Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Your DevOps Platform Needs a Security Partner to Safeguard Your Software

Here at Mend, we work with businesses of different sizes and maturity across a wide variety of industry sectors, such as healthcare, finance, manufacturing, construction, media, software, and more. One thing they have in common is that they are all involved in software development in one form or another. They use code and software components and dependencies within a DevOps environment to create both internal and customer-facing applications.

The Power of Manual Penetration Testing in Securing Your Attack Surface

When it comes to protecting software, don’t count on automated testing to find all the vulnerabilities in your code. Here’s why manual penetration testing is more essential (and more accessible) than one might think.

What is Cyber Insurance? Understanding the Basics

Cyber insurance (also cyber liability insurance coverage or cyber risk insurance) is a type of insurance policy that helps organizations cover financial damages related to cyber attacks or data breaches. Cyber insurance is especially important as the cost of a data breach continues to rise, and the amount of cyber attacks is higher than ever.

Supply Chain Security for Open Source: Pyrsia at CD Summit and KubeCon 2022

I was super excited to be at Kubecon+CloudNativeCon this year. Kubecon has managed to build a great community that goes beyond Kubernetes and has been a good catalyst in bringing together people passionate about OpenSource. Kubecon also has attracted a lot of interest due to the quality of sessions, the number of co-located events, and the opportunity to connect with peers, partners and friends.

Understanding HIPAA Compliance Requirements for Business Associates

HIPAA Compliance can be confusing for an organization, especially for Business Associates who are equally liable to comply with the HIPAA Rules. Knowing what to comply with and understanding the rules of HIPAA may even seem overwhelming. But here is an opportunity to learn in detail and understand the HIPAA Compliance Requirements for Business Associates.

Identifying a Quality Pentest - Sedara Whiteboard Series

In this episode of the Sedara Cybersecurity Whiteboard Series, our Lead Pentester Nick Aures talks about what to look for in a quality pentest. Nick breaks the talk down into 4 key takeaways: Take a look, and we hope it’s helpful. What Should I Look for in a Quality Penetration Test? Penetration testing is a fundamental part of validating the security measures you’ve taken and showing they are effective.

What is a SOC 2 readiness assessment?

A SOC 2 readiness assessment is a final look at your organization’s documents, policies, processes, and vulnerabilities before your formal audit takes place. This is a crucial phase of SOC 2 compliance because your auditor will be using these materials in depth to assess your control environment. ‍ A SOC 2 readiness assessment provides answers to questions such as: ‍ ‍ Before we dive deeper into readiness assessments, here’s a quick primer on SOC 2 audits.

Salt: Securing your innovation

Salt Security protects the APIs that form the core of every modern application. Its patented API Protection Platform is the only API security solution that combines the power of cloud-scale big data and time-tested ML/AI to detect and prevent API attacks. By correlating activities across millions of APIs and users over time, Salt delivers deep context with real-time analysis and continuous insights for API discovery, attack prevention, and shift-left practices.