Mend.io + Jira Security: Doing DevSecOps Better Together
Learn how Mend.io integration enhancements for Jira Security build seamless adoption and collaborative DevSecOps.
Read about application security, DevSecOps, license compliance, supply chain security, and malicious packages.
Learn how Mend.io integration enhancements for Jira Security build seamless adoption and collaborative DevSecOps.
We’re proud to announce that Mend has been recognized as a Visionary in the 2023 Gartner Magic Quadrant for Application Security Testing.
Mend.io has been recognized by Gartner as a Visionary. Mend.io has been recognized for its completeness of vision and ability to execute.
Learn more about challenges, best practices, and good strategies for dependency management, and discover our three favorite tips.
Find out what a Software Composition Analysis tool is and why it should be part of your application security portfolio.
Your guide to modern application security. Build with speed and confidence with Mend.io and AWS.
Learn how to choose an SBOM format that fits your company’s needs.
Key takeaways from five of the more noteworthy sessions we attended at RSA 2023.
What Mend.io’s collaboration with Kondukto’s new Demo Hub means when choosing your AppSec solution
What do Australia’s cybersecurity plans teach us all about the need for advanced application security?
Read on to hear our predictions on the hot topics at RSA this year, and what Mend.io will be up to at the show.
Discover Mend.io's new enhancement to its Jira integration capabilities.
Mend.io has achieved Amazon Web Services (AWS) Security Competency status. This designation recognizes that Mend.io has demonstrated proven technology and deep expertise to help customers achieve cloud security goals and reinforces Mend.io’s position as a trusted member of the AWS Partner Network (APN).
A new malicious package named 'Vibranced' has been detected on the Node Package Manager (npm) repository and poses a significant threat to users who may unknowingly install it. The package has been carefully crafted to mimic the popular ‘colors’ package.
Malicious packages are a growing threat, and they may already have infiltrated your applications. Malicious package attacks spiked significantly from 2021 to 2022, further indication of their growing security risk to the open source ecosystem. Mend.io research observed a 315 percent spike in the publication of malicious packages to open source registries such as npm...
Research from Mend.io’s new Malicious Packages Special Report: Attacks Move Beyond Vulnerabilities illustrates the growing threat of malicious packages, including a 315 percent increase in attacks from 2021 to 2022.
Discover how vulnerabilities in healthcare tech can threaten lives, and how the U.S. FDA has been granted authority to improve the security of medical devices and apps.
What are the implications for application security of the EU’s new cybersecurity regulations?
Learn why you should scan applications in the repository to accelerate and improve your application security.
Discover how integrating AppSec into your repository, like Bitbucket Cloud, can improve and simplify your application security.
As a foundational element of the digital world, applications are increasingly targeted by threat actors. To adapt to the constantly evolving threat landscape of today’s digital world, IT and security leaders need to build a modern AppSec strategy designed to support demanding development cycles while also ensuring application security. Learn how to build your AppSec...
Mend celebrates ten trailblazing women in tech for Women’s History Month.
How does the shift to the Cloud affect application security?
How do fintech companies address the risks posed by vulnerabilities like Spring4Shell? Here’s how Mend tackled the issue for MSCI to speedily thwart any potential threats.
Learn the five key principles of modern application security and why they’re so vital.
Kubernetes security should be a primary concern and not an afterthought. Learn how to avoid risks by applying security best practices.
Mend celebrates International Women’s Day with insights from some of our talented women about building a career in technology.
New Biden Cybersecurity Strategy Assigns Responsibility to Tech Firms
Learn who should take responsibility for application security, according to Mend VP of Product Management Jeffrey Martin.
Learn about the key findings of Mend’s Open Source Risk Report, and how to secure your software supply chain.
Discover how you can build an effective modern application security program by increasing awareness and understanding in your organization.
Discover what you can do to protect your AppSec with a modern application security strategy.
Docker is a complicated beast, and there is no simple trick you can use to maintain Docker container security. We offer a set of best practices that should help you.
This report identifies the extent to which the financial services industry is active in open source, creating a baseline of understanding of governance, leadership, consumption, contribution, culture, and overall open source aspiration. Further, the report highlights the obstacles and challenges to improving industry-wide collaboration and concludes with a set of actionable insights for improving the...
Threat actors operate by an ironclad rule: If it’s important to businesses, it’s important to them. And they certainly understand the crucial business role of applications. Applications are now the number one attack vector, while software supply chain attacks increased 650 percent in a year. Clearly, if you don’t already have a modern application security...
This white paper from Mend, the market leader in SCA, explains how to build an open source security program that gives you confidence that everything is visible, policies are being followed, and your developers are actually using the security tools provided for them. Learn how to build your open source security program today – download...