Mend.io Blog

Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification

Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification

LATEST
Learn more
Filter & Search

Is One Programming Language More Secure Than The Rest?

Discover which programming language is the most secure. Find out how popular languages measure up in terms of security.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjNzdiZDMyNDVhYjAuanBnJnZlcnNpb249MDAwMCZzaWc9NTViMWVlZTEyM2YyNTIyMmQ5ZDlkNjQzMzU5ZTJhNDU

Top 5 Docker Vulnerabilities You Should Know

Learn about the top 5 Docker vulnerabilities that could put your product at risk. Stay informed and secure your containers with these tips.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjNmE3OWJkMDc3ZjguanBnJnZlcnNpb249MDAwMCZzaWc9N2U2ZWYyNTI1Njk2YThjZTNmNjU0MTQ5ZmVjN2JlMzg

Experience over Best Practices- Interview with CyberArk’s WhiteHat Hacker Len Noe

Interview with CyberArk’s WhiteHat Hacker Len Noe. Learn how hackers switch to become white hat hackers for the public good.

Read More

3 Crucial Tips for Smarter Container Security Scanning

Discover smarter container security scanning & improve your security by signing images, avoiding root access, and vulnerability scans.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjNDgyMjdiMWU1ZDMuanBnJnZlcnNpb249MDAwMCZzaWc9OTdhYjFiZmQ0MGJlZjA4OWIyYjRjNTc0OGIyZmE5ZWM3D

SweetAlert2 — Mend’s Open Source Project of the Month for January 2019

Explore Mend's SweetAlert2. Learn how this customizable, responsive, and accessible tool can enhance your development process.

Read More

SecOps: How Security and Operation Teams Can Work Better Together

Learn how Security and Operations teams can work better together in the DevSecOps era. Tips for implementing SecOps.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjMzcwMDllNzdiNmIuanBnJnZlcnNpb249MDAwMCZzaWc9OWE4NjZhYzM3ZWY1ODI5MWZiZjhkMWE3ZmVhYTM2OTc

Top 10 New Open Source Security Vulnerabilities in 2018

Discover the top 10 new open source security vulnerabilities in 2018, including Linux Kernel, Drupal, AngularJS, and more.

Read More
7 inB

Ruby Bundler Support in Renovate

Renovate now supports Ruby Bundler! Test out the alpha version and provide feedback for future improvements.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjMzMyYzhjYjQyZmQuanBnJnZlcnNpb249MDAwMCZzaWc9MTBhNThjZjY0OTk4M2RkNGM3YmNkNjZkYjM0YmE2ZTA

Sometimes A Vulnerability Isn’t So Vulnerable

Discover how sometimes a vulnerability isn't as big of a threat as you may think. Learn about effective vs ineffective vulnerabilities.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjMWY3ZTZmYjhjYmUuanBnJnZlcnNpb249MDAwMCZzaWc9MjhkMTk0ZjNhZjY3OTJmZjNiMTg3OGU3ODVmZWJkMWU

Who’s been naughty or nice in the Open Source-verse over 2018?

Reflect on the naughty and nice in the Open Source-verse in 2018 with the top vulnerabilities and cool projects.

Read More

The National Vulnerability Database Explained

Learn about the National Vulnerability Database (NVD), the largest database of known vulnerabilities. Find out how it differs from the CVE.

Read More
circle

Automating CIRCLECI ORB Updates

Automate CIRCLECI ORB updates with Renovate for low-risk, predictable versioning. Learn how to easily manage dependencies and stay up to date.

Read More
aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViZmZjNmZmY2RlNTkuanBnJnZlcnNpb249MDAwMCZzaWc9Y2Q5NWM2YjljY2RmYWI3MWNmNjQzNTM4OGZhMjM3MzA

OWASP Dependency Check: How Does It Work?

Learn how OWASP Dependency-Check helps secure open source components by identifying vulnerabilities. Discover its features, and more.

Read More
5 female pioneers of software development blog

5 Female Pioneers of Software Development We’re Grateful For This Thanksgiving

Learn about 5 female pioneers of software development we're grateful for. From Ada Lovelace to Barbara Liskov.

Read More
devsecops 3 1

3 DevOps Security Challenges and How to Overcome Them

Learn how to overcome 3 DevOps security challenges, and how to integrate security into the DevOps pipeline.

Read More
go inA

Automating GO Module Dependency Updates

Learn how to automate GO module dependency updates to save time & ensure consistency with Renovate, an open-source tool.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!