Learn

Learn about software supply chain security and Endor Labs.

Featured resources

Endor Patches whitepaper
Ebook/Report

Endor Patches Whitepaper

Dec 16, 2024
Blog

Microsoft Defender for Cloud Natively Integrates with Endor Labs

Nov 19, 2024
Start Clean With AI: Select Safer LLM Models with Endor Labs
Blog

Start Clean With AI: Select Safer LLM Models with Endor Labs

Oct 16, 2024
Ebook/Report

2024 Dependency Management Report

Sep 12, 2024
Topic
Medium
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CI/CD
Compliance & SBOM
Security
Introducing CI/CD Security with Endor Labs
Blog

Introducing CI/CD Security with Endor Labs

Feb 14, 2024
Security
Open Source
SCA
How to Improve SCA in GitHub Advanced Security
Video

How to Improve SCA in GitHub Advanced Security - Tutorial

Feb 5, 2024
Security
Open Source
SCA
Compliance & SBOM
How to Ingest and Manage SBOMs
Video

How to Ingest and Manage SBOMs - Tutorial

Jan 30, 2024
No items found.
VMware achieves SBOM compliance for over 100 services with Endor Labs
Customer Story

VMware Achieves SBOM Compliance for Over 100 Services with Endor Labs

Jan 29, 2024
Security
AI/ML
AI-Supported Environment Debugging for Endor Labs
Blog

AI-Supported Environment Debugging for Endor Labs

Jan 25, 2024
Security
Open Source
SCA
Compliance & SBOM
How to Generate SBOM and VEX
Video

How to Generate SBOM and VEX - Tutorial

Jan 23, 2024
Security
AI/ML
Open Source
How to Use AI for Open Source Selection
Video

How to Use AI for Open Source Selection - Tutorial

Jan 9, 2024
Security
SCA
News
Introducing a Better Way to SCA for Monorepos and Bazel
Blog

Introducing a Better Way to SCA for Monorepos and Bazel

Jan 8, 2024
SCA
Security
Opinion
5 Types of Reachability Analysis (and Which is Right for You)
Blog

5 Types of Reachability Analysis (and Which is Right for You)

Jan 2, 2024
Security
Tech
What’s in a Name? A Look at the Software Identification Ecosystem
Blog

What’s in a Name? A Look at the Software Identification Ecosystem

Dec 20, 2023
Security
What you need to know about Apache Struts and CVE-2023-50164
Blog

What You Need to Know About Apache Struts and CVE-2023-50164

Dec 18, 2023
Security
SCA
Introducing JavaScript Reachability and Phantom Dependency Detection
Blog

Introducing JavaScript Reachability and Phantom Dependency Detection

Dec 12, 2023
Security
SCA
MileIQ securely reimagines a decade old product with Endor Labs
Customer Story

MileIQ Securely Reimagines a Decade Old Product with Endor Labs

Dec 11, 2023
Security
Compliance & SBOM
How CycloneDX VEX Makes Your SBOM Useful
Blog

How CycloneDX VEX Makes Your SBOM Useful

Dec 8, 2023
First Party Code
Security
How to Scan and Prioritize Valid Secrets
Video

How to Scan and Prioritize Valid Secrets - Tutorial

Dec 6, 2023
Security
Compliance & SBOM
SBOM Requirements for Medical Devices
Blog

SBOM Requirements for Medical Devices

Dec 5, 2023
Security
Compliance & SBOM
CISA and NCSC's Take on Secure AI Development
Blog

CISA and NCSC's Take on Secure AI Development

Nov 30, 2023
Security
Open Source
Open Source Security 101: How to Evaluate Your Open Source Security Posture
Blog

Open Source Security 101: How to Evaluate Your Open Source Security Posture

Nov 16, 2023
News
Endor Labs is a CRN 2023 Stellar Startup!
Blog

Endor Labs is a CRN 2023 Stellar Startup!

