Securing Your Package Manager’s Lockfiles
learn how your package managers’ lockfiles risk your supply chain security, and how to mitigate the risks.
Read about application security, DevSecOps, license compliance, supply chain security, and malicious packages.
learn how your package managers’ lockfiles risk your supply chain security, and how to mitigate the risks.
The Forrester Wave on Software Composition Analysis helps identify which vendor offers the best solution to protecting your open source.
Mend hosted industry experts at a roundtable to provide their insights and tips on the challenges of digital native security.
An in-depth look at Prototype Pollution vulnerabilities and how to mitigate them.
Learn how packages’ external resources threaten your supply chain, and how you can mitigate the risks.
Understand what penetration testing is, why it’s important, its stages, approaches, and tools.
What is cloud native computing and what are the top concerns in cloud computing security?
Open source adoption is increasing rapidly within the financial services industry. Thanks to cutting edge technologies, affordability, flexibility, and the power of the open source community – more and more financial institutions are encouraged to integrate open source components into their investment and more data processing systems. Meanwhile, the industry’s growing list of compliance initiatives...
To celebrate Pride month, Mend is highlighting a few of our favorite open source projects and programs that support LGBTQ+ communities.
Mend in partnership with Jonathan Leitschuh found over 100,000 libraries affected by Maven vulnerability CVE-2021-26291.
Learn how developers can adopt easy practices to secure the open source supply chain without slowing down development.
The relationship between security and developers has traditionally been like two teams competing at a tug-o-war. On one end developers are pulling to produce functional products at breakneck...
In order to incorporate security into your DevOps cycle you need to know the most innovative automated DevSecOps tools around that will help you secure your application without slowing you down.
Learn about the relationship between Docker and Kubernetes. Understand the similarities and differences between Docker Swarm vs. Kubernetes.
What is technical due diligence, why it is important for M&As, and which items you need to cover in your technical due diligence checklist.
President Biden’s executive order places strict standards on software sold to the US government. Learn about the executive order and software supply chain attacks.
Many enterprises consider applications to be the highest security risk. This survey by Ponemon Institute looks at AppSec risks.
Read the latest supply chain security news and updates to learn about new supply chain methods exploited in April.
This article focus on how to better manage the supplier dimension of the software supply chain while improving control and visibility.
Learn what a developer security champion is and how it will help your developers shift security left.
Today we’re thrilled to announce that Diffend, an innovative software supply chain security service, is now part of Mend.
Coding Easter egg is a secret message or feature hidden inside interactive code. In this article we'll be finding some of the stand-out tech Easter eggs.
Forrester reports on the latest AppSec trends and recommends the AppSec strategies organizations should adopt to keep up with today’s threat landscape
What are the top challenges facing the financial industry today, and how can financial institutions address them?
We here at Mend often get asked if we use our own software when we’re developing our product. It’s a fair question. Like most of our customers, we write a lot of code. A lot of code. And we want it to be secure. Really secure. So it should come as no surprise that the answer to...
Medical devices, subway car doors, severe weather warnings, heavy machinery, car alarms, software security alerts. They all notify you to indicate that something is wrong so that you can take action to prevent harm. Hospital monitors can detect a wide range of issues, from an incorrect dose of medication to an irregular heartbeat and beyond....
Software development organizations are struggling under rising security debt. Learn what causes security debt, and how it can be managed and reduced.
What you need to know in order to set up an effective and comprehensive vulnerability management process in your organization.
Software supply chain attacks are increasing. Learn what a software supply chain attack is, and about the recent attacks.
Relational databases have been a staple of modern computing since their conception in 1970. Oracle, MySQL, SQL Server and SQLite are just a few of the examples of the kind of databases that have...
We break down the basics of serverless security in this guide, helping your team to make the next move in the evolution of cloud computing.
When you ask developers what they think of security, they will likely go into the situation without much enthusiasm as in their mind – security is slowing them down and holding them back from doing their “actual” job. But – it doesn’t necessarily have to be that way. The friction between developers and security teams...
As part of their journey to Digital Transformation, Oil & Gas enterprises are shifting their focus on becoming agile through DevOps in order to provide efficiency and productivity. Because there is no single standard DevOps methodology, many companies are finding it challenging to manage security requirements, which contributes to a slow start, slow delivery, and...
The software world is alive with talk of shifting left – but what does it really mean? Theoretically, it means shifting responsibility for security & compliance to developers. In practice, it largely means enriching CI/CD processes to detect problematic licenses & vulnerabilities before they reach the main branch or production. Shiri Arad Ivtsan, Director of Product Management at WhiteSource will discuss...
What do containers really do, and is adopting Docker the right move for your company? Read on to find out.