Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 Ways to Keep AWS Fast with Just-in-Time Access

Modern AWS environments move fast. Engineers spin up EKS clusters for testing, automation pipelines deploy to production, and AI agents trigger infrastructure workflows via Amazon Bedrock. AWS provides ways to manage access primitives such as roles and privileges to keep up with this velocity, such as STS AssumeRole, OIDC federation, IAM Authenticator, and Identity Center. But the challenge isn’t in these primitives themselves. It's the human factor behind the primitives.

Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab

Aembit, the workload identity and access management (IAM) company, today announced new capabilities for GitLab designed to reduce the security risks of long-lived personal access tokens (PATs) and other secrets needed to automate software delivery, while making it easier to deploy and manage pipelines.

Stop Password Sharing & Identify Security Breaches!

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

SBOM Security: 6 Key Components and Top 3 Use Cases

An SBOM (Software Bill of Materials) is a structured list of components, including third-party and open-source software, that make up a software application. It’s a detailed inventory of everything that goes into a software product, similar to a list of ingredients for food. SBOMs are crucial for improving software security by providing transparency and enabling organizations to identify and address potential vulnerabilities and risks within their software supply chains.

AI Cybersecurity & Fact Check

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

The Surprising Truth About GPT-5 in Cursor's Agent Mode

In this video, I test out GPT-5 by asking it to build a simple and secure Node.js notes app that lets users create, read, update, and delete notes. I run two experiments — one without a security MCP server and one with it — to see how well the new model handles both functionality and security.

Like PuTTY in Admin's Hands

Co-author: special thanks to Nikki Stanziale for their invaluable contributions to the research, insights, and development of this blog. While not listed as a primary author, their expertise and collaboration were instrumental in shaping the final content. Executive Summary Cybersecurity experts often say that humans are the weakest and most easily exploited attack vector.

Cybersecurity secrets for companies #appsec #cybersecuritytips

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.