Search Results

Learn about software supply chain security and Endor Labs

Search all our {count} unique resources
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Why Reachability Analysis for JavaScript Is Hard (and How We Fixed It)
chrome_reader_mode
Article

Why Reachability Analysis for JavaScript Is Hard (and How We Fixed It)

JavaScript reachability is tricky for SCA tools because of how JavaScript approaches dependency resolution, dependency imports, and functions.

Endor Patches Whitepaper
chrome_reader_mode
Article

Endor Patches Whitepaper

When upgrading is too risky, complex, or time consuming due to regressions, breaking changes, or new bugs, you can use Endor Patches to stay safe now while still meeting your SLA requirements.

Grip Security Builds Customer Trust with AppSec
chrome_reader_mode
Article

Grip Security Builds Customer Trust with AppSec

Grip Security values strong application security because it helps them build trust with their customers. Learn how a security company approaches AppSec.

Grip Security Reduces Noise by 99%
chrome_reader_mode
Article

Grip Security Reduces Noise by 99%

Grip Security replaced their traditional SCA tool with Endor Labs to improve their ability to build trust with customers without taxing developers.

The Uncomfortable Truth of Vulnerable and Outdated Software Components
chrome_reader_mode
Article

The Uncomfortable Truth of Vulnerable and Outdated Software Components

Learn where common industry sayings such as “stay up to date” come from and how you can help Endor Labs help you overcome those challenges.

Reduce FedRAMP Compliance Costs
chrome_reader_mode
Article

Reduce FedRAMP Compliance Costs

Endor Labs reduces false positives and prioritizes real vulnerabilities, helping your team meet FedRAMP requirements with less stress and lower costs.

Why OVAL Feeds Outperform NVD for Linux Vulnerability Management
chrome_reader_mode
Article

Why OVAL Feeds Outperform NVD for Linux Vulnerability Management

Learn why OVAL feeds, curated by Linux distributions, offer more precise vulnerability data than the NVD, reducing container scanning false positives and wasted efforts.

Achieving FedRAMP’s Container Scanning Requirements
chrome_reader_mode
Article

Achieving FedRAMP’s Container Scanning Requirements

Breaking Changes, Breaking Trust
chrome_reader_mode
Article

Breaking Changes, Breaking Trust

Breaking Changes, Breaking Trust

Reducing FedRAMP Compliance Costs with Endor Labs
chrome_reader_mode
Article

Reducing FedRAMP Compliance Costs with Endor Labs

Vulnerability Management for FedRAMP compliance is expensive; your SCA tool should help you make it cheaper and easier.

Microsoft Defender for Cloud Natively Integrates with Endor Labs
chrome_reader_mode
Article

Microsoft Defender for Cloud Natively Integrates with Endor Labs

Integrate Microsoft Defender for Cloud with Endor Labs for reachability analysis and attack path visibility — available natively within the Defender for Cloud console. Prioritize what to fix without switching tools.

Hugging Face Model Score Curation at Endor Labs
chrome_reader_mode
Article

Hugging Face Model Score Curation at Endor Labs

Understand how models are factored and scored at Endor Labs, new exploration tab for HuggingFace models

Endor Labs Announces Integrated SAST Offerings
chrome_reader_mode
Article

Endor Labs Announces Integrated SAST Offerings

Endor Labs now integrates Static Application Security Testing (SAST) into your application security testing stack.

Understanding the Cyber Resilience Act
chrome_reader_mode
Article

Understanding the Cyber Resilience Act

The Cyber Resilience Act (CRA) sets mandatory security requirements for hardware and software. This blog covers key compliance objectives, challenges with OSS vulnerabilities, and best practices for maintaining security throughout the product life cycle.

Start Clean With AI: Select Safer LLM Models with Endor Labs
chrome_reader_mode
Article

Start Clean With AI: Select Safer LLM Models with Endor Labs

You can now use Endor Labs to evaluate AI models on HuggingFace for security, popularity, quality, and activity.

The U.S. Government Prioritizes Open Source Governance and Security
chrome_reader_mode
Article

The U.S. Government Prioritizes Open Source Governance and Security

The U.S. Federal government's FY 2026 Cybersecurity Priorities focus on securing open source software, improving governance, and supporting OSS sustainability to strengthen the software supply chain.

Understanding the Basics of Large Language Models (LLMs)
chrome_reader_mode
Article

Understanding the Basics of Large Language Models (LLMs)

Understand what LLMs are, how foundational LLMs are built, the opportunities they offer and the risks they pose.

