Learn about software supply chain security and Endor Labs.
Featured resources
Ebook/Report
Endor Patches Whitepaper
Dec 16, 2024
Blog
Microsoft Defender for Cloud Natively Integrates with Endor Labs
Nov 19, 2024
Blog
Start Clean With AI: Select Safer LLM Models with Endor Labs
Oct 16, 2024
Ebook/Report
2024 Dependency Management Report
Sep 12, 2024
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CI/CD
Compliance & SBOM
Security
Blog
Introducing CI/CD Security with Endor Labs
Feb 14, 2024
Security
Open Source
SCA
Video
How to Improve SCA in GitHub Advanced Security - Tutorial
Feb 5, 2024
Security
Open Source
SCA
Compliance & SBOM
Video
How to Ingest and Manage SBOMs - Tutorial
Jan 30, 2024
No items found.
Customer Story
VMware Achieves SBOM Compliance for Over 100 Services with Endor Labs
Jan 29, 2024
Security
AI/ML
Blog
AI-Supported Environment Debugging for Endor Labs
Jan 25, 2024
Security
Open Source
SCA
Compliance & SBOM
Video
How to Generate SBOM and VEX - Tutorial
Jan 23, 2024
Security
AI/ML
Open Source
Video
How to Use AI for Open Source Selection - Tutorial
Jan 9, 2024
Security
SCA
News
Blog
Introducing a Better Way to SCA for Monorepos and Bazel
Jan 8, 2024
SCA
Security
Opinion
Blog
5 Types of Reachability Analysis (and Which is Right for You)
Jan 2, 2024
Security
Tech
Blog
What’s in a Name? A Look at the Software Identification Ecosystem
Dec 20, 2023
Security
Blog
What You Need to Know About Apache Struts and CVE-2023-50164
Dec 18, 2023
Security
SCA
Blog
Introducing JavaScript Reachability and Phantom Dependency Detection
Dec 12, 2023
Security
SCA
Customer Story
MileIQ Securely Reimagines a Decade Old Product with Endor Labs
Dec 11, 2023
Security
Compliance & SBOM
Blog
How CycloneDX VEX Makes Your SBOM Useful
Dec 8, 2023
First Party Code
Security
Video
How to Scan and Prioritize Valid Secrets - Tutorial
Dec 6, 2023
Security
Compliance & SBOM
Blog
SBOM Requirements for Medical Devices
Dec 5, 2023
Security
Compliance & SBOM
Blog
CISA and NCSC's Take on Secure AI Development
Nov 30, 2023
Security
Open Source
Blog
Open Source Security 101: How to Evaluate Your Open Source Security Posture
Nov 16, 2023
News
Blog
Endor Labs is a CRN 2023 Stellar Startup!
Nov 13, 2023
SCA
Open Source
Video
How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial
Nov 9, 2023
SCA
AI/ML
Open Source
Solution Brief
Open Source Security for Python and AI Apps
Nov 6, 2023
Security
First Party Code
Blog
How To Evaluate Secret Detection Tools
Oct 31, 2023
Security
SCA
Blog
Why SCA Tools Can't Agree if Something is a CVE
Oct 20, 2023
Security
Compliance & SBOM
Blog
5 Federal Software Supply Chain Requirements You Should Be Aware Of
Oct 16, 2023
Security
SCA
Blog
You Found Vulnerabilities in Your Dependencies, Now What?
Oct 6, 2023
SCA
Blog
Dependency Resolution in Python: Beware The Phantom Dependency
Sep 28, 2023
News
Blog
Chris Hughes Joins Endor Labs as Chief Security Advisor
Sep 26, 2023
Developer Productivity
SCA
Blog
Understanding Python Manifest Files
Sep 20, 2023
SCA
Blog
Why Your SCA is Always Wrong
Sep 12, 2023
Security
Blog
Endor Labs Named 2023 SINET16 Innovator Award Winner
Sep 7, 2023
Security
SCA
Blog
Combining EPSS and Reachability Analysis to Optimize Vulnerability Management
Sep 6, 2023
SCA
Open Source
Video
Reachability Analysis for Python, Go, C# - Webinar
Sep 5, 2023
Security
SCA
News
Blog
Introducing Reachability-Based SCA for Python, Go, and C#
Sep 5, 2023
Security
Open Source
Blog
The Open Source Security Index Top 5
Aug 29, 2023
Security
SCA
Blog
Faster SCA with Endor Labs and npm Workspaces
Aug 28, 2023
Security
Compliance & SBOM
Blog
Key Questions for Your SBOM Program
Aug 7, 2023
Security
SCA
Blog
Endor Labs & Github Advanced Security: AppSec Without The Productivity Tax
Aug 7, 2023
News
SCA
Blog
Endor Labs Raises $70M in Series A Funding to Reform Application Security
Aug 3, 2023
Security
SCA
Blog
How Should I Prioritize Software Vulnerabilities?
