Learn

Learn about software supply chain security and Endor Labs.

Featured resources

Endor Patches whitepaper
Ebook/Report
Dec 16, 2024

Endor Patches Whitepaper

Blog
Nov 19, 2024

Microsoft Defender for Cloud Natively Integrates with Endor Labs

Start Clean With AI: Select Safer LLM Models with Endor Labs
Blog
Oct 16, 2024

Start Clean With AI: Select Safer LLM Models with Endor Labs

Ebook/Report
Sep 12, 2024

2024 Dependency Management Report

Topic
Medium
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security
Compliance & SBOM
SBOM Requirements for Medical Devices
Blog
Dec 5, 2023

SBOM Requirements for Medical Devices

Security
Compliance & SBOM
CISA and NCSC's Take on Secure AI Development
Blog
Nov 30, 2023

CISA and NCSC's Take on Secure AI Development

Security
Open Source
Open Source Security 101: How to Evaluate Your Open Source Security Posture
Blog
Nov 16, 2023

Open Source Security 101: How to Evaluate Your Open Source Security Posture

News
Endor Labs is a CRN 2023 Stellar Startup!
Blog
Nov 13, 2023

Endor Labs is a CRN 2023 Stellar Startup!

SCA
Open Source
How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities
Video
Nov 9, 2023

How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial

SCA
AI/ML
Open Source
Open Source Security for Python and AI Apps
Solution Brief
Nov 6, 2023

Open Source Security for Python and AI Apps

Security
First Party Code
How To Evaluate Secret Detection Tools
Blog
Oct 31, 2023

How To Evaluate Secret Detection Tools

Security
SCA
Why SCA tools can't agree if something is a CVE
Blog
Oct 20, 2023

Why SCA Tools Can't Agree if Something is a CVE

Security
Compliance & SBOM
5 Federal Software Supply Chain Requirements You Should Be Aware Of
Blog
Oct 16, 2023

5 Federal Software Supply Chain Requirements You Should Be Aware Of

Security
SCA
You found vulnerabilities in your dependencies, now what?
Blog
Oct 6, 2023

You Found Vulnerabilities in Your Dependencies, Now What?

SCA
Dependency Resolution in Python: Beware The Phantom Dependency
Blog
Sep 28, 2023

Dependency Resolution in Python: Beware The Phantom Dependency

News
Chris Hughes Joins Endor Labs as Chief Security Advisor
Blog
Sep 26, 2023

Chris Hughes Joins Endor Labs as Chief Security Advisor

Developer Productivity
SCA
Understanding Python Manifest Files: Part 1
Blog
Sep 20, 2023

Understanding Python Manifest Files

SCA
Why Your SCA is Always Wrong
Blog
Sep 12, 2023

Why Your SCA is Always Wrong

Security
Endor Labs Named 2023 SINET16 Innovator Award Winner
Blog
Sep 7, 2023

Endor Labs Named 2023 SINET16 Innovator Award Winner

Security
SCA
Combining the Exploit Prediction Scoring System (EPSS) with reachability analysis to optimize your vulnerability management program
Blog
Sep 6, 2023

Combining EPSS and Reachability Analysis to Optimize Vulnerability Management

Security
SCA
News
Introducing SCA reachability analysis for Python, Go, and C#
Blog
Sep 5, 2023

Introducing Reachability-Based SCA for Python, Go, and C#

SCA
Open Source
Reachability Analysis for Python, Go, C#
Video
Sep 5, 2023

Reachability Analysis for Python, Go, C# - Webinar

Security
Open Source
The Open Source Security Index Top 5
Blog
Aug 29, 2023

The Open Source Security Index Top 5

Security
SCA
Faster SCA with Endor Labs and npm workspaces
Blog
Aug 28, 2023

Faster SCA with Endor Labs and npm Workspaces

Security
SCA
Endor Labs & Github Advanced Security: AppSec Without The Productivity Tax
Blog
Aug 7, 2023

Endor Labs & Github Advanced Security: AppSec Without The Productivity Tax

Security
Compliance & SBOM
Key questions for your SBOM program
Blog
Aug 7, 2023

Key Questions for Your SBOM Program

News
SCA
Endor Labs raises $70M in series A funding to reform application security
Blog
Aug 3, 2023

Endor Labs Raises $70M in Series A Funding to Reform Application Security

Security
SCA
How should I prioritize software vulnerabilities?
Blog
Jul 28, 2023

How Should I Prioritize Software Vulnerabilities?

