Mend.io Blog

Mend. Io expands ai native appsec to windsurf, copilot, claude code, and amazon q developer

Mend.io Expands AI Native AppSec to Windsurf, CoPilot, Claude Code, and Amazon Q Developer

LATEST
Learn more

Filter & Search

Quick guide to popular ai licenses - quick guide to popular ai licenses

Quick Guide to Popular AI Licenses

Not all "open" AI licenses are truly open source. Learn more about the most popular licenses on Hugging Face.

Read More Read More
Quick guide to popular ai licenses - broken nvd 1

NVD Update: Help Has Arrived

There's hope yet for the world's most beleaguered vulnerability database.

Read More Read More
Quick guide to popular ai licenses - threat hunting report img

Threat Hunting 101: Five Common Threats to Look For

Learn more about supply chain threats and where to find them.

Read More Read More
Quick guide to popular ai licenses - guide to the rail family of ai licenses

Responsible AI Licenses (RAIL): Here’s What You Need to Know

Learn about this family of licenses that seek to limit harmful use of AI models.

Read More Read More
Quick guide to popular ai licenses - broken nvd 1

NVD Update: More Problems, More Letters, Some Questions Answered

We're not saying the NVD is dead but it's not looking good.

Read More Read More
Quick guide to popular ai licenses - getting started with dependency management

Getting Started with Software Dependency Management

Discover the benefits of keeping your software dependencies up-to-date. Learn how to manage dependencies effectively.

Read More Read More
Quick guide to popular ai licenses - mend and sysdig launch joint solution for container security

Mend.io and Sysdig Launch Joint Solution for Container Security

Learn how the Mend.io and Sysdig integration boosts container security by combining runtime insights and vulnerability prioritization.

Read More Read More
Quick guide to popular ai licenses - how do i protect my ai model blog

How Do I Protect My AI Model?

Learn essential strategies to secure your AI models from theft, denial of service, and other threats, covering copyright issues, risk management, and secure storage practices

Read More Read More
Quick guide to popular ai licenses - owasp oss risk top ten blog

Quick Guide to the OWASP OSS Risk Top 10

Learn about the top 10 risks of open source software, beyond just CVEs. From known vulnerabilities to unapproved changes.

Read More Read More
Quick guide to popular ai licenses - large blog

Why an SBOM Audit is Vital to Application Security and Compliance

Learn the importance of an SBOM for enhancing application security and compliance. Explore best practices for creating and auditing SBOMs effectively.

Read More Read More
Quick guide to popular ai licenses - what makes containers vulnerable

What Makes Containers Vulnerable?

Learn about the vulnerabilities that containers bring to your applications and how to address them to keep attackers at bay.

Read More Read More
Quick guide to popular ai licenses - nvd backlog triggers public response from cybersec leaders

NVD’s Backlog Triggers Public Response from Cybersec Leaders

The National Vulnerability Database's backlog triggers a public response from cybersecurity leaders. Concerns raised, open letter to Congress

Read More Read More
Quick guide to popular ai licenses - owasp top 10 llm application vulnerabilities

OWASP Top 10 for LLM Applications: A Quick Guide

Discover the OWASP Top 10 for LLM Applications in this comprehensive guide. Learn about vulnerabilities, & prevention techniques.

Read More Read More
Quick guide to popular ai licenses - hugging face blog

What You Need to Know About Hugging Face

Stay informed about the risks and challenges of AI models with Hugging Face. Learn how to identify and secure AI-generated code.

Read More Read More
Quick guide to popular ai licenses - shrinking security debt with dependency management white paper

Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise 1

Discover how CVE-2024-3094 affects XZ Utils and enables SSH compromise. Get insights on detection, mitigation, and system security.

Read More Read More
Quick guide to popular ai licenses - blog 2 1

Over 100 Malicious Packages Target Popular ML PyPi Libraries

Discover the latest security threat as over 100 malicious packages target popular ML PyPi libraries. Learn about the attack methods.

Read More Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!