™

Mend.io is a Strong Performer in the Forrester Wave™ Software Composition Analysis, Q4 2024

See why Mend.io is recognized as a Strong Performer in The Forrester Wave™ Software Composition Analysis (SCA) Q4 2024 report ... Read More

Mend.io & HeroDevs Partnership: Eliminate Risks in Deprecated Package

Announcing an exclusive partnership between Mend.io and HeroDevs to provide support for deprecated packages ... Read More

All About RAG: What It Is and How to Keep It Secure

Learn about retrieval-augmented generation, one complex AI system that developers are using ... Read More

Vital Signs of Software Dependencies: Understanding Package Health

Learn how package health data empowers developers to update safely and efficiently ... Read More

Cybersecurity Awareness Month: AI Safety for Friends and Family

This blog is for your friends and family working outside of the security and technical industries ... Read More
Don’t Treat DAST Like Dessert

Don’t Treat DAST Like Dessert

| | Application Security
DAST is an essential part of a nutritious application security diet—not just a once-a-quarter treat ... Read More
Mend.io All-in-One Platform

The Power of Platform-Native Consolidation in Application Security

| | Application Security
A quick guide to the Known Exploited Vulnerabilities (KEV) catalog ... Read More
What is the KEV Catalog?

What is the KEV Catalog?

| | Application Security
A quick guide to the Known Exploited Vulnerabilities (KEV) catalog ... Read More

Shining a Light on Shadow AI: What It Is and How to Find It

Find out more about shadow AI and the risks of leaving it uncovered ... Read More
Black Hat 2024: AI, AI, and Everything Else

Black Hat 2024: AI, AI, and Everything Else

| | Application Security
Chris Lindsey shares his takeaways from another exciting Black Hat conference ... Read More
Loading...