Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
Shadow AI: Examples, Risks, and 8 Ways to Mitigate Them
Uncover the hidden risks of Shadow AI and learn 8 key strategies to address it.
The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase
MCP adoption is surging across industries, fundamentally reshaping how systems connect to AI models.
Security Testing in 2025: Testing Apps, AI, Cloud Native, and More
Learn about key trends in modern security and the OWASP Top 10.
MITRE CVE Program Uncertainty: Mend.io’s commitment to uninterrupted vulnerability protection
Mend.io continues to deliver uninterrupted, multi-source vulnerability protection.
The Value Dashboard: Measure and Showcase Your Security Impact
Track, measure, and prove your AppSec impact with the Mend.io Value Dashboard.
The Top 11 Web Vulnerability Scanners
Discover the top 11 web vulnerability scanners and learn why they are essential for protecting your web applications from hackers.
AI Powered Remediation: Mend SAST Performs +46% Better Than Competitors
See how Mend SAST's AI powered automated remediation eliminates vulnerabilities with speed & accuracy.
Mend.io and JetBrains Partner to Bring Enhanced Code Security to Developers
Announcing a partnership between Mend.io and JetBrains for IDE and Qodana.
CVSS 3.1 vs CVSS 4.0: A Look at the Data
CVSS base scores are up in the latest version of the scoring system. What does that mean for AppSec practitioners?
Mend.io – Backstage Integration: Bringing Security Insights Where You Need Them
Backstage offers wide views and controls across the development process and with the Mend.io plugin, deep insights into application risks overall or by project.
Benefits of VEX for SBOMs
SBOMs alone are overwhelming. Learn how VEX adds context, highlighting real threats for efficient risk management.
It‘s Cybersecurity Awareness Month-Let‘s Talk AppSec
October is Cybersecurity Awareness Month. Learn how to protect your software and reduce risks with AppSec tips.
Don’t Treat DAST Like Dessert
DAST is an essential part of a nutritious application security diet—not just a once-a-quarter treat.
The Power of Platform-Native Consolidation in Application Security
Streamline workflows, consolidate data, boost security posture, and empower developers to focus on innovation.
What is the KEV Catalog?
A quick guide to the Known Exploited Vulnerabilities (KEV) catalog.
What Is Application Security? Types, Tools and Best Practices
Explore our application security complete guide and find key trends, testing methods, best practices, and tools to safeguard your software.
Never miss a post. Opt-out at any time.
You’re all set to receive our latest posts.
Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.