Mend.io Blog

Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification

Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification

LATEST
Learn more
Filter & Search

Secure Coding: A Practical Guide

Learn about the importance of secure coding in software development. Discover practical tips and principles to ensure your code is secure.

Read More
scanners2

Advance From Open Source Code Scanner to Software Composition Analysis Solution

Discover why it's essential to advance from open source code scanners to software composition analysis solutions. Learn about the pitfalls of outdated scanners and the benefits of modern tools.

Read More
inflight entertainment

The $100 Million Court Case for Open Source License Compliance

Discover the $100 million court case for open source license compliance between CoKinetic Systems and Panasonic.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlY2U2NjEwYzViM2UucG5nJnZlcnNpb249MDAwMCZzaWc9ZDY2MTY1NjRjYzRhZTA3OWFmNGM4MmVmZThlMTk5NzI

Forrester’s State of Application Security, 2020: Key Takeaways

Discover Forrester’s key findings on application security in 2020. Learn why app vulnerabilities are a major threat and how to strengthen your security practices.

Read More
gdpr

How Does GDPR Impact Open Source Security Expectations?

Learn about how GDPR impacts open source security expectations and the importance of using automated Software Composition Analysis tools to ensure compliance and protect user data.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlYzY1NDU5ZTUyZmEucG5nJnZlcnNpb249MDAwMCZzaWc9OWRjYjRmYjE4MzZkMWY5M2UwMmRlMDMzYzYwOTAzNWI

DevSecOps vs. SecDevOps: A Rose by Any Other Name?

Explore the difference between DevSecOps and SecDevOps. Learn how security practices have evolved in the software development life cycle.

Read More

May Open Source Security Vulnerabilities Snapshot

Stay up to date with May's open source security vulnerabilities. Learn about common vulnerabilities, severity breakdown, and more.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjZDE0NjZmOGJjODIuanBnJnZlcnNpb249MDAwMCZzaWc9ZTZkMjA1NDBkNmE5NDAyZGY4ZGQ5MjdiZmU2YWZiM2I

Top Tools and Tips to Improve Your DevOps Pipeline

Discover top tools and tips to enhance your DevOps pipeline. Learn about CI/CD, security, and automation for successful software development.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlYWFhZmVjMjZiOTYucG5nJnZlcnNpb249MDAwMCZzaWc9ZmFkZWMzYWI3YWViNGU5NDg5MTE3NWMyZDk5ZWU2ZTE

Observability: What You Need to Know

Learn about observability in DevOps and IT. Understand the importance of observability in today's complex software systems.

Read More

Open Source Analysis Extends Your Visibility

Discover how open source analysis can extend your visibility into your codebase, manage components, and mitigate security risks.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlOGM5YzIyNTY0OTYucG5nJnZlcnNpb249MDAwMCZzaWc9NDcwYzlmM2NiZTI4NzJhMmE0ZWYwNmY1YmRlODQzYmU

April Open Source Security Vulnerabilities Snapshot

Stay up to date with April's OSS Vulnerabilities Snapshot. Learn about the rise in vulnerabilities, severity breakdown, top CWEs, and more.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjYTM0NmRjOWY5MTYuanBnJnZlcnNpb249MDAwMCZzaWc9NDYzM2JkYzNmZDZiNjg0NTYzNDBmM2I5ZWEzYTMzY2E

Kubernetes Pod Security Policy Best Practices

Learn about Kubernetes pod security policies and best practices for securing your Kubernetes environment.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlODRmZTBhZGVlMGMuanBnJnZlcnNpb249MDAwMCZzaWc9ZmZhNjY3ZjgzOGU5ZTg2ODVjNzVjY2I0MDhkNWJkOGI

Top Zoom Backgrounds We Love For April 1st

Our humble tribute to April Fools’ Day is this collection of our favorite Zoom backgrounds from our very own Mend crew.

Read More
Knight on rope balance2222

How to Balance Between Security and Agile Development the Right Way

What can be done to better balance between security and agile development? What steps can be taken to ensure agile development processes are done in a secure manner?

Read More
whitesource software development

5 Ways to Speed Up Your Software Development Process

Learn how to speed up your software development process with 5 key tips. From continuous integration to limiting work in progress.

Read More
8 inA

Automatically Update cdnjs Dependencies

Automatically update cdnjs dependencies with Renovate's new feature. Keep your web projects up-to-date effortlessly.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!