Mend.io Blog

Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification

Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification

LATEST
Learn more
Filter & Search
itemeditorimage 6065a6037e937

Mend on Mend

Discover how Mend practices what they preach by using their own software to develop secure products.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzYwNTI1M2FjZWE1MDYucG5nJnZlcnNpb249MDAwMCZzaWc9MTU0MTM0OTA3MzA0YmUwMWZjOGNmZGFmNzg5MzgzY2Q

The Internet of Things Is Everywhere. Are You Secure?

Discover the importance of securing your IoT devices with tips on network and device security, application layer protection.

Read More

Your Guide to Open Source Vs Proprietary Software Security

Learn about the differences between open source and proprietary software security in this comprehensive guide.

Read More
AzurePipline

How To Ensure Security & License Compliance In Azure DevOps Pipelines

Learn how to ensure security and license compliance in Azure DevOps pipelines with a DevSecOps approach. Utilize Mend Bolt.

Read More

PCI Software Security Framework: All You Need to Know

Learn all about the PCI Software Security Framework, its standards, and guidelines for developing secure payment applications.

Read More

Hitting Snooze on Alert Fatigue in Application Security

Learn how to manage alert fatigue in application security. Discover strategies for prioritizing and remediating security alerts.

Read More

Managing Security Debt: How to Reduce Security Deficit

Learn how to reduce security debt and manage security vulnerabilities. Discover the importance of prioritizing & automating security processes

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzYwMzc5ZDg2Yzk1ZTkucG5nJnZlcnNpb249MDAwMCZzaWc9NzdhMzA1YjI2Yjc2ZGU4OGY1MTc5OGNjYzA0YjYzMmY

Setting Up an Effective Vulnerability Management Policy

Learn how to set up an effective vulnerability management policy to minimize security risk and stay compliant with regulations.

Read More
itemeditorimage 606c2cf19d4b5

Renovating with Renovate

Rhys Arkins covers application security, dependency management, and open source audit. Learn how to automate dependency updates and more.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzYwMmU1Njg5MzE4MGMucG5nJnZlcnNpb249MDAwMCZzaWc9ODc0ZGYzNmEwYTI0MmJjY2Y2OGRkZGY1ZTQ0ZjEyZGU

Software Supply Chain Attacks

Discover the dangers of software supply chain. Learn how they work, why they are so dangerous, and how to strengthen them.

Read More
AzureDevOps HERO

Azure DevOps Services – Security Checklist

Control access, visibility, protect repositories, review audit logs, implement WAFs, with our Azure DevOps security checklist.

Read More
NoSQL

When to Consider a NoSQL vs Relational Database

Learn when to consider using a NoSQL vs relational database in your org. Understand the benefits & where NoSQL may be the better option.

Read More
npm inA 1

npm: How To Install A Specific Version of Node.js Package

Learn how to install a specific version of a Node.js package using npm, & check versions, install older versions, & use semantic versioning.

Read More
RSPA 1

RASP: The What, Why and How

Explore the world of RASP - Runtime Application Self-Protection in this informative blog post. Learn why developers need it.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkNTUyM2RmNWY3YTguanBnJnZlcnNpb249MDAwMCZzaWc9YzU0MzJiNGFiNDk5MmRkZTA3ZTIyOTllZjFhZWIwNmQ

Serverless Security Explained

Learn about serverless security in the cloud ecosystem, including best practices like staying up to date, least privilege, and more.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVhZjJmYzgzZDFiNGUuanBnJnZlcnNpb249MDAwMCZzaWc9MjU4MzhkYjc5NTE2YjIzODJlY2Q5MjBjYWUzZGQwODA

Top 3 Open Source Risks and How to Beat Them

Discover the top 3 open source risks: security vulnerabilities, licensing compliance, and quality issues. Learn how to mitigate these risks.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!