Mend.io Blog

Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification

Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification

LATEST
Learn more
Filter & Search
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViYzcyYmQyYmZhNmYuanBnJnZlcnNpb249MDAwMCZzaWc9OWMwOGVlODVjMDcyMjU2OTI0M2M3YTlmNjRhYjdjODk

Open Source Vulnerabilities Overview: Apache Struts vs. Spring

Learn about the open source vulnerabilities in Apache Struts and Spring frameworks, their handling of security issues, and how to manage them.

Read More
The Source series

Three New Supply Chain Attack Methods You Should Be Aware Of

Learn about Imposter Library, Brandjacking, and Security Research Smokescreen methods. Stay informed on the latest supply chain attack methods.

Read More
supply chain management1 1

Overcoming Software Supply Chain Risk

Discover how to overcome software supply chain risk in the development landscape. Gain control and visibility over your software components.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmMjFjN2Y2NzRkYzAucG5nJnZlcnNpb249MDAwMCZzaWc9YTUwMDBlNDYyOGY1Y2FhNDI2ODFkZjVmMGUwYTEzNzY

Dynamic Application Security Testing: DAST Basics

Learn about dynamic application security testing (DAST). Understand how DAST works, its pros and cons, and its importance in AppSec.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMDRiNGFhZWQzYTQucG5nJnZlcnNpb249MDAwMCZzaWc9ZGU0NWFjMjI0Mjc1MGNiZmNlZmE2MzAzZDNiZGE2NTk

How To Secure Your SDLC The Right Way

Learn how to secure your software development life cycle (SDLC). Discover the importance of integrating security throughout the SDLC.

Read More
Developer Security Champion

Developer Security Champions Rule the DevSecOps Revolution

Discover how developer security champions play a crucial role in the DevSecOps revolution, promoting secure coding best practices.

Read More
diffend

Welcome to Mend, Diffend!

Mend welcomes Diffend, an innovative software supply chain security service, to improve open source risk management.

Read More

The Top 11 Web Vulnerability Scanners

Discover the top 11 web vulnerability scanners and learn why they are essential for protecting your web applications from hackers.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjYjc1NzE0YzFkZTEuanBnJnZlcnNpb249MDAwMCZzaWc9ZjliNjE3NWE0YjI0ZmZiMzE0YjM5ZmVjNzI3OTNlNDQ

Docker Image Security Scanning: What It Can and Can’t Do

Learn about Docker image security scanning and its limitations. Understand how scanning works, why it's important, and more.

Read More
the state of

All About Mend’s 2021 Open Source Security Vulnerabilities Report

Learn all about Mend's 2021 Open Source Security Vulnerabilities Report, including new challenges, common vulnerabilities, and more.

Read More
3 inB

About Open Source Vulnerability Scanning & Why You Need It

Learn why open source vulnerability scanning is crucial for your software security. Find out how to select the best scanner.

Read More
Easter eggs 2017

Finding the Best Coding Easter Eggs

Discover the best coding Easter eggs in this blog post by Mend.io. From Google search to Mozilla Firefox, uncover hidden surprises in tech.

Read More
itemeditorimage 606ed4d4ab7e4

Forrester’s State Of Application Security Report, 2021: Key Takeaways

Forrester's State Of Application Security Report for 2021 highlights key trends and recommendations for effective AppSec strategies in a rapidly evolving digital world.

Read More
Dollarphotoclub 62120606 scaled 1

3 Reasons Why Open Source Software is More Secure than Commercial Software

Discover why open source software is often more secure than commercial software, and the benefits of using open source components.

Read More
Renovating with Renovate blog post 1

Top 3 Open Source Risks And How To Overcome Them

Learn about the top 3 open source risks and how to overcome them. Discover security, licensing compliance, and quality risks.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjOTBhNDZjODllMTAuanBnJnZlcnNpb249MDAwMCZzaWc9N2ZjMjJmZDRhODkyMGQ2ODVmY2MwNjkzMzE1OGRkNDM

The Top 10 Linux Kernel Vulnerabilities You Must Know

Stay informed about the most critical Linux kernel vulnerabilities. Our guide covers the top 10 CVEs and offers tips for maintaining security.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!