Security
Divide and Hide: How malicious code lived on PyPI for 3 months
Blog
Jul 21, 2023

Divide and Hide: How Malicious Code Lived on PyPI for 3 months

SCA
AI/ML
Security
Open Source
State of Dependency Management 2023
Ebook/Report
Jul 20, 2023

State of Dependency Management 2023

News
Endor Labs’ ‘State of Dependency Management 2023’ Report Offers Insight on Explosive Popularity of AI and LLMs—and How They Impact Application Security
Blog
Jul 20, 2023

Endor Labs’ ‘State of Dependency Management 2023’ Report Offers Insight on Explosive Popularity of AI and LLMs—and How They Impact Application Security

News
Endor Labs Recognized as a Cool Vendor in the 2023 Gartner® Cool Vendors™ in Platform Engineering for Scaling Application Security Practices
Blog
Jul 12, 2023

Endor Labs Recognized as a Cool Vendor in the 2023 Gartner® Cool Vendors™ in Platform Engineering for Scaling Application Security Practices

Security
SCA
Open Source
Visualizing the Impact of Call Graphs on Open Source Security
Blog
Jun 30, 2023

Visualizing the Impact of Call Graphs on Open Source Security

Security
SCA
Why Different SCA Tools Produce Different Results
Blog
Jun 29, 2023

Why Different SCA Tools Produce Different Results

Security
SCA
Strengthening Security in .NET Development with packages.lock.json
Blog
Jun 28, 2023

Strengthening Security in .NET Development with packages.lock.json

SCA
Open Source
How Security and Engineering Can Scale Open Source Security
Video
Jun 23, 2023

How Security and Engineering Can Scale Open Source Security - Webinar

SCA
Open Source
Highlights from State of Dependency Management 2022
Video
Jun 23, 2023

Highlights from State of Dependency Management 2022 - Webinar

Compliance & SBOM
News
Security
Endor Labs is SOC 2 Type II Certified!
Blog
Jun 15, 2023

Endor Labs is SOC 2 Type II Certified!

Security
SCA
Open Source
Reviewing Malware with LLMs: OpenAI vs. Vertex AI
Blog
Jun 5, 2023

Reviewing Malware with LLMs: OpenAI vs. Vertex AI

News
Endor Labs Wins Intellyx Digital Innovation Award
Blog
May 23, 2023

Endor Labs Wins Intellyx Digital Innovation Award

News
Endor Labs Recognized As a 2023 Bay Area Best Place to Work
Blog
May 5, 2023

Endor Labs Recognized As a 2023 Bay Area Best Place to Work

Security
Developer Productivity
SCA
Make Developers' Lives Easier with Endor Labs & GitHub Advanced Security
Blog
May 3, 2023

Make Developers' Lives Easier with Endor Labs & GitHub Advanced Security

Security
LLM-assisted Malware Review: AI and Humans Join Forces to Combat Malware
Blog
Apr 17, 2023

LLM-assisted Malware Review: AI and Humans Join Forces to Combat Malware

News
Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox
Blog
Mar 22, 2023

Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox

News
Endor Labs Announces 100% Channel Commitment, Launches Global Hyperdrive Program to Arm Resellers and Solution Providers with Unprecedented Software Supply Chain Security
Blog
Mar 16, 2023

Announcing the Endor Labs Hyperdrive Program for Resellers and Solution Providers

News
Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software
Blog
Mar 6, 2023

Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software

SCA
Security
Open Source
OWASP Top 10 Risks for Open Source
Ebook/Report
Mar 1, 2023

OWASP Top 10 Risks for Open Source

Security
Compliance & SBOM
How to quickly measure SBOM accuracy for Maven projects (for free)
Blog
Feb 28, 2023

How to Quickly Measure SBOM Accuracy for Maven Projects (for Free)

Compliance & SBOM
News
Security
Endor Labs is SOC2 Certified!
Blog
Feb 9, 2023

Endor Labs is SOC2 Certified!

