Mend.io Blog

Npm supply chain attack: sophisticated multi-chain cryptocurrency drainer infiltrates popular packages

NPM Supply Chain Attack: Sophisticated Multi-Chain Cryptocurrency Drainer Infiltrates Popular Packages

LATEST
Learn more

Filter & Search

Don't treat dast like dessert - dont treat dast like dessert post

Don’t Treat DAST Like Dessert

DAST is an essential part of a nutritious application security diet—not just a once-a-quarter treat.

Read More Read More
Don't treat dast like dessert - power of platform native consolidation in appsec blog

The Power of Platform-Native Consolidation in Application Security

Streamline workflows, consolidate data, boost security posture, and empower developers to focus on innovation.

Read More Read More
Don't treat dast like dessert - ai and aws blog 1

What is the KEV Catalog?

A quick guide to the Known Exploited Vulnerabilities (KEV) catalog.

Read More Read More
Don't treat dast like dessert - application security the complete guide blog post

Application Security — The Complete Guide

Explore our application security complete guide and find key trends, testing methods, best practices, and tools to safeguard your software.

Read More Read More
Don't treat dast like dessert - introducing the mend appsec platform blog post

Introducing the Mend AppSec Platform

The Mend AppSec platform offers customers everything needed to build proactive application security through one solution, at one price.

Read More Read More
Don't treat dast like dessert - hype cycle aspm overview blog post

ASPM and Modern Application Security

Gartner's 2024 Hype Cycle for Application Security: ASPM moves from peak to trough.

Read More Read More
Don't treat dast like dessert - blog shining a light on shadow ai

Shining a Light on Shadow AI: What It Is and How to Find It

Find out more about shadow AI and the risks of leaving it uncovered.

Read More Read More
Don't treat dast like dessert - blackhat 2024 blog

Black Hat 2024: AI, AI, and Everything Else

Chris Lindsey shares his takeaways from another exciting Black Hat conference

Read More Read More
Don't treat dast like dessert - wheres my documentation blog

Dude, Where’s My Documentation?

When the zero day hits the fan, can you find the information you need?

Read More Read More
Don't treat dast like dessert - ai and aws blog 1

Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification

Explore LLMs in cybersecurity research: analyzing vulnerability data, sifting through CVE information, and enhancing digital safety.

Read More Read More
Don't treat dast like dessert - a guide to open source software

A Guide to Open Source Software

Explore how to use open source software to innovate while minimizing risk.

Read More Read More
Don't treat dast like dessert - big data sea

Bigger Data, Bigger Problems: Three Major Challenges in Big Data Security

Discover the challenges of big data security: data sources, infrastructure, and technology issues, and how to keep your big data secure.

Read More Read More
Don't treat dast like dessert - sast all about static application security testing post

SAST – All About Static Application Security Testing

Learn about Static Application Security Testing (SAST). Understand the importance, benefits, & how to choose the right SAST tool for your org.

Read More Read More
Don't treat dast like dessert - dependency management protecting your code post

Dependency Management: Protecting Your Code

Learn how to protect your application’s code with dependency management, and why automation is critical for effective dependency updates.

Read More Read More
Don't treat dast like dessert - polyfill supply chain attack post

More than 100K sites impacted by Polyfill supply chain attack

The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.

Read More Read More
Don't treat dast like dessert - dependency management vs dependency updates whats the difference

Dependency Management vs Dependency Updates: What’s the Difference?

Keeping dependencies up to date is a big part of dependency management, but it's not everything. Learn more about the differences between the two.

Read More Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!