Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Your Code Might Be Using Risky AI Models

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

From Cloud to AI: Innovation, Risk & Business Strategy #ai #podcast

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Is Azure DevOps Down? How To Ensure Resilience

With the growing popularity of Azure DevOps comes an increased need for proper security of data being stored there. A large aspect of ensuring the security of Azure DevOps ecosystems lies in facilitating data resilience. This means to guarantee the availability to protect, keep, and recover data in case of any disruptions, both intentional and accidental.

What Our Ransomware Simulation Taught Us #cybersecurity #ransomware

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Shadow AI: Examples, Risks, and 8 Ways to Mitigate Them

Shadow AI refers to the unauthorized or unmanaged use of AI tools, models, frameworks, APIs or platforms within an organization, operating outside established governance frameworks. While employees may adopt these AI tools with good intentions, seeking to enhance productivity or solve problems more efficiently, the lack of oversight creates significant security, compliance, and operational risks.

Kubernetes Security Risks and Critical Best Practices

Kubernetes security refers to practices, tools, and configurations that protect Kubernetes clusters and workloads from unauthorized access, vulnerabilities, and runtime threats. It involves securing all components of the Kubernetes environment—including the control plane, worker nodes, pods, container images, networking, and storage.

What does 'software reachability granularity' really mean 2nd Episode

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

So your chatbot just insulted a customer? #cybersecurity #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Understanding Runtime Reachability 5th Episode

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.