Mend.io Blog

Best application security testing providers: top 7 in 2025

Best Application Security Testing Providers: Top 7 in 2025

LATEST
Learn more

Filter & Search

How do i protect my ai model? - how do i protect my ai model blog

How Do I Protect My AI Model?

Learn essential strategies to secure your AI models from theft, denial of service, and other threats, covering copyright issues, risk management, and secure storage practices

Read More Read More
How do i protect my ai model? - owasp oss risk top ten blog

Quick Guide to the OWASP OSS Risk Top 10

Learn about the top 10 risks of open source software, beyond just CVEs. From known vulnerabilities to unapproved changes.

Read More Read More
How do i protect my ai model? - large blog

Why an SBOM Audit is Vital to Application Security and Compliance

Learn the importance of an SBOM for enhancing application security and compliance. Explore best practices for creating and auditing SBOMs effectively.

Read More Read More
How do i protect my ai model? - what makes containers vulnerable

What Makes Containers Vulnerable?

Learn about the vulnerabilities that containers bring to your applications and how to address them to keep attackers at bay.

Read More Read More
How do i protect my ai model? - nvd backlog triggers public response from cybersec leaders

NVD’s Backlog Triggers Public Response from Cybersec Leaders

The National Vulnerability Database's backlog triggers a public response from cybersecurity leaders. Concerns raised, open letter to Congress

Read More Read More
How do i protect my ai model? - owasp top 10 llm application vulnerabilities

OWASP Top 10 for LLM Applications: A Quick Guide

Discover the OWASP Top 10 for LLM Applications in this comprehensive guide. Learn about vulnerabilities, & prevention techniques.

Read More Read More
How do i protect my ai model? - hugging face blog

What You Need to Know About Hugging Face

Stay informed about the risks and challenges of AI models with Hugging Face. Learn how to identify and secure AI-generated code.

Read More Read More
How do i protect my ai model? - shrinking security debt with dependency management white paper

Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise 1

Discover how CVE-2024-3094 affects XZ Utils and enables SSH compromise. Get insights on detection, mitigation, and system security.

Read More Read More
How do i protect my ai model? - blog 2 1

Over 100 Malicious Packages Target Popular ML PyPi Libraries

Discover the latest security threat as over 100 malicious packages target popular ML PyPi libraries. Learn about the attack methods.

Read More Read More
How do i protect my ai model? - learning from history gender bias in ai

Learning From History: AI Gender Bias

Learn about AI gender bias in large language models, how historical data impacts AI, & implications for women in health & car safety fields.

Read More Read More
How do i protect my ai model? - 5 tools for managing dependency updates

What is LDAP Injection? Types, Examples and How to Prevent It

Learn what LDAP Injection is, its types, examples, and how to prevent it. Secure your applications against LDAP attacks.

Read More Read More
How do i protect my ai model? - container security post

Container Security: Creating an Effective Security Program with Reachability Analysis

Learn how to create an effective container security program with reachability analysis to protect your applications from vulnerabilities.

Read More Read More
How do i protect my ai model? - container blog

Mend.io Launches Mend Container

Mend.io launches Mend Container to address security in cloud-native development, offering reachability analysis and secrets detection.

Read More Read More
How do i protect my ai model? - broken nvd

Breaking: What is Going on with the NVD? Does it Affect Me?

Learn about the current issues with the National Vulnerability Database, how it affects vulnerability reporting, and how Mend SCA can help.

Read More Read More
How do i protect my ai model? - what is the difference between an sca scan and a container scan

What is the difference between an SCA scan and a container scan?

Learn about the difference between SCA scans and container scans, why scanning containers for vulnerabilities is important.

Read More Read More
How do i protect my ai model? - how is a container scan done

How is a Container Scan Done?

Learn the importance of scanning container images for vulnerabilities to keep your containerized environments safe.

Read More Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!