Mend.io Blog

All About RAG: What It Is and How to Keep It Secure

All About RAG: What It Is and How to Keep It Secure

LATEST
Learn more
Filter & Search
python

Python Import: Mastering the Advanced Features

Explore advanced Python import features to enhance your code organization and efficiency. Learn about dynamic imports, resource management.

Read More
what developers need do to implement effective appsec and dependency management

What Developers Need to Succeed for Effective Application Security

Discover what developers need to succeed for application security. Learn about shifting left, automation, training, collaboration, and more.

Read More
best practices of highly effective appsec programs

Best Practices of Highly Effective AppSec Programs

Discover best practices for highly effective AppSec. Learn about dependency management, DevSecOps, and more.

Read More
renovate enterprise edition launch

Mend.io Launches Mend Renovate Enterprise Edition

Mend Renovate Enterprise Edition offers unlimited scalability and premium features for enterprise-level dependency management.

Read More
secure code warrior integration launch

Add to Your AppSec Arsenal with Mend.io’s Integration with Secure Code Warrior®

Discover how Mend.io's integration with Secure Code Warrior® enhances developers' awareness, speed, efficiency, simplicity, and more.

Read More
death in the sdlc

Let’s Embrace Death in the Software Development Lifecycle

Learn why it's important to let software products die gracefully rather than become zombies, affecting security and functionality over time.

Read More
esg report release 1

New ESG Research Report Outlines Best Practices for Effective Application Security Programs

New ESG Research Report reveals best practices for application security programs. Learn how to prevent incidents and secure software apps.

Read More
why the us government continues to push for software supply chain security

Why The US Government Continues to Push for Software Supply Chain Security

Discover why the US government is prioritizing software supply chain security. Learn about CISA's goals and objectives at the SOSS Summit.

Read More
owasp 2023 api security top ten

The Latest Trends in API Security: The 2023 OWASP API Security Top Ten

Discover the latest OWASP API Security Top Ten for 2023. Understand key vulnerabilities and how to safeguard your applications.

Read More
why dependency management reduces your enterprises technical debt

Why Dependency Management Reduces Your Enterprise’s Technical Debt

Learn how dependency management can reduce technical debt in your enterprise. Find out how outdated dependencies can lead to security risks.

Read More
five reasons you need automatic software updates for your application

Cybersecurity Awareness Month 2023: Five Reasons You Need Automatic Software Updates for Your Application Security.

To mark Cybersecurity Awareness Month 2023, discover five key reasons why automated software updates are so vital for your application security.

Read More

Vulnerability Assessment: A Guide

Learn about the importance of vulnerability assessments in improving security posture. Understand the process, misconceptions, tools, & more.

Read More
what role should dependency management play as the regulation of the software supply chain escalates

What Role Should Dependency Management Play as the Regulation of the Software Supply Chain Escalates?

Discover the importance of dependency management in securing the software supply chain as regulations escalate.

Read More
attackers are using automation software vendors must catch up

Adversaries Are Using Automation. Software Vendors Must Catch Up

Discover the importance of automation in cybersecurity and how software vendors can stay ahead of adversaries.

Read More
how to communicate the value of your company with sboms

Communicating the Value of Your Company With SBOMs

Learn how to effectively communicate the value of your company with Software Bill of Materials (SBOMs).

Read More
software supply chain security the basics and four critical best practices

Software Supply Chain Security: The Basics and Four Critical Best Practices

Learn about software supply chain security basics and best practices to prevent attacks.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!