Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mend Renovate Product Family Demo

Mend Renovate scans your software, discovers dependencies, automatically checks to see if an updated version exists, and submits automated pull requests. Mend.io provides Renovate as an open source solution as part of our support for the developer community. For those customers that need a fully scalable, fully supported, fully automated solution, we offer Renovate Enterprise Edition.

10 best practices for securely developing with AI

By now, we’re all painfully aware that AI has become a crucial and inevitable tool for developers to enhance their application development practices. Even if organizations restrict their developers using AI tools, we hear many stories of how they circumvent this through VPNs, and personal accounts.

What are AI Phishing Attacks?

What are AI Phishing Attacks? AI phishing attacks, also known as AI-powered phishing or AI-driven phishing, are sophisticated cyberattacks that leverage artificial intelligence and machine learning algorithms to craft and execute highly convincing phishing attempts. These attacks are designed to deceive individuals or employees into divulging sensitive information, such as login credentials, financial details, or personal data. How Do AI Phishing Attacks Work?

Microsoft AI involuntarily exposed a secret giving access to 38TB of confidential data for 3 years

Discover how an overprovisioned SAS token exposed a massive 38TB trove of private data on GitHub for nearly three years. Learn about the misconfiguration, security risks, and mitigation strategies to protect your sensitive assets.

Protecting from Threats Caused by OpenAI and LLM Tools | Mona Salvi (Senior Director, HubSpot)

Here are some highlights of the conversation between Mona Salvi (Senior Director - Product Security, HubSpot) and Venky (Founder, Indusface). She talks to Venky about building a unified organization structure and North Star metrics to drive security-related initiatives in a cohesive working environment. She also shares how to manage three pillars - platform security + trust & safety + payments fraud together under a single leadership umbrella.

Enterprises Are Hesitant to Share Data with LLMs. Here's Why.

Large language models like OpenAI’s GPT, Anthropic’s Claude, and Google’s Gemini have changed the way businesses process and transmit sensitive data. LLMs boosted productivity and enhanced customer experience like never before, triggering unprecedented adoption across enterprises. Amidst all the rush and excitement, the negative impacts were overlooked and swept under the carpet – till it became a privacy and compliance issue.

Economic impact of automation and artificial intelligence

One of the most important technology trends in cybersecurity is AI (artificial intelligence). The idea behind AI in cybersecurity is to use AI-enabled software to augment human expertise by rapidly identifying zero day malware, APTs, malwareless attacks, or hacking attempts, reducing the organizations’ incident costs.

Power Up with AI - How to Take Your GRC to the Next Level

Get ready to dive into the intersection of AI and GRC, where leveling up your program isn't just a metaphor – it's the next level of success. GRC leaders are discovering how AI is the ultimate power up, enhancing their security posture and helping them knock out risks and liability proactively. With AI by their side, GRC teams are dashing through challenging security questionnaires, scoring points with customers, and leaving their competitors in the dust.

New Acquisition Powers AI-based Network Detection and Response and Open XDR Capabilities for WatchGuard

Once integrated into the WatchGuard Unified Security Platform architecture, the CyGlass technology will deliver AI- and ML-based detection of network anomalies and accelerate Open XDR capabilities.