Nov 13, 2023
SCA
Open Source
How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities
Video

How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial

Nov 9, 2023
SCA
AI/ML
Open Source
Open Source Security for Python and AI Apps
Solution Brief

Open Source Security for Python and AI Apps

Nov 6, 2023
Security
First Party Code
How To Evaluate Secret Detection Tools
Blog

How To Evaluate Secret Detection Tools

Oct 31, 2023
Security
SCA
Why SCA tools can't agree if something is a CVE
Blog

Why SCA Tools Can't Agree if Something is a CVE

Oct 20, 2023
Security
Compliance & SBOM
5 Federal Software Supply Chain Requirements You Should Be Aware Of
Blog

5 Federal Software Supply Chain Requirements You Should Be Aware Of

Oct 16, 2023
Security
SCA
You found vulnerabilities in your dependencies, now what?
Blog

You Found Vulnerabilities in Your Dependencies, Now What?

Oct 6, 2023
SCA
Dependency Resolution in Python: Beware The Phantom Dependency
Blog

Dependency Resolution in Python: Beware The Phantom Dependency

Sep 28, 2023
News
Chris Hughes Joins Endor Labs as Chief Security Advisor
Blog

Chris Hughes Joins Endor Labs as Chief Security Advisor

Sep 26, 2023
Developer Productivity
SCA
Understanding Python Manifest Files: Part 1
Blog

Understanding Python Manifest Files

Sep 20, 2023
SCA
Why Your SCA is Always Wrong
Blog

Why Your SCA is Always Wrong

Sep 12, 2023
Security
Endor Labs Named 2023 SINET16 Innovator Award Winner
Blog

Endor Labs Named 2023 SINET16 Innovator Award Winner

Sep 7, 2023
Security
SCA
Combining the Exploit Prediction Scoring System (EPSS) with reachability analysis to optimize your vulnerability management program
Blog

Combining EPSS and Reachability Analysis to Optimize Vulnerability Management

Sep 6, 2023
SCA
Open Source
Reachability Analysis for Python, Go, C#
Video

Reachability Analysis for Python, Go, C# - Webinar

Sep 5, 2023
Security
SCA
News
Introducing SCA reachability analysis for Python, Go, and C#
Blog

Introducing Reachability-Based SCA for Python, Go, and C#

Sep 5, 2023
Security
Open Source
The Open Source Security Index Top 5
Blog

The Open Source Security Index Top 5

Aug 29, 2023
Security
SCA
Faster SCA with Endor Labs and npm workspaces
Blog

Faster SCA with Endor Labs and npm Workspaces

Aug 28, 2023
Security
Compliance & SBOM
Key questions for your SBOM program
Blog

Key Questions for Your SBOM Program

Aug 7, 2023
Security
SCA
Endor Labs & Github Advanced Security: AppSec Without The Productivity Tax
Blog

Endor Labs & Github Advanced Security: AppSec Without The Productivity Tax

Aug 7, 2023
News
SCA
Endor Labs raises $70M in series A funding to reform application security
Blog

Endor Labs Raises $70M in Series A Funding to Reform Application Security

Aug 3, 2023
Security
SCA
How should I prioritize software vulnerabilities?
Blog

How Should I Prioritize Software Vulnerabilities?

Jul 28, 2023
Security
Divide and Hide: How malicious code lived on PyPI for 3 months
Blog

Divide and Hide: How Malicious Code Lived on PyPI for 3 months

Jul 21, 2023
News
Endor Labs’ ‘State of Dependency Management 2023’ Report Offers Insight on Explosive Popularity of AI and LLMs—and How They Impact Application Security
Blog

Endor Labs’ ‘State of Dependency Management 2023’ Report Offers Insight on Explosive Popularity of AI and LLMs—and How They Impact Application Security

Jul 20, 2023
SCA
AI/ML
Security
Open Source
State of Dependency Management 2023
Ebook/Report

