Mend.io Blog

Best application security testing providers: top 7 in 2025

Best Application Security Testing Providers: Top 7 in 2025

LATEST
Learn more

Filter & Search

Secrets management vs secrets detection: here’s what you need to know - secrets management vs secrets detection what you need to know

Secrets Management vs Secrets Detection: Here’s What You Need to Know

Learn about the importance of secrets management vs secrets detection in application security. Protect your sensitive data.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - how to use dependency injection in java tutorial with

How to Use Dependency Injection in Java: Tutorial with Examples

Learn how to use Dependency Injection in Java with this comprehensive tutorial. Discover its benefits, types, and practical examples.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - cvss4 is here how to make the most of it

CVSS 4.0 is Here: How to Make the Most of It

Learn about the latest version of CVSS 4.0. Understand the new metrics and how to use them in your org's vulnerability remediation strategy.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - how to get the most out of sast blog post

Quality vs. Quantity: How to Get the Most Out of SAST

Learn how to make the most out of Static Application Security Testing (SAST) without overwhelming developers.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - 8 ina

Idempotency: The Microservices Architect’s Shield Against Chaos

Discover the power of idempotency in microservices architecture. Learn how to maintain data consistency and predictability.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - what existing security threats do ai and llms amplify post

What Existing Security Threats Do AI and LLMs Amplify? What Can We Do About Them?

Learn about the existing security threats that AI and LLMs amplify and how to protect against them.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - kubernetes in

How to Manage Secrets in Kubernetes

Learn how to manage secrets in Kubernetes with best practices & tools. Secure your apps & data with Kubernetes Secrets & External Secrets.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - guide to using epss scores

Mend’s Handy Guide to Using EPSS Scores

Discover Mend's Handy Guide to Using EPSS Scores. Learn how EPSS can predict exploits and prioritize vulnerability remediation effectively.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - challenges for license compliance and copyright with ai

The Challenges for License Compliance and Copyright with AI

Discover the challenges of license compliance and copyright with AI-generated code in software development. Learn about legal risks.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - 6 more top tips for holistic appsec and software supply chain security

Six More Top Tips For Holistic AppSec and Software Supply Chain Security

Learn how to strengthen your security posture with holistic approaches to application security and software supply chain security.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - 6 top tips for holistic appsec and software supply chain security

Six Top Tips For Holistic AppSec and Software Supply Chain Security

Discover six top tips for holistic application security and software supply chain security for long-term success.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - turnover relationships and tools in cybersecurity

Turnover, Relationships, and Tools in Cybersecurity

Discover effective strategies for handling security team turnover, maintaining tool efficiency, and fostering strong developer relationships.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - closing the loop on python circular import issue

Closing the Loop on Python Circular Import Issue

Learn how to address and prevent Python circular import issues to write cleaner and more maintainable code. Strategies, examples, and more.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - building security culture starts with building relationships

Building a Security Culture Starts with Building Relationships

Learn how building relationships between security and development teams can improve application security. Find key tactics for security.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - npm in

Getting Started with npm Basics: Mastering Node Package Manager Commands

Learn the basics of npm with this comprehensive guide. From installation to package management, and mastering Node Package Manager commands.

Read More Read More
Secrets management vs secrets detection: here’s what you need to know - what new security threats arise from the boom in ai and llms

What New Security Threats Arise from The Boom in AI and LLMs?

Explore the security threats arising from the boom in AI and LLMs, including data privacy, misinformation, and resource exhaustion.

Read More Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!