SCA
Open Source
Comparing SBOMs Generated at Different Lifecycle Stages
Video
Feb 3, 2023

Comparing SBOMs Generated at Different Lifecycle Stages - Webinar

SCA
Open Source
Introduction to Open Source Security
Video
Feb 3, 2023

Introduction to Open Source Security - Webinar

Security
Compliance & SBOM
SBOM vs. SBOM: Comparing SBOMs from different tools and lifecycle stages
Blog
Feb 2, 2023

SBOM vs. SBOM: Comparing SBOMs from Different Tools and Lifecycle Stages

Developer Productivity
Security
What breaking changes teach us about security
Blog
Jan 31, 2023

What Breaking Changes Teach Us about Security

Compliance & SBOM
Open Source Licensing Simplified: A Comparative Overview of Popular Licenses
Blog
Jan 24, 2023

Open Source Licensing Simplified: A Comparative Overview of Popular Licenses

Security
Compliance & SBOM
What is VEX and why should I care?
Blog
Jan 18, 2023

What is VEX and Why Should I Care?

Security
Open Source
Whatfuscator, malicious open source packages, and other beasts
Blog
Jan 9, 2023

Whatfuscator, Malicious Open Source Packages, and Other Beasts

Security
Exploring Risk: Understanding Software Supply Chain Attacks
Blog
Jan 5, 2023

Exploring Risk: Understanding Software Supply Chain Attacks

News
Endor Labs and Intuitive partner to help enterprises leverage open source software most securely and effectively
Blog
Jan 2, 2023

Endor Labs and Intuitive Partner to Help Enterprises Leverage OSS

SCA
Security
What is reachability-based dependency analysis?
Blog
Dec 21, 2022

What is Reachability-Based Dependency Analysis?

SCA
Security
Open Source
State of Dependency Management 2022
Ebook/Report
Dec 8, 2022

State of Dependency Management 2022

SCA
Open Source
Why We Need Static Analysis When Prioritizing Vulnerabilities
Video
Dec 6, 2022

Why We Need Static Analysis When Prioritizing Vulnerabilities - Webinar

Security
What are Maven dependency scopes and their related security risks?
Blog
Nov 29, 2022

What are Maven Dependency Scopes and Their Related Security Risks?

Security
Compliance & SBOM
Open Source
The Government's Role in Maintaining Open-Source Security
Blog
Nov 21, 2022

The Government's Role in Maintaining Open Source Security

SCA
Security
Introduction to Program Analysis
Blog
Nov 17, 2022

Introduction to Program Analysis

News
More Than 30 Industry-Leading CISOs Personally Invest in Endor Labs
Blog
Nov 9, 2022

More Than 30 Industry-Leading CISOs Personally Invest in Endor Labs

News
SCA
From cloud security to code security: why we've raised $25M to take on OSS dependency sprawl
Blog
Oct 11, 2022

From Cloud Security to Code Security: Why We've Raised $25M to Take on OSS Dependency Sprawl

News
Open Source
Endor Labs Launches with $25M Seed Financing to Tackle Massive Sprawl of Open Source Software (OSS)
Blog
Oct 10, 2022

Endor Labs Launches with $25M Seed Financing to Tackle Massive Sprawl of Open Source Software (OSS)

Security
Compliance & SBOM
SBOMs are just a means to an end
Blog
Sep 13, 2022

SBOMs are Just a Means to an End

Security
Open Source
Introducing the OpenSSF Scorecard API
Blog
Sep 8, 2022

Introducing the OpenSSF Scorecard API

Developer Productivity
How to get the most out of GitHub API rate limits
Blog
Aug 21, 2022

How to Get the Most out of GitHub API Rate Limits

News
Opinion
Why I joined Endor Labs to Build our India Team
Blog
Aug 2, 2022

Why I Joined Endor Labs to Build our India Team

Opinion
Security
Open Source
How Zero Trust principles can accelerate open source adoption in enterprises
Blog
Jul 25, 2022

How Zero Trust Principles Can Accelerate Enterprise Adoption of OSS

Opinion
Security
CSRB Log4j Report - The Response is as Dangerous as the Vulnerability
Blog
Jul 14, 2022

CSRB Log4j Report - The Response is as Dangerous as the Vulnerability

Security
Tech
What security teams need to know about software development
Blog
Jul 14, 2022

What Security Teams Need to Know about Software Development

Security
Developer Productivity
Opinion
Polyrepo vs. Monorepo - How does it impact dependency management?
Blog
Jul 12, 2022

Polyrepo vs. Monorepo - How Does it Impact Dependency Management?

no-results
Sorry, no results matching your search.

Want to stay in the loop?

Sign up for our newsletter.

Welcome to the resistance
Oops! Something went wrong while submitting the form.