Mend.io Supply Chain Security

polyfill supply chain attack 1

More than 100K sites impacted by Polyfill supply chain attack

The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.

Read More
threat hunting report img

Threat Hunting 101: Five Common Threats to Look For

Learn more about supply chain threats and where to find them.

Read More
shrinking security debt with dependency management white paper

Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise 1

Discover how CVE-2024-3094 affects XZ Utils and enables SSH compromise. Get insights on detection, mitigation, and system security.

Read More
top tools for automating SBOMs img

Top Tools for Automating SBOMs

Discover the top tools for automating SBOMs on our blog. Learn how to create SBOMs effortlessly and boost your supply chain security.

Read More
6 more top tips for holistic appsec and software supply chain security

Six More Top Tips For Holistic AppSec and Software Supply Chain Security

Learn how to strengthen your security posture with holistic approaches to application security and software supply chain security.

Read More
6 top tips for holistic appsec and software supply chain security

Six Top Tips For Holistic AppSec and Software Supply Chain Security

Discover six top tips for holistic application security and software supply chain security for long-term success.

Read More
turnover relationships and tools in cybersecurity

Turnover, Relationships, and Tools in Cybersecurity

Discover effective strategies for handling security team turnover, maintaining tool efficiency, and fostering strong developer relationships.

Read More
what new security threats arise from the boom in ai and llms

What New Security Threats Arise from The Boom in AI and LLMs?

Explore the security threats arising from the boom in AI and LLMs, including data privacy, misinformation, and resource exhaustion.

Read More
death in the sdlc

Let’s Embrace Death in the Software Development Lifecycle

Learn why it's important to let software products die gracefully rather than become zombies, affecting security and functionality over time.

Read More
esg report release 1

New ESG Research Report Outlines Best Practices for Effective Application Security Programs

New ESG Research Report reveals best practices for application security programs. Learn how to prevent incidents and secure software apps.

Read More
why the us government continues to push for software supply chain security

Why The US Government Continues to Push for Software Supply Chain Security

Discover why the US government is prioritizing software supply chain security. Learn about CISA's goals and objectives at the SOSS Summit.

Read More
five reasons you need automatic software updates for your application

Cybersecurity Awareness Month 2023: Five Reasons You Need Automatic Software Updates for Your Application Security.

To mark Cybersecurity Awareness Month 2023, discover five key reasons why automated software updates are so vital for your application security.

Read More
what role should dependency management play as the regulation of the software supply chain escalates

What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates?

Discover the importance of dependency management in securing the software supply chain as regulations escalate.

Read More
attackers are using automation software vendors must catch up

Adversaries Are Using Automation. Software Vendors Must Catch Up

Discover the importance of automation in cybersecurity and how software vendors can stay ahead of adversaries.

Read More
how to communicate the value of your company with sboms

Communicating the Value of Your Company With SBOMs

Learn how to effectively communicate the value of your company with Software Bill of Materials (SBOMs).

Read More
software supply chain security the basics and four critical best practices

Software Supply Chain Security: The Basics and Four Critical Best Practices

Learn about software supply chain security basics and best practices to prevent attacks.

Read More