Developer

LATEST
Learn more

Filter & Search

Owasp dependency check: how does it work? - blog owasp dependency check

OWASP Dependency Check: How Does It Work?

Learn how OWASP Dependency Check helps secure open source components.

Read More Read More
Owasp dependency check: how does it work? - blog image top ten tips to choose a great sast tool@2x

Top Ten Tips to Choose a Great SAST Tool

The top ten tips for choosing a SAST tool for application security. Integration, automation, and scalability are key factors to consider.

Read More Read More
Owasp dependency check: how does it work? - dynamic application security testing dast basics 1

Dynamic Application Security Testing: DAST Basics

Learn about dynamic application security testing (DAST).

Read More Read More
Owasp dependency check: how does it work? - best ai red teaming companies top 10 providers in 2025@2x

Best AI Red Teaming Companies: Top 10 Providers in 2025

AI Red Teaming companies help software and security teams to better understand how their AI application behaves under adversarial attacks.

Read More Read More
Owasp dependency check: how does it work? - blog microsoft partnership

Introducing Mend’s Integration with Microsoft Defender for Cloud

Mend.io now integrates with Microsoft Defender for Cloud, bringing intelligent open source security insights into cloud workflows.

Read More Read More
Owasp dependency check: how does it work? - blog image red teaming solutions 1

Top AI Red Teaming Solutions and How to Choose

Learn what AI red teaming solutions solve, how they work, and how to choose the right fit.

Read More Read More
Owasp dependency check: how does it work? - mend and herodevs partnership

Mend.io & HeroDevs Partnership: Eliminate Risks in Deprecated Package

Announcing an exclusive partnership between Mend.io and HeroDevs to provide support for deprecated packages.

Read More Read More
Owasp dependency check: how does it work? - vector and embedding weakness blog post

Vector and Embedding Weaknesses in AI Systems

Learn how to secure embeddings against poisoning, leakage, and inversion attacks.

Read More Read More
Owasp dependency check: how does it work? - mitre cve program uncertainty blog

MITRE CVE Program Uncertainty: Mend.io’s commitment to uninterrupted vulnerability protection

Mend.io continues to deliver uninterrupted, multi-source vulnerability protection.

Read More Read More
Owasp dependency check: how does it work? - introducing the value dashboard blog post

The Value Dashboard: Measure and Showcase Your Security Impact

Track, measure, and prove your AppSec impact with the Mend.io Value Dashboard.

Read More Read More
Owasp dependency check: how does it work? - ai governance blog post

AI Governance in AppSec: The More Things Change, The More They Stay the Same

Learn how AppSec teams can extend existing security and compliance practices seamlessly to AI.

Read More Read More
Owasp dependency check: how does it work? - mend ai premium

Introducing Mend AI Premium

Robust AI governance and threat detection with Mend AI Premium.

Read More Read More
Owasp dependency check: how does it work? - the top 11 web vulnerability scanners

The Top 11 Web Vulnerability Scanners

Discover the top 11 web vulnerability scanners and learn why they are essential for protecting your web applications from hackers.

Read More Read More
Owasp dependency check: how does it work? - securing ai and ai security blog post

Securing AI vs AI for security: What are we talking about?

This post breaks down the differences between securing AI, secure AI use, AI for security, and AI safety.

Read More Read More
Owasp dependency check: how does it work? - truffelvscode blog post

Fake VS Code Extension on npm Spreads Multi-Stage Malware

Learn about a fake VS-code extension on npm—truffelvscode—typosquatting the popular truffle for VS-code extension.

Read More Read More
Owasp dependency check: how does it work? - owasp top 10 llm application vulnerabilities

2025 OWASP Top 10 for LLM Applications: A Quick Guide

An overview of the top vulnerabilities affecting large language model (LLM) applications.

Read More Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!