Mend.io Blog

Poisoned axios: npm account takeover, 50 million downloads, and a rat that vanishes after install

Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install

LATEST
Learn more

Filter & Search

Infrastructure as code: how it works & top tools in 2025 - iac blog

Infrastructure as Code: How It Works & Top Tools in 2025

Learn about Infrastructure as Code (IaC) best practices, benefits, and tools.

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - all about rag blog post

All About RAG: What It Is and How to Keep It Secure

Learn about retrieval-augmented generation, one complex AI system that developers are using.

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - understanding software dependency package health post

Vital Signs of Software Dependencies: Understanding Package Health

Learn how package health data empowers developers to update safely and efficiently.

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - blog its cybersecurity awareness month lets talk appsec

It‘s Cybersecurity Awareness Month-Let‘s Talk AppSec

October is Cybersecurity Awareness Month. Learn how to protect your software and reduce risks with AppSec tips.

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - cybersecurity awareness month blog post

Cybersecurity Awareness Month: AI Safety for Friends and Family

This blog is for your friends and family working outside of the security and technical industries.

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - dont treat dast like dessert post

Don’t Treat DAST Like Dessert

DAST is an essential part of a nutritious application security diet—not just a once-a-quarter treat.

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - power of platform native consolidation in appsec blog

The Power of Platform-Native Consolidation in Application Security

Streamline workflows, consolidate data, boost security posture, and empower developers to focus on innovation.

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - ai and aws blog 1

What is the KEV Catalog?

A quick guide to the Known Exploited Vulnerabilities (KEV) catalog.

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - application security the complete guide blog post

What Is Application Security? Types, Tools and Best Practices

Explore our application security complete guide and find key trends, testing methods, best practices, and tools to safeguard your software.

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - introducing the mend appsec platform blog post

Introducing the Mend AppSec Platform

The Mend AppSec platform offers customers everything needed to build proactive application security through one solution, at one price.

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - hype cycle aspm overview blog post

ASPM and Modern Application Security

Gartner's 2024 Hype Cycle for Application Security: ASPM moves from peak to trough.

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - blog shining a light on shadow ai

Shining a Light on Shadow AI: What It Is and How to Find It

Find out more about shadow AI and the risks of leaving it uncovered.

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - blackhat 2024 blog

Black Hat 2024: AI, AI, and Everything Else

Chris Lindsey shares his takeaways from another exciting Black Hat conference

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - wheres my documentation blog

Dude, Where’s My Documentation?

When the zero day hits the fan, can you find the information you need?

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - ai and aws blog 1

Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification

Explore LLMs in cybersecurity research: analyzing vulnerability data, sifting through CVE information, and enhancing digital safety.

Read More Read More
Infrastructure as code: how it works & top tools in 2025 - a guide to open source software

A Guide to Open Source Software

Explore how to use open source software to innovate while minimizing risk.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.