Mend.io Blog

The vision behind mend. Io’s recognition

The Vision Behind Mend.io’s Recognition

LATEST
Learn more

Filter & Search

The vision behind mend. Io’s recognition - gartner mq blog thumbnail v2

The Vision Behind Mend.io’s Recognition

Mend.io named Visionary in 2025 Gartner® Magic Quadrant™ for AST

Read More Read More
The vision behind mend. Io’s recognition - llm security

LLM Security in 2025: Risks, Mitigations & What’s Next

Explore top LLM security risks and mitigation strategies.

Read More Read More
The vision behind mend. Io’s recognition - sast tools for devsecops

Top 7 SAST tools for DevSecOps Teams in 2025

Discover the top SAST tools empowering DevSecOps teams in 2025.

Read More Read More
The vision behind mend. Io’s recognition - devops statistics

42 DevOps Statistics to Know in 2025

What Is DevOps? Stats & Key Trends in 2025

Read More Read More
The vision behind mend. Io’s recognition - ai code review

AI Code Review in 2025: Technologies, Challenges & Best Practices

Explore AI code review tools, challenges, and best practices.

Read More Read More
The vision behind mend. Io’s recognition - blog mend ai security dashboard

Introducing Mend.io’s AI Security Dashboard: A Clear View into AI Risk

Discover Mend.io’s AI Security Dashboard.

Read More Read More
The vision behind mend. Io’s recognition - blog cover mend main blues 1

NPM Ecosystem Under Siege: Self-Propagating Malware Compromises 187 Packages in a Huge Supply Chain Attack

A major NPM breach exposed 187 packages.

Read More Read More
The vision behind mend. Io’s recognition - npm supply chain attack blog

NPM Supply Chain Attack: Sophisticated Multi-Chain Cryptocurrency Drainer Infiltrates Popular Packages

A sophisticated npm supply chain attack compromised popular packages

Read More Read More
The vision behind mend. Io’s recognition - why ai security tools are different and 9 tools to know in 2025@2x

Why AI Security Tools Are Different and 9 Tools to Know in 2025

Discover 9 AI security tools that protect data, models, and runtime.

Read More Read More
The vision behind mend. Io’s recognition - blog graphic understanding bias in generative ai

Understanding Bias in Generative AI: Types, Causes & Consequences

Learn what bias in generative AI is, its causes, and consequences.

Read More Read More
The vision behind mend. Io’s recognition - blog graphic 58 generative ai statistics

58 Generative AI Statistics to Know in 2025

Explore 58 key generative AI stats for 2025.

Read More Read More
The vision behind mend. Io’s recognition - sbom security 6 key components and top 3 use cases

SBOM Security: 6 Key Components and Top 3 Use Cases

Discover 6 core components and 3 top use cases of SBOM security.

Read More Read More
The vision behind mend. Io’s recognition - blog graphic what is an ai bom

What is an AI Bill of Materials (AI BOM)?

Learn how to create and automate an AI BOM.

Read More Read More
The vision behind mend. Io’s recognition - blog graphic gen ai security

What is Generative AI Security?

Learn what generative AI in cybersecurity is and how to secure against threats.

Read More Read More
The vision behind mend. Io’s recognition - blog image hallucinated package attacks 2x

The Hallucinated Package Attack: Slopsquatting

Learn how AI-generated code can lead to fake package installs and attacks.

Read More Read More
The vision behind mend. Io’s recognition - what is a software bill of materials sbom 4 critical benefits

The Complete Guide to SBOM Software Bill of Materials

Learn how SBOMs improve transparency, security, and compliance.

Read More Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!