Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SBOMs That Actually Matter

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

GitHub Token Recycing #github #tokenrecycling #tokens

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

EU AI Act Compliance: Requirements, Risks, and What to Document

→ Audit your AI systems against EU AI Act requirements now — validate Annex IV technical documentation, logging, and data governance. The initial August 2025 compliance date has passed, and full penalties begin in August 2026. → Build a continuous compliance evidence chain — document risk management across the full lifecycle (design, development, deployment, and post-market monitoring).

Best Software Composition Analysis (SCA) Tools: Top Solutions in 2026

Software Composition Analysis (SCA) tools expose the risks in open source dependencies by identifying vulnerabilities, outdated dependencies, and license issues in your codebase. Top solutions include Mend.io (best for automated remediation and proactive SCA), Sonatype Lifecycle (known for enterprise policy management), Snyk (known for developer experience), and Checkmarx SCA (known for comprehensive coverage).

How Financial Services Teams Should Secure AI Agents in 2026

Your fraud detection agent scores 30,000 transactions per hour. Your KYC agent processes identity verifications against government watchlists. Your customer service chatbot resolves disputes and initiates balance transfers. Each agent runs on Kubernetes with inherited service account permissions that span payment APIs, customer databases, and compliance systems. Now imagine one of those agents is compromised through a prompt injection embedded in a customer support ticket.

What's Actually Changing in HIPAA (and What IT Teams Need to Fix Now)

Hosted by CalCom — helping healthcare and financial organizations secure and harden server environments for compliance frameworks like HIPAA, CIS, and NIST. Trusted by organizations managing regulated environments where configuration security and audit readiness matter. A HIPAA Auditor won't tell your servers to turn their head an cough, but your configurations may still not be healthy. Some security practices that used to be “recommended” are quickly becoming expected controls. This session breaks down what’s changing, what auditors will look for, and what you should address now.

A Look At GitGuardian's ML-Powered Contextual EnrichmentAnd Incident Scoring

In this quick introductory video, Mathieu Bellon, Senior Product Manager at GitGuardian, sits down with Dwayne McDaniel, Developer Advocate, to cover some of the advancements GitGuardian has made by integrating machine learning directly into the secrets security platform. Mathieu describes how engineers and responders can save serious time as by automating contextual analysis, geving the humans in the loop with the best information to be able to take an informed action when it comes to secrets leaks. They also discuss the security implications and where teams can look if they want to opt out or bring their own agents.