Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Application Security including monitoring, testing, and open source.

Elevate Application Security from the Start with Static Analysis for Effective Risk Management

Securing your applications couldn’t be more important in today’s fast-moving world of software development. Organizations face mounting pressure to deliver innovative software at an accelerated pace, yet this speed must never compromise security. This is where DevSecOps becomes crucial. With threats constantly getting smarter, developers need effective tools to write secure code right from the start.

Proven Best Practices for Safer Code that Work: AppSec for the Win | Webinar Mend.io

In this session, Chris Lindsey discusses proven best practices for building a robust AppSec program, offering actionable insights for both developers and security teams. Chris, with over 35 years of experience in software development and 15+ years in security, shares strategies that helped him run a successful security program.

Beyond Traditional AppSec: Navigating the New Frontier of AI Security with Mend AI

Hear from Bar-El Tayouri, Head of Mend AI, about the urgent need for a new approach to securing AI-driven applications. From understanding novel AI components and their risks to implementing a comprehensive AppSec program, this episode provides actionable insights for organizations building with AI.

Tackling the Modern WAF Challenge: Why Managed WAAP Is the Key to Effective Application Security

Organizations today face a continuous struggle to secure their web applications against threats that constantly evolve in the fast-paced digital landscape. The Web Application Firewall (WAF) serves as a primary line of defense against these threats; however, its management challenges often outweigh its security benefits, resulting in organizations not realizing the full value of their security investment.

How to Spot and Stop Security Risks From Unmanaged AI Tools: Shadow AI, LLM Agents, Compliance Risks

How to Spot and Stop Security Risks From Unmanaged AI Tools Shadow AI is exploding in organizations—developers are using AI tools and models without approval, often embedding them into production systems. In this webinar, Mend.io EVP of Product Management Nir Stern explains the real risks behind unmanaged AI tools, why traditional AppSec can’t keep up, and eight practical steps to regain control.

Revolutionizing DevSecOps with AI-Powered Application Security

The application security landscape is undergoing a fundamental transformation. While organizations race to deliver software faster than ever, traditional security approaches create bottlenecks that compromise both speed and protection. This isn’t a problem you can solve by throwing more disparate tools at the challenge. It requires a holistic, strategic shift to AI-powered application security.

AI Meets SAST - Reimagining the Future of Static Analysis | Webinar Mend.io

Join host Tony Morbin as he explores how AI is revolutionizing Static Application Security Testing (SAST) in this future-forward episode with Saoirse Hinksmon, Senior Product Marketing Manager at Mend.io, and Amir Shahmir, Senior Sales Engineer at Mend.io. This isn’t your average security webinar — it’s a deep dive into the convergence of AI and SAST, uncovering how GenAI is making static analysis faster, smarter, and more actionable for developers and AppSec teams alike.

AI Is Writing the Code - Can Security Keep Up? | How to Secure Agentic IDEs from Dev to CI/CD | Mend

AI coding agents are exploding in use—but are they quietly shipping exploitable code? In this webinar, we break down real data, real incidents, and a practical blueprint for securing AI-accelerated development.

Enrich, Parse, and Control Logs with Observability Pipelines for Datadog Cloud SIEM

See how Datadog Observability Pipelines helps security and operations teams take control of their log data. In this demo, we’ll walk through: With Datadog, you can normalize, enrich, and prepare high-quality log data for Cloud SIEM, supporting faster investigations, more accurate detections, and reduced operational overhead—all without third-party software.

Securing Your Software Supply Chain with Veracode: Protect Against Attacks Proactively

In today's escalating landscape of software supply chain attacks, enterprises are facing infiltration from malicious open-source libraries and compromised components. Join us in this solution brief video as we dive into Veracode's comprehensive Application Risk Management Platform, designed to detect, prevent, and inform on vulnerabilities at their source.