Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Always leave a program better than you found it #appsec #developer

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Building Security Programs That Actually Scale - with Bonnie Viteri | Secrets of AppSec Champions

Building great security programs takes more than checklists and best practices—it takes vision, collaboration, and adaptability. In this episode, Bonnie Viteri, Principal Technical Security Engineer at Yahoo, shares how to build scalable, resilient programs that evolve, survive leadership turnover, and actually provide value to the business.

Practical Guide to Integrating DAST in Your DevOps Workflow (2025)

Globally, DDoS attacks surged 108% year‑over‑year, API‑targeted bot assaults jumped 39%, and nine out of ten sites faced bot attacks by the end of 2024. Application‑layer threats are evolving faster than ever, and annual or quarterly scans simply can’t keep up. Yet most teams still treat security as a checkbox, i.e., formal, slow, and disconnected from rapid releases.

Security Staff Shortage: The Silent Crisis in #Tech! #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

The Complete Guide to Jenkins 2FA with miniOrange

When it comes to Jenkins, relying on just usernames and passwords puts your pipelines at risk. This blog explains why 2FA is essential for Jenkins security and how it helps block threats like credential stuffing and brute-force attacks. You’ll explore different 2FA methods and see how the miniOrange Jenkins 2FA plugin makes it easy to protect both user access and APIs.