Mend.io Blog

Poisoned axios: npm account takeover, 50 million downloads, and a rat that vanishes after install

Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install

LATEST
Learn more

Filter & Search

The new era of ai-powered application security. Part two: ai security vulnerability and risk - ai security vulnerability and risk

The New Era of AI-Powered Application Security. Part Two: AI Security Vulnerability and Risk

Discover the new era of AI-powered application security. Learn about risks, and suggested approaches to cope with AI challenges.

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - software supply chain compliance ensuring security and trust in your software and applications

Software Supply Chain Compliance: Ensuring Security and Trust in Your Software and Applications

Learn about software supply chain compliance and security to protect your organization from risks and ensure trust.

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - ai powered application security evolution or revolution

The New Era of AI-Powered Application Security. Part One: AI-Powered Application Security: Evolution or Revolution?

Discover the new era of AI-powered application security. Learn about the evolution, benefits, and risks of AI in security.

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - why you should avoid copy and paste code

Why You Should Avoid Copy and Paste Code

Discover why copying and pasting code can compromise your software’s security, quality, and compliance with licensing.

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - blog 7

Mend.io Launches AppSec Risk Assessment Program

Mend.io launches AppSec Risk Assessment Program to help organizations visualize and remediate application security risks.

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - gartner mq blog image

Magic Quadrant™ for Application Security Testing, 2023 Gartner® report

Mend.io is recognized as a Visionary in the 2023 Gartner Magic Quadrant for Application Security Testing. Learn about their approach.

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - why is cybersecurity now a global governmental concern blog

Why is Cybersecurity Now a Global Governmental Concern?

What do Australia’s cybersecurity plans teach us all about the need for advanced application security?

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - poor application security health could kill you blog

Warning: Poor Application Security Health Could Kill You

Learn how poor application security can have deadly consequences in the healthcare sector. Discover the new FDA guidance and tools.

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - new eu cybersecurity regulation blog e1680808776743

Why the Need for Application Security Intensifies as EU Tightens Cybersecurity Requirements

Learn why the need for application security grows as the EU tightens cybersecurity requirements. Understand the impact on organizations.

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - ten women in tech who changed our world

Ten Women in Tech Who Changed Our World

Discover ten pioneering women in tech who changed the world. Learn about their visionary work and revolutionary outcomes.

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - five key principles of modern application security e1678917349838

The Five Key Principles of Modern Application Security

Discover the key principles of modern application security. Learn how to secure your software and protect against evolving threats.

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - who should take responsibility for application security

Just Who Exactly Should Take Responsibility for Application Security?

Explore the complexities of application security responsibility in the age of DevSecOps and supply chain breaches. Who should take the lead?

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - cisos guide to appsec innovation

The CISO’s Guide to Application Security Innovation

Learn how to enhance your application security program with tips from "The CISO's Guide to Application Security Innovation."

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - building a modern application security strategy part 2

Building a Modern AppSec Strategy: How to Secure Applications

Learn how to build a modern AppSec strategy to secure applications in the face of evolving threats. Explore tactics, trends, and best practices.

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - building a modern application security strategy

Building a Modern Application Security Strategy. Part One: Threats, Opportunities, and Challenges

Building a modern application security strategy is crucial in today's threat landscape. Learn about threats, opportunities, and challenges.

Read More Read More
The new era of ai-powered application security. Part two: ai security vulnerability and risk - large blog hero

Everything You Need to Know About Application Security Best Practices

Learn the top 10 application security best practices to protect your software from vulnerabilities and attacks. Ensure your apps are secure.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.