Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
What is the KEV Catalog?
A quick guide to the Known Exploited Vulnerabilities (KEV) catalog.
What Is Application Security? Types, Tools and Best Practices
Explore our application security complete guide and find key trends, testing methods, best practices, and tools to safeguard your software.
Introducing the Mend AppSec Platform
The Mend AppSec platform offers customers everything needed to build proactive application security through one solution, at one price.
ASPM and Modern Application Security
Gartner's 2024 Hype Cycle for Application Security: ASPM moves from peak to trough.
Shining a Light on Shadow AI: What It Is and How to Find It
Find out more about shadow AI and the risks of leaving it uncovered.
Black Hat 2024: AI, AI, and Everything Else
Chris Lindsey shares his takeaways from another exciting Black Hat conference
Dude, Where’s My Documentation?
When the zero day hits the fan, can you find the information you need?
Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification
Explore LLMs in cybersecurity research: analyzing vulnerability data, sifting through CVE information, and enhancing digital safety.
A Guide to Open Source Software
Explore how to use open source software to innovate while minimizing risk.
Bigger Data, Bigger Problems: Three Major Challenges in Big Data Security
Discover the challenges of big data security: data sources, infrastructure, and technology issues, and how to keep your big data secure.
SAST – All About Static Application Security Testing
Learn about Static Application Security Testing (SAST). Understand the importance, benefits, & how to choose the right SAST tool for your org.
Dependency Management: Protecting Your Code
Learn how to protect your application’s code with dependency management, and why automation is critical for effective dependency updates.
More than 100K sites impacted by Polyfill supply chain attack
The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.
Dependency Management vs Dependency Updates: What’s the Difference?
Keeping dependencies up to date is a big part of dependency management, but it's not everything. Learn more about the differences between the two.
Hallucinated Packages, Malicious AI Models, and Insecure AI-Generated Code
Worried about attackers using AI models to write malicious code? Here are three other ways AI model use can lead to attacks.
In Modern AppSec, DevSecOps Demands Cultural Change
Learn about the cultural change needed for DevSecOps in modern AppSec. Discover how collaboration and innovation can improve security.
Join our subscriber list to get the latest news and updates
Thanks for signing up!