Container Layer Analysis: Clarity in Remediation
chrome_reader_mode
Article

Container Layer Analysis: Clarity in Remediation

Container layer analysis tells you which layer contains a vulnerability so you can prioritize remediation efforts more effectively and meet SLAs like FedRAMP.

Endor Labs Achieves 92% Reduction in SCA Alerts
chrome_reader_mode
Article

Endor Labs Achieves 92% Reduction in SCA Alerts

Endor Labs reduces open-source vulnerability noise by 92%, boosting productivity and improving collaboration between development and security teams.

Blocking with Confidence: Relativity's Dev Experience Journey
chrome_reader_mode
Article

Blocking with Confidence: Relativity's Dev Experience Journey

Relativity changed their security program from a blocker to an enabler by integrating security into developer workflows and empowering developers to prevent risks before they ship to production.

Relativity Blocks Risks with Endor Labs
chrome_reader_mode
Article

Relativity Blocks Risks with Endor Labs

Relativity changed their security program from a blocker to an enabler by integrating security into developer workflows and empowering developers to prevent risks before they ship to production.

Highlights from Our 2024 Dependency Management Webinar
chrome_reader_mode
Article

Highlights from Our 2024 Dependency Management Webinar

Get key insights from the 2024 Dependency Management webinar with Darren Meyer and Henrik Plate. We discuss how to prioritize vulnerabilities, navigate breaking changes, and leverage public vulnerability databases effectively.

Karl Mattson Joins Endor Labs as Chief Information Security Officer
chrome_reader_mode
Article

Karl Mattson Joins Endor Labs as Chief Information Security Officer

We're thrilled to have Karl Mattson as Endor Labs first Chief Information Security Officer (CISO)!

48 most popular open source tools for Python applications, scored
chrome_reader_mode
Article

48 most popular open source tools for Python applications, scored

Discover the top open-source tools for Python applications, ranked by Endor Scores based on security, activity, popularity, and code quality.

FedRAMP Requirements for Vulnerability Management and Dependency Upgrades
chrome_reader_mode
Article

FedRAMP Requirements for Vulnerability Management and Dependency Upgrades

This blog covers key steps to simplify FedRAMP vulnerability management, helping you reduce risks and meet compliance timelines. It also provides practical tips to empower developers and streamline fixes for a smoother FedRAMP process.

Fix Vulnerabilities Faster with Auto Patching and Endor Patches
chrome_reader_mode
Article

Fix Vulnerabilities Faster with Auto Patching and Endor Patches

Automatically patch open source libraries with Endor Patches during the build process, ensuring software is continuously protected against vulnerabilities without manual intervention.

Announcing the 2024 Dependency Management Report
chrome_reader_mode
Article

Announcing the 2024 Dependency Management Report

Our third-annual Dependency Management Report explores how emerging trends in open source security should guide SDLC security strategy.

2024 Dependency Management Report
chrome_reader_mode
Article

2024 Dependency Management Report

Building a DevSecOps Practice at Starburst
chrome_reader_mode
Article

Building a DevSecOps Practice at Starburst

Wondering how to build or revamp a DevSecOps program? Get some immediately useful tips that you can apply to your startup or mature enterprise…or anywhere in between.

Starburst Gets 98.3% Noise Reduction with Endor Labs
chrome_reader_mode
Article

Starburst Gets 98.3% Noise Reduction with Endor Labs

Starburst, an open data lakehouse, replaced Rezillion with Endor Labs for SCA. They improved their ability to identify and prioritize open source while complementing the developer experience.

What is CI/CD Security and What Tools Do You Need to Do it?
chrome_reader_mode
Article

What is CI/CD Security and What Tools Do You Need to Do it?

Learn what CI/CD security is, why it’s important, and discover the key tools Endor Labs offers to help you secure your CI/CD pipelines.

PWN Request Threat: A Hidden Danger in GitHub Actions
chrome_reader_mode
Article

PWN Request Threat: A Hidden Danger in GitHub Actions

Endor Labs provides comprehensive CI/CD security for GitHub action workflows that detect patterns that may indicate PWN request threats.

Address Open Source Risks with Endor Labs
chrome_reader_mode
Article

Address Open Source Risks with Endor Labs

Endor Labs Partners with Microsoft to Strengthen Software Supply Chains
chrome_reader_mode
Article

Endor Labs Partners with Microsoft to Strengthen Software Supply Chains

Endor Labs is now available on Azure Marketplace!

Give Devs the Confidence to Fix: Making Remediation Less Painful
chrome_reader_mode
Article

Give Devs the Confidence to Fix: Making Remediation Less Painful

Endor Labs’ newest capabilities help you reduce the research required to understand the impact of dependency upgrades and Endor Magic Patches help you stay safe without changing versions.