Jul 28, 2023
Security
Blog
Divide and Hide: How Malicious Code Lived on PyPI for 3 months
Jul 21, 2023
News
Blog
Endor Labs’ ‘State of Dependency Management 2023’ Report Offers Insight on Explosive Popularity of AI and LLMs—and How They Impact Application Security
Jul 20, 2023
SCA
AI/ML
Security
Open Source
Ebook/Report
State of Dependency Management 2023
Jul 20, 2023
News
Blog
Endor Labs Recognized as a Cool Vendor in the 2023 Gartner® Cool Vendors™ in Platform Engineering for Scaling Application Security Practices
Jul 12, 2023
Security
SCA
Open Source
Blog
Visualizing the Impact of Call Graphs on Open Source Security
Jun 30, 2023
Security
SCA
Blog
Why Different SCA Tools Produce Different Results
Jun 29, 2023
Security
SCA
Blog
Strengthening Security in .NET Development with packages.lock.json
Jun 28, 2023
SCA
Open Source
Video
Highlights from State of Dependency Management 2022 - Webinar
Jun 23, 2023
SCA
Open Source
Video
How Security and Engineering Can Scale Open Source Security - Webinar
Jun 23, 2023
Compliance & SBOM
News
Security
Blog
Endor Labs is SOC 2 Type II Certified!
Jun 15, 2023
Security
SCA
Open Source
Blog
Reviewing Malware with LLMs: OpenAI vs. Vertex AI
Jun 5, 2023
News
Blog
Endor Labs Wins Intellyx Digital Innovation Award
May 23, 2023
News
Blog
Endor Labs Recognized As a 2023 Bay Area Best Place to Work
May 5, 2023
Security
Developer Productivity
SCA
Blog
Make Developers' Lives Easier with Endor Labs & GitHub Advanced Security
May 3, 2023
Security
Blog
LLM-assisted Malware Review: AI and Humans Join Forces to Combat Malware
Apr 17, 2023
News
Blog
Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox
Mar 22, 2023
News
Blog
Announcing the Endor Labs Hyperdrive Program for Resellers and Solution Providers
Mar 16, 2023
News
Blog
Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software
Mar 6, 2023
SCA
Security
Open Source
Ebook/Report
OWASP Top 10 Risks for Open Source
Mar 1, 2023
Security
Compliance & SBOM
Blog
How to Quickly Measure SBOM Accuracy for Maven Projects (for Free)
Feb 28, 2023
Compliance & SBOM
News
Security
Blog
Endor Labs is SOC2 Certified!
Feb 9, 2023
SCA
Open Source
Video
Introduction to Open Source Security - Webinar
Feb 3, 2023
SCA
Open Source
Video
Comparing SBOMs Generated at Different Lifecycle Stages - Webinar
Feb 3, 2023
Security
Compliance & SBOM
Blog
SBOM vs. SBOM: Comparing SBOMs from Different Tools and Lifecycle Stages
Feb 2, 2023
Developer Productivity
Security
Blog
What Breaking Changes Teach Us about Security
Jan 31, 2023
Compliance & SBOM
Blog
Open Source Licensing Simplified: A Comparative Overview of Popular Licenses
Jan 24, 2023
Security
Compliance & SBOM
Blog
What is VEX and Why Should I Care?
Jan 18, 2023
Security
Open Source
Blog
Whatfuscator, Malicious Open Source Packages, and Other Beasts