State of Dependency Management 2023

Jul 20, 2023
News
Endor Labs Recognized as a Cool Vendor in the 2023 Gartner® Cool Vendors™ in Platform Engineering for Scaling Application Security Practices
Blog

Endor Labs Recognized as a Cool Vendor in the 2023 Gartner® Cool Vendors™ in Platform Engineering for Scaling Application Security Practices

Jul 12, 2023
Security
SCA
Open Source
Visualizing the Impact of Call Graphs on Open Source Security
Blog

Visualizing the Impact of Call Graphs on Open Source Security

Jun 30, 2023
Security
SCA
Why Different SCA Tools Produce Different Results
Blog

Why Different SCA Tools Produce Different Results

Jun 29, 2023
Security
SCA
Strengthening Security in .NET Development with packages.lock.json
Blog

Strengthening Security in .NET Development with packages.lock.json

Jun 28, 2023
SCA
Open Source
Highlights from State of Dependency Management 2022
Video

Highlights from State of Dependency Management 2022 - Webinar

Jun 23, 2023
SCA
Open Source
How Security and Engineering Can Scale Open Source Security
Video

How Security and Engineering Can Scale Open Source Security - Webinar

Jun 23, 2023
Compliance & SBOM
News
Security
Endor Labs is SOC 2 Type II Certified!
Blog

Endor Labs is SOC 2 Type II Certified!

Jun 15, 2023
Security
SCA
Open Source
Reviewing Malware with LLMs: OpenAI vs. Vertex AI
Blog

Reviewing Malware with LLMs: OpenAI vs. Vertex AI

Jun 5, 2023
News
Endor Labs Wins Intellyx Digital Innovation Award
Blog

Endor Labs Wins Intellyx Digital Innovation Award

May 23, 2023
News
Endor Labs Recognized As a 2023 Bay Area Best Place to Work
Blog

Endor Labs Recognized As a 2023 Bay Area Best Place to Work

May 5, 2023
Security
Developer Productivity
SCA
Make Developers' Lives Easier with Endor Labs & GitHub Advanced Security
Blog

Make Developers' Lives Easier with Endor Labs & GitHub Advanced Security

May 3, 2023
Security
LLM-assisted Malware Review: AI and Humans Join Forces to Combat Malware
Blog

LLM-assisted Malware Review: AI and Humans Join Forces to Combat Malware

Apr 17, 2023
News
Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox
Blog

Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox

Mar 22, 2023
News
Endor Labs Announces 100% Channel Commitment, Launches Global Hyperdrive Program to Arm Resellers and Solution Providers with Unprecedented Software Supply Chain Security
Blog

Announcing the Endor Labs Hyperdrive Program for Resellers and Solution Providers

Mar 16, 2023
News
Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software
Blog

Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software

Mar 6, 2023
SCA
Security
Open Source
OWASP Top 10 Risks for Open Source
Ebook/Report

OWASP Top 10 Risks for Open Source

Mar 1, 2023
Security
Compliance & SBOM
How to quickly measure SBOM accuracy for Maven projects (for free)
Blog

How to Quickly Measure SBOM Accuracy for Maven Projects (for Free)

Feb 28, 2023
Compliance & SBOM
News
Security
Endor Labs is SOC2 Certified!
Blog

Endor Labs is SOC2 Certified!

Feb 9, 2023
SCA
Open Source
Introduction to Open Source Security
Video

Introduction to Open Source Security - Webinar

Feb 3, 2023
SCA
Open Source
Comparing SBOMs Generated at Different Lifecycle Stages
Video

Comparing SBOMs Generated at Different Lifecycle Stages - Webinar

Feb 3, 2023
Security
Compliance & SBOM
SBOM vs. SBOM: Comparing SBOMs from different tools and lifecycle stages
Blog

SBOM vs. SBOM: Comparing SBOMs from Different Tools and Lifecycle Stages

Feb 2, 2023
Developer Productivity
Security
What breaking changes teach us about security
Blog

What Breaking Changes Teach Us about Security

Jan 31, 2023
Compliance & SBOM
Open Source Licensing Simplified: A Comparative Overview of Popular Licenses
Blog

Open Source Licensing Simplified: A Comparative Overview of Popular Licenses

Jan 24, 2023
Security
Compliance & SBOM
What is VEX and why should I care?
Blog

What is VEX and Why Should I Care?

