Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is Continuous Deployment Too Risky? Security Concerns and Mitigations

Adopting Continuous Deployment, an extreme form of software delivery automation, can drastically speed up software delivery, but it also introduces critical security challenges. Some of the most severe, global-scale security breaches of recent years (Solarwinds and Kaseya are just two examples) were related to breaches in software delivery infrastructure. Continuous deployment has the potential to make things worse.

Pen Testers Save the Day: Exposing Critical Vulnerabilities! #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Can Google Jules Build a SECURE Note Taking App?

In this video, I test out Google Jules, Google’s brand new AI developer assistant, to see if it can build a secure note-taking app from scratch. With a focus on privacy, authentication, and data protection, I challenge Jules to create something functional and secure. This is part of an ongoing series where I test different AI models and tools to see how well they handle real-world development tasks. Check out our playlist where we're putting these various models to the test!

How to Secure MCP Servers | A Walkthrough

While the hype continues to build around MCP, or model context protocol, a growing number of engineers and organizations are becoming concerned about the potential security risks that MCP invites. In this video, I'll give a demo of how Teleport provides secure access to your MCP servers and how the new Teleport Secure MCP integration gives you a robust solution for protecting your LLM endpoints and data sources.

IT Auditing Secrets: Uncover Financial Shenanigans & Level Up #Cybersecurity #securecloud

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Each Cloud Incident Tells a Different Story - Listen, Act, Win

Let’s be honest. Most cloud security alerts feel like trying to read a book with half the pages missing. You get bits and pieces — “unusual login,” “suspicious process,” “network traffic spike” — but no real explanation of what actually happened or what you should do about it. That’s the daily reality for security teams. You’re not just fighting attackers; you’re fighting for context.

How to deploy PostgresSQL on Kubernetes

Kubernetes is a container orchestration platform that automates the deployment, scaling, and management of containerized applications, abstracting many of the manual steps of rolling upgrades and scaling. When building cloud-native applications, you’ll often need to deploy database applications like PostgreSQL so that your applications can leverage their features within the cluster.

Why You Report Critical Bugs Immediately #cybersecurity #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

What Are OWASP Top 10 Threats & When Will the Top 10 Be Updated?

The OWASP Top 10 is a security research project that outlines the ten most critical security risks to web applications. Published by the Open Worldwide Application Security Project (OWASP), it serves as a widely recognized benchmark for web application security. The list is compiled from data gathered by security experts and organizations worldwide, based on the prevalence, detectability, and impact of various vulnerabilities.