Prioritize Open Source Risks with Endor Labs
chrome_reader_mode
Article

Prioritize Open Source Risks with Endor Labs

Endor Labs provides several filters to help you prioritize which risks to address first, resulting in an average 92% noise reduction.

Discover Open Source Risks with Endor Labs
chrome_reader_mode
Article

Discover Open Source Risks with Endor Labs

Use Endor Labs to get accurate dependency inventories and complete vulnerability data sources.

48 most popular open source tools for npm applications, scored
chrome_reader_mode
Article

48 most popular open source tools for npm applications, scored

Discover the 48 most popular open-source npm tools, complete with Endor Scores, to help you choose the best dependencies for your projects based on security, activity, popularity, and code quality.

Using Artifact Signing to Establish Provenance for SLSA
chrome_reader_mode
Article

Using Artifact Signing to Establish Provenance for SLSA

Use artifact signing, a feature of Endor Labs, to support build provenance requirements for SLSA.

Benchmarking Endor Labs vs. Snyk’s GitHub Apps
chrome_reader_mode
Article

Benchmarking Endor Labs vs. Snyk’s GitHub Apps

Compare Endor Labs and Snyk GitHub Apps.

Introducing Upgrades & Remediation: Give Developers the Confidence to Fix
chrome_reader_mode
Article

Introducing Upgrades & Remediation: Give Developers the Confidence to Fix

Upgrade Impact Analysis shows you what breaking changes a fix could cause. Endor Patches are trusted patches you can use when upgrades are too painful.

How to Fix Vulnerabilities Without Breaking Changes
chrome_reader_mode
Article

How to Fix Vulnerabilities Without Breaking Changes

Fixed is Better than Found | Upgrades & Remediation with Endor Labs
chrome_reader_mode
Article

Fixed is Better than Found | Upgrades & Remediation with Endor Labs

At Endor Labs, we believe your application security tooling must go beyond alerting—it should also helpyou fast-track remediation.

Static SCA vs. Dynamic SCA: Which is Better (and Why It's Neither)
chrome_reader_mode
Article

Static SCA vs. Dynamic SCA: Which is Better (and Why It's Neither)

Software composition analysis (SCA) tools can take a static or dynamic approach. Learn the pros and cons of each option and see how the results differ.

33 Most Popular Open Source Tools for Maven Applications, Scored
chrome_reader_mode
Article

33 Most Popular Open Source Tools for Maven Applications, Scored

Explore the top 33 open source tools for Maven, scored by Endor Labs on security, activity, popularity, and code quality.

Jellyfish’s Data-Driven Security Program
chrome_reader_mode
Article

Jellyfish’s Data-Driven Security Program

Learn how Jellyfish’s security team uses a data-driven approach to risk management and the role SCA plays in their strategy.

Jellyfish Enables Data-Driven AppSec with Endor Labs
chrome_reader_mode
Article

Jellyfish Enables Data-Driven AppSec with Endor Labs

Jellyfish replaced Snyk with Endor Labs to improve their ability to identify, prioritize, address, and predict open source risk. Learn more!

What's a Security Pipeline? - On-Demand Webinar
chrome_reader_mode
Article

What's a Security Pipeline? - On-Demand Webinar

Learn about common patterns and tradeoffs for security pipelines in this introductory webinar.

Secure Everything Your Code Depends On With Endor Labs
chrome_reader_mode
Article

Secure Everything Your Code Depends On With Endor Labs

While conventional code security tools drown teams in false positives, Endor Labs zeroes in on real risks, empowering developers without without slowing them down.

Endor Labs Receives Strategic Investment from Citi Ventures
chrome_reader_mode
Article

Endor Labs Receives Strategic Investment from Citi Ventures

Endor Labs, a leader in software supply chain security, today announced a strategic investment from Citi Ventures.

We made the Inc. Best Workplaces List for 2024!
chrome_reader_mode
Article

We made the Inc. Best Workplaces List for 2024!

Endor Labs is named to Inc.’s annual Best Workplaces list for 2024.

New CocoaPods CVEs: Swift and Objective-C Supply Chains Are Fragile
chrome_reader_mode
Article

New CocoaPods CVEs: Swift and Objective-C Supply Chains Are Fragile

Three CocoaPods CVEs raise serious security concerns for consumers of Swift and Objective-C libraries used for macOS and iOS mobile development.

Questions to Ask Your Software Composition Analysis Vendor
chrome_reader_mode
Article

Questions to Ask Your Software Composition Analysis Vendor

When choosing