Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 2-Minute Investigation: How Teleport Identity Security Sees What Your SIEM Can't

Your SIEM collects millions of events. Your CNAPP monitors cloud configurations. But can either tell you how a developer's Okta group membership led to unexpected production access through three different systems? Can they instantly trace an API key's journey from GitHub to your crown jewel databases?

AI Voice Mimicry: How to Protect Yourself From Scams #appsec #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

The Power of Scheduled Automated Backups for DevOps and SaaS

In 2020, a DevOps team at a mid-sized fintech startup almost lost its entire source code. A failed container update caused a cascading failure in their self-hosted GitLab instance. The backup was… somewhere. No one checked it in weeks. The recovery process took three days. The cost was around $70,000 in downtime and customer compensation. The event wasn’t a matter of not having a backup strategy. It was a matter of assuming someone, somewhere, had run the proper function at the right time.

Fixing 4,000 Vulnerabilities? Quick Ways to Eliminate Security Issues! #podcast #infosec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

What We Found with OpenAI's Codex CLI Tool

In this video, I explore OpenAI’s Codex CLI tool to see how powerful it really is for coding with AI. But things quickly go off the rails… what started as a simple test ended with a surprise identity verification request. Apparently, to continue using the tool, I need to submit a government-issued ID and a photo of myself—something I didn’t expect at all. I talk through the process, show the error I ran into, and share my honest thoughts on this level of access and how invasive it feels for a developer tool.

Kubernetes Backup Made Simple: Meet CloudCasa for Cloud-Native Protection

Kubernetes and cloud-native platforms are transforming how we build and run applications—but traditional backup tools just can’t keep up. They’re complex, slow, and expensive. Enter CloudCasa: The backup and recovery solution built specifically for Kubernetes and cloud-native environments. Key Benefits: Kubernetes backup doesn’t have to be complicated. CloudCasa makes it simple, secure, and cost-effective—whether you're protecting clusters, pods, or VMs. What’s your biggest challenge with Kubernetes backup and recovery? Drop your thoughts below—we’d love to hear from you!

Deploying Gen AI Guardrails for Compliance, Security and Trust

AI guardrails are structured safeguards, whether technical, security or ethical, which are designed to guide AI systems so they operate safely, responsibly, and within intended boundaries. Much like highway guardrails that prevent vehicles from veering off course, these measures ensure AI remains aligned with organizational policies, regulations, and ethical values.

SCA Tool: Why Developers Love It & Boost ROI Instantly!

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.