Learn about software supply chain security and Endor Labs.
Featured resources
Ebook/Report
Dec 16, 2024
Endor Patches Whitepaper
Blog
Nov 19, 2024
Microsoft Defender for Cloud Natively Integrates with Endor Labs
Blog
Oct 16, 2024
Start Clean With AI: Select Safer LLM Models with Endor Labs
Ebook/Report
Sep 12, 2024
2024 Dependency Management Report
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security
Compliance & SBOM
Blog
Dec 5, 2023
SBOM Requirements for Medical Devices
Security
Compliance & SBOM
Blog
Nov 30, 2023
CISA and NCSC's Take on Secure AI Development
Security
Open Source
Blog
Nov 16, 2023
Open Source Security 101: How to Evaluate Your Open Source Security Posture
News
Blog
Nov 13, 2023
Endor Labs is a CRN 2023 Stellar Startup!
SCA
Open Source
Video
Nov 9, 2023
How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial
SCA
AI/ML
Open Source
Solution Brief
Nov 6, 2023
Open Source Security for Python and AI Apps
Security
First Party Code
Blog
Oct 31, 2023
How To Evaluate Secret Detection Tools
Security
SCA
Blog
Oct 20, 2023
Why SCA Tools Can't Agree if Something is a CVE
Security
Compliance & SBOM
Blog
Oct 16, 2023
5 Federal Software Supply Chain Requirements You Should Be Aware Of
Security
SCA
Blog
Oct 6, 2023
You Found Vulnerabilities in Your Dependencies, Now What?
SCA
Blog
Sep 28, 2023
Dependency Resolution in Python: Beware The Phantom Dependency
News
Blog
Sep 26, 2023
Chris Hughes Joins Endor Labs as Chief Security Advisor
Developer Productivity
SCA
Blog
Sep 20, 2023
Understanding Python Manifest Files
SCA
Blog
Sep 12, 2023
Why Your SCA is Always Wrong
Security
Blog
Sep 7, 2023
Endor Labs Named 2023 SINET16 Innovator Award Winner
Security
SCA
Blog
Sep 6, 2023
Combining EPSS and Reachability Analysis to Optimize Vulnerability Management
Security
SCA
News
Blog
Sep 5, 2023
Introducing Reachability-Based SCA for Python, Go, and C#
SCA
Open Source
Video
Sep 5, 2023
Reachability Analysis for Python, Go, C# - Webinar
Security
Open Source
Blog
Aug 29, 2023
The Open Source Security Index Top 5
Security
SCA
Blog
Aug 28, 2023
Faster SCA with Endor Labs and npm Workspaces
Security
SCA
Blog
Aug 7, 2023
Endor Labs & Github Advanced Security: AppSec Without The Productivity Tax
Security
Compliance & SBOM
Blog
Aug 7, 2023
Key Questions for Your SBOM Program
News
SCA
Blog
Aug 3, 2023
Endor Labs Raises $70M in Series A Funding to Reform Application Security
Security
SCA
Blog
Jul 28, 2023
How Should I Prioritize Software Vulnerabilities?
Security
Blog
Jul 21, 2023
Divide and Hide: How Malicious Code Lived on PyPI for 3 months
SCA
AI/ML
Security
Open Source
Ebook/Report
Jul 20, 2023
State of Dependency Management 2023
News
Blog
Jul 20, 2023
Endor Labs’ ‘State of Dependency Management 2023’ Report Offers Insight on Explosive Popularity of AI and LLMs—and How They Impact Application Security
News
Blog
Jul 12, 2023
Endor Labs Recognized as a Cool Vendor in the 2023 Gartner® Cool Vendors™ in Platform Engineering for Scaling Application Security Practices
Security
SCA
Open Source
Blog
Jun 30, 2023
Visualizing the Impact of Call Graphs on Open Source Security
Security
SCA
Blog
Jun 29, 2023
Why Different SCA Tools Produce Different Results
Security
SCA
Blog
Jun 28, 2023
Strengthening Security in .NET Development with packages.lock.json
SCA
Open Source
Video
Jun 23, 2023
How Security and Engineering Can Scale Open Source Security - Webinar
SCA
Open Source
Video
Jun 23, 2023
Highlights from State of Dependency Management 2022 - Webinar
Compliance & SBOM
News
Security
Blog
Jun 15, 2023
Endor Labs is SOC 2 Type II Certified!
Security
SCA
Open Source
Blog
Jun 5, 2023
Reviewing Malware with LLMs: OpenAI vs. Vertex AI
News
Blog
May 23, 2023
Endor Labs Wins Intellyx Digital Innovation Award
News
Blog
May 5, 2023
Endor Labs Recognized As a 2023 Bay Area Best Place to Work
Security
Developer Productivity
SCA
Blog
May 3, 2023
Make Developers' Lives Easier with Endor Labs & GitHub Advanced Security
Security
Blog
Apr 17, 2023
LLM-assisted Malware Review: AI and Humans Join Forces to Combat Malware
News
Blog
Mar 22, 2023
Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox
News
Blog
Mar 16, 2023
Announcing the Endor Labs Hyperdrive Program for Resellers and Solution Providers
News
Blog
Mar 6, 2023
Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software
SCA
Security
Open Source
Ebook/Report
Mar 1, 2023
OWASP Top 10 Risks for Open Source
Security
Compliance & SBOM
Blog
Feb 28, 2023
How to Quickly Measure SBOM Accuracy for Maven Projects (for Free)
Compliance & SBOM
News
Security
Blog
Feb 9, 2023
Endor Labs is SOC2 Certified!
SCA
Open Source
Video
Feb 3, 2023
Comparing SBOMs Generated at Different Lifecycle Stages - Webinar
SCA
Open Source
Video
Feb 3, 2023
Introduction to Open Source Security - Webinar
Security
Compliance & SBOM
Blog
Feb 2, 2023
SBOM vs. SBOM: Comparing SBOMs from Different Tools and Lifecycle Stages
Developer Productivity
Security
Blog
Jan 31, 2023
What Breaking Changes Teach Us about Security
Compliance & SBOM
Blog
Jan 24, 2023
Open Source Licensing Simplified: A Comparative Overview of Popular Licenses
Security
Compliance & SBOM
Blog
Jan 18, 2023
What is VEX and Why Should I Care?
Security
Open Source
Blog
Jan 9, 2023
Whatfuscator, Malicious Open Source Packages, and Other Beasts