Mend.io Resources 22 Jul 2024 Webinar: Protecting the Crown Jewels – Source Code Security LATEST Learn more Filter & Search Clear all Webinar: Protecting the Crown Jewels – Source Code Security Lisa Haas 22 Jul 2024 Application Security This webinar offers insight on how to protect your application source code from data exposures and theft. Read More Webinar: Proactive Container Security – Prioritizing Vulnerabilities with Reachability Lisa Haas 22 Jul 2024 Application Security Join us to learn innovative techniques for analyzing and improving the security posture of container images using reachability analysis. Read More Webinar: Finding and Fixing Software Vulnerabilities That Endanger Your Data Lisa Haas 3 Jul 2024 Supply Chain Security In this panel discussion, learn how to identify, assess, and prioritize the risk of an attacker exploiting the latest vulns in your systems. Read More Webinar: On the Brink – Why AppSec Leaders are Burning Out (and How to Stop It) Lisa Haas 1 Jul 2024 Application Security Learn how to build high-performing AppSec teams, gain executive buy-in, and create a sustainable security program. Read More The Software Composition Analysis Software Landscape, Q2 2024 Lisa Haas 24 Jun 2024 Application Security Discover the latest Forrester research on the Software Composition Analysis Software Landscape, Q2 2024. Read More Webinar: Maximizing SAST: A Guide for Developers and Security Specialists Lisa Haas 17 Jun 2024 Application Security Explore the challenges encountered in securing software applications and unlock the potential of Static Application Security Testing (SAST). Read More Webinar: Navigating “Shift-left” in Container Security Lisa Haas 3 Jun 2024 Application Security Discover innovative strategies and best practices to safeguard your containerized applications in a constantly changing threat landscape. Read More Webinar: How to Define a Zero Trust Strategy Across Multiple IT Silos Lisa Haas 23 May 2024 Application Security Learn how to integrate multiple platforms and technologies to ensure zero-trust policies are enforced from the endpoint to the cloud and everywhere in between. Read More Webinar: Beyond the Hype – Understanding Security Risks in Public LLMs Lisa Haas 13 May 2024 Application Security Learn how to navigate Large Language Model (LLM) risks and ensure the responsible development and deployment of these powerful models. Read More The Essential Guide to Threat Hunting in the Software Supply Chain Lisa Haas 8 May 2024 Supply Chain Security Threat hunting strategies for the software supply chain. Our report provides step-by-step instructions and real-world attack simulations. Read More Webinar: Supply Chain Under Siege: Unveiling Hidden Threats Rhys Arkins 6 May 2024 Supply Chain Security Join Rhys Arkins and Jeffrey Martin in a crucial webinar on tackling supply chain threats. Learn threat hunting strategies, & case studies. Read More From Reactive to Effective: Building Application Security that Works Lisa Haas 19 Apr 2024 Application Security Transform your application security from reactive to effective white paper. Download your copy today. Read More 1234…10Next Subscribe to our Newsletter Join our subscriber list to get the latest news and updates Thanks for signing up!