Mend.io Blog

Introducing system prompt hardening: production-ready protection for system prompts

Introducing System Prompt Hardening: production-ready protection for system prompts

LATEST
Learn more

Filter & Search

What is ai penetration testing and 5 techniques - blog image ai pen testing

What Is AI Penetration Testing and 5 Techniques

Explore AI penetration testing and five essential techniques.

Read More Read More
What is ai penetration testing and 5 techniques - application security the complete guide blog post 2048x1334. Png

Best Application Security Testing Tools: Top 10 Tools in 2025

Learn how AST tools secure software and how to choose the right one.

Read More Read More
What is ai penetration testing and 5 techniques - blog best sast solutions

Best SAST Solutions: How to Choose Between the Top 12 Tools in 2025

Explore the best SAST tools of 2025.

Read More Read More
What is ai penetration testing and 5 techniques - blog pr image cursor mend

Securing AI code at the source: Mend.io now integrates with Cursor AI Code Editor

Mend.io now integrates with Cursor to secure AI-generated code in real time

Read More Read More
What is ai penetration testing and 5 techniques - blog image kubernetes security risks and critical best practices@2x

Kubernetes Security Risks and Critical Best Practices

Learn about Kubernetes Security Best Practices, a crucial aspect of managing containerized workflows at scale.

Read More Read More
What is ai penetration testing and 5 techniques - linkedin ai security 1

AI Security Guide: Protecting models, data, and systems from emerging threats

Learn how to protect AI systems with practical strategies and security frameworks.

Read More Read More
What is ai penetration testing and 5 techniques - blog image cover shadow ai

Shadow AI: Examples, Risks, and 8 Ways to Mitigate Them

Uncover the hidden risks of Shadow AI and learn 8 key strategies to address it.

Read More Read More
What is ai penetration testing and 5 techniques - sast solutions blog graphic

Best SAST Tools: Top 10 Solutions Compared

Discover the top 10 Static Application Security Testing (SAST) Tools.

Read More Read More
What is ai penetration testing and 5 techniques - shadow mcp blog graphic

The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase

MCP adoption is surging across industries, fundamentally reshaping how systems connect to AI models.

Read More Read More
What is ai penetration testing and 5 techniques - application security β€” the complete guide

Security Testing in 2025: Testing Apps, AI, Cloud Native, and More

Learn about key trends in modern security and the OWASP Top 10.

Read More Read More
What is ai penetration testing and 5 techniques - top 10 questions about the gpl license answered post

The Top 10 Questions about the GPL License – Answered!

Learn about the GPL License and its compliance requirements.

Read More Read More
What is ai penetration testing and 5 techniques - the 2021 owasp top 10 post

What Are OWASP Top 10 Threats & When Will the Top 10 Be Updated?

Stay updated on the latest in application security with the OWASP Top 10 vulnerabilities.

Read More Read More
What is ai penetration testing and 5 techniques - red teaming blog graphic

Why AI Red Teaming Is the Next Must-Have in Enterprise Security

Learn why red teaming is key to securing today’s enterprise AI systems.

Read More Read More
What is ai penetration testing and 5 techniques - ast security scanning blog post

Application Security Testing: Security Scanning and Runtime Protection Tools

Learn about the differences between security scanning and runtime protection in application security testing. Explore tools and tech.

Read More Read More
What is ai penetration testing and 5 techniques - blog image red teaming providers 1

Best AI Red Teaming Providers: Top 5 Vendors in 2025

AI Red Teaming providers are specialized companies that simulate adversarial attacks on AI systems to uncover vulnerabilities, biases, and harmful behaviors before these systems are deployed.

Read More Read More
What is ai penetration testing and 5 techniques - blog owasp dependency check

OWASP Dependency Check: How Does It Work?

Learn how OWASP Dependency Check helps secure open source components.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

Mend.io @ RSAC 2026

See what’s next for AI Security Testing and AppSec.