Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SBOM Security: 6 Key Components and Top 3 Use Cases

An SBOM (Software Bill of Materials) is a structured list of components, including third-party and open-source software, that make up a software application. It’s a detailed inventory of everything that goes into a software product, similar to a list of ingredients for food. SBOMs are crucial for improving software security by providing transparency and enabling organizations to identify and address potential vulnerabilities and risks within their software supply chains.

AI Cybersecurity & Fact Check

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

The Surprising Truth About GPT-5 in Cursor's Agent Mode

In this video, I test out GPT-5 by asking it to build a simple and secure Node.js notes app that lets users create, read, update, and delete notes. I run two experiments — one without a security MCP server and one with it — to see how well the new model handles both functionality and security.

Like PuTTY in Admin's Hands

Co-author: special thanks to Nikki Stanziale for their invaluable contributions to the research, insights, and development of this blog. While not listed as a primary author, their expertise and collaboration were instrumental in shaping the final content. Executive Summary Cybersecurity experts often say that humans are the weakest and most easily exploited attack vector.

Cybersecurity secrets for companies #appsec #cybersecuritytips

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Kubernetes 1.34 - Top Security Enhancements

Kubernetes v1.34 is coming soon, and it brings a rich batch of security upgrades – from alpha features that hint at the future of zero-trust Kubernetes, to mature enhancements making their way into stable releases. Whether you’re managing a production cluster or exploring new security patterns, this release has something worth your attention.