Jan 18, 2023
Security
Open Source
Whatfuscator, malicious open source packages, and other beasts
Blog

Whatfuscator, Malicious Open Source Packages, and Other Beasts

Jan 9, 2023
Security
Exploring Risk: Understanding Software Supply Chain Attacks
Blog

Exploring Risk: Understanding Software Supply Chain Attacks

Jan 5, 2023
News
Endor Labs and Intuitive partner to help enterprises leverage open source software most securely and effectively
Blog

Endor Labs and Intuitive Partner to Help Enterprises Leverage OSS

Jan 2, 2023
SCA
Security
What is reachability-based dependency analysis?
Blog

What is Reachability-Based Dependency Analysis?

Dec 21, 2022
SCA
Security
Open Source
State of Dependency Management 2022
Ebook/Report

State of Dependency Management 2022

Dec 8, 2022
SCA
Open Source
Why We Need Static Analysis When Prioritizing Vulnerabilities
Video

Why We Need Static Analysis When Prioritizing Vulnerabilities - Webinar

Dec 6, 2022
Security
What are Maven dependency scopes and their related security risks?
Blog

What are Maven Dependency Scopes and Their Related Security Risks?

Nov 29, 2022
Security
Compliance & SBOM
Open Source
The Government's Role in Maintaining Open-Source Security
Blog

The Government's Role in Maintaining Open Source Security

Nov 21, 2022
SCA
Security
Introduction to Program Analysis
Blog

Introduction to Program Analysis

Nov 17, 2022
News
More Than 30 Industry-Leading CISOs Personally Invest in Endor Labs
Blog

More Than 30 Industry-Leading CISOs Personally Invest in Endor Labs

Nov 9, 2022
News
SCA
From cloud security to code security: why we've raised $25M to take on OSS dependency sprawl
Blog

From Cloud Security to Code Security: Why We've Raised $25M to Take on OSS Dependency Sprawl

Oct 11, 2022
News
Open Source
Endor Labs Launches with $25M Seed Financing to Tackle Massive Sprawl of Open Source Software (OSS)
Blog

Endor Labs Launches with $25M Seed Financing to Tackle Massive Sprawl of Open Source Software (OSS)

Oct 10, 2022
Security
Compliance & SBOM
SBOMs are just a means to an end
Blog

SBOMs are Just a Means to an End

Sep 13, 2022
Security
Open Source
Introducing the OpenSSF Scorecard API
Blog

Introducing the OpenSSF Scorecard API

Sep 8, 2022
Developer Productivity
How to get the most out of GitHub API rate limits
Blog

How to Get the Most out of GitHub API Rate Limits

Aug 21, 2022
News
Opinion
Why I joined Endor Labs to Build our India Team
Blog

Why I Joined Endor Labs to Build our India Team

Aug 2, 2022
Opinion
Security
Open Source
How Zero Trust principles can accelerate open source adoption in enterprises
Blog

How Zero Trust Principles Can Accelerate Enterprise Adoption of OSS

Jul 25, 2022
Security
Tech
What security teams need to know about software development
Blog

What Security Teams Need to Know about Software Development

Jul 14, 2022
Opinion
Security
CSRB Log4j Report - The Response is as Dangerous as the Vulnerability
Blog

CSRB Log4j Report - The Response is as Dangerous as the Vulnerability

Jul 14, 2022
Security
Developer Productivity
Opinion
Polyrepo vs. Monorepo - How does it impact dependency management?
Blog

Polyrepo vs. Monorepo - How Does it Impact Dependency Management?

Jul 12, 2022
no-results
Sorry, no results matching your search.

Want to stay in the loop?

Sign up for our newsletter.