Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase
MCP adoption is surging across industries, fundamentally reshaping how systems connect to AI models.
Security Testing in 2025: Testing Apps, AI, Cloud Native, and More
Learn about key trends in modern security and the OWASP Top 10.
The Top 10 Questions about the GPL License – Answered!
Learn about the GPL License and its compliance requirements.
What Are OWASP Top 10 Threats & When Will the Top 10 Be Updated?
Stay updated on the latest in application security with the OWASP Top 10 vulnerabilities.
Why AI Red Teaming Is the Next Must-Have in Enterprise Security
Learn why red teaming is key to securing today’s enterprise AI systems.
Application Security Testing: Security Scanning and Runtime Protection Tools
Learn about the differences between security scanning and runtime protection in application security testing. Explore tools and tech.
Best AI Red Teaming Providers: Top 5 Vendors in 2025
AI Red Teaming providers are specialized companies that simulate adversarial attacks on AI systems to uncover vulnerabilities, biases, and harmful behaviors before these systems are deployed.
OWASP Dependency Check: How Does It Work?
Learn how OWASP Dependency Check helps secure open source components.
Top Ten Tips to Choose a Great SAST Tool
The top ten tips for choosing a SAST tool for application security. Integration, automation, and scalability are key factors to consider.
Dynamic Application Security Testing: DAST Basics
Learn about dynamic application security testing (DAST).
Best AI Red Teaming Companies: Top 10 Providers in 2025
AI Red Teaming companies help software and security teams to better understand how their AI application behaves under adversarial attacks.
Introducing Mend’s Integration with Microsoft Defender for Cloud
Mend.io now integrates with Microsoft Defender for Cloud, bringing intelligent open source security insights into cloud workflows.
Top AI Red Teaming Solutions and How to Choose
Learn what AI red teaming solutions solve, how they work, and how to choose the right fit.
Mend.io & HeroDevs Partnership: Eliminate Risks in Deprecated Package
Announcing an exclusive partnership between Mend.io and HeroDevs to provide support for deprecated packages.
Vector and Embedding Weaknesses in AI Systems
Learn how to secure embeddings against poisoning, leakage, and inversion attacks.
MITRE CVE Program Uncertainty: Mend.io’s commitment to uninterrupted vulnerability protection
Mend.io continues to deliver uninterrupted, multi-source vulnerability protection.
Never miss a post. Opt-out at any time.
You’re all set to receive our latest posts.
Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.