Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mend & Cursor: Revolutionizing AI-Generated Code Security | Mend.io

Discover how AI is transforming software development with tools like Cursor IDE and Mend.io. In this video, Alex explains how Cursor’s AI First Code Editor simplifies complex tasks, enabling both experienced and new developers to build sophisticated applications faster than ever. Mend.io takes this transformation a step further by seamlessly integrating SAST and SCA directly into the Cursor IDE. This powerful combination ensures that AI-generated code is secure from the moment it’s written, with Mend.io’s Igenic performing rapid scans without slowing down the development process.

From Wallpaper to Web App Firewalls: How I Went from Home Renovations to Cybersecurity

My career began far from blinking servers, network logs, and vulnerability scanners. I started with walls, ladders, and rolls of patterned paper. I was one of the many wallpaper installers who took pride in transforming plain, imperfect rooms into warm, vibrant spaces. Every project began with a tape measure in one hand and a bucket of paste in the other. Clients would invite me into their homes, trusting me to not only make their walls beautiful but also to treat their space with respect.

#AI Voice Scam: How Scammers Mimic CEOs to Steal Your Money #aisecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Always leave a program better than you found it #appsec #developer

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Building Security Programs That Actually Scale - with Bonnie Viteri | Secrets of AppSec Champions

Building great security programs takes more than checklists and best practices—it takes vision, collaboration, and adaptability. In this episode, Bonnie Viteri, Principal Technical Security Engineer at Yahoo, shares how to build scalable, resilient programs that evolve, survive leadership turnover, and actually provide value to the business.

Practical Guide to Integrating DAST in Your DevOps Workflow (2025)

Globally, DDoS attacks surged 108% year‑over‑year, API‑targeted bot assaults jumped 39%, and nine out of ten sites faced bot attacks by the end of 2024. Application‑layer threats are evolving faster than ever, and annual or quarterly scans simply can’t keep up. Yet most teams still treat security as a checkbox, i.e., formal, slow, and disconnected from rapid releases.