How to Prepare for the Next Zero-Day Attack
Discover what steps you can take to safeguard your code base, your software, and your applications from zero-day attacks.
Read about application security, DevSecOps, license compliance, and software supply chain security.
Discover what steps you can take to safeguard your code base, your software, and your applications from zero-day attacks.
Mend’s new Open Source Risk Report delves into the significant risk posed by the ongoing rise in open source vulnerabilities and software supply chain attacks.
Updating software dependencies is vital to software and application security, but there are challenges. Learn the risks associated with updating dependencies, why they occur, and how you can address them.
Join Jeff Martin, VP of Product at Mend.io in this application security roundtable discussion.
Learn how you can implement modern AppSec strategies in a fireside chat with the experts from Amazon Web Services (AWS) and Mend.io.
If your organization uses Azure DevOps, attend this webinar to learn how easy it is to add application security testing to your repo.
The Renovate open source project for automating dependency update hit some big Github milestones, so we put together a little appreciation for our favorite dependency update bot.
Over the past three days, the Mend research team identified two separate attacks that published malicious packages to npm: reverse remote shell as part of typosquatting attack on the popular ‘cors’ package, and an ATO attack on the “Just Eat” organization.
Mend SCA available as an action within new DevOps service, Amazon CodeCatalyst
Learn what shift left testing means, how it can save you time and costs, and why you need to shift left your open source components’ management.
Why is integrating dependency management into cloud services so important, how do you manage dependencies better, and what does Mend do with Amazon Web Services (AWS) to help you achieve this?
Learn why teams that pay attention to governance by using a CSIRP are more successful at combating the continued growth of cyberattacks.
Learn all about SAST - what it is, how it works, its strengths and weaknesses, how it can be improved and what to look for in SAST tools.
Discover what a good AppSec program should look like and the best practices to implement it, according to Ori Bach, EVP of Product at Mend, and Harry Mower, Director, AWS CodeSuite.
Discover why your DevOps platform should be complemented with a security solution, learn how to achieve this, and find out how Mend’s partnership with CloudBees delivers security that safeguards your code, software, and applications.
Get to know all about DevSecOps and the main tools and practices that organizations should adopt in order to implement a DevSecOps pipeline.
Learn why automation is a critical element of modern application security programs.
On the PeerSpot technology review site, reviews from Mend SCA users highlighted the three top priorities that SCA users generally want: ease of use, risk mitigation, and a strong feature set and integration capabilities.
What we know about the new OpenSSL critical security vulnerability.
Learn about software security challenges & opportunities and how you can detect, identify, and remediate software vulnerabilities as fast as possible, to reinforce application security most effectively.
For Cybersecurity Awareness Month, we take a closer look at using automation to improve AppSec, as well as how to safeguard the devices you use at home.
To adopt the second principle of modern application security programs, IT teams must move beyond shift left to and learn how to shift smart.
Explaining the first principle of modern application security programs: meticulous prep and planning.
Mend Research uncovered an unusual attack in RubyGems that exploited a previously existing package with a significant number of downloads to launch a typosquatting attack.
In honor of Cybersecurity Awareness Month, Mend Research Team Lead Daniel Elkabes shares a snapshot of how the Mend research team approaches vulnerability research.
For Cybersecurity Awareness Month, Mend’s Chris Lindsey offers advice on how to solve some vexing AppSec challenges.
Discover what Evil-Colon attacks are, the kind of damage they can do, and what measures you can take to protect your code from them.
Learn why building a modern AppSec strategy that can support demanding development cycles while also ensuring application security is increasingly essential.
To mark Cybersecurity Awareness Month, this primer helps simplify the complex subject of application security
We’ve been watching the global transition to an app-driven world for some time now, as companies develop and deploy innovative software at warp speed. And we’ve also watched application security teams struggle to keep up. Many try to use yesterday’s tools for today’s AppSec reality, while others wrestle with immature application security programs. And that’s...
Another week, another supply chain incident. It’s been only nine days since the Mend research team detected the dYdX incident, and today we have detected another supply chain malicious campaign.
Join Jeffrey Martin, VP of Outbound Product Management at Mend, and guest speaker Janet Worthington, Senior Analyst at Forrester as they discuss the state of application security today in a constantly changing environment.
San Francisco-based dYdX, a widely used decentralized crypto exchange with roughly $1 billion in daily trades, has had its NPM account hacked in a software supply chain attack detected by Mend Supply Chain Defender
Software and application security and compliance can have an impact on traditional manufacturing businesses, especially those working at scale. Learn why, and how Mend has helped the manufacturer, Kärcher, meet these challenges.
Attend this webinar to learn more about how software composition analysis (SCA) works and how recent advances have made SCA easier than ever to use.
The White House and the Executive Office of the President of the U.S, issued a memorandum of guidelines to enhance the security of the software supply chain through secure software development practices. Discover what their key points are, why they've been introduced, and how they might shape the future of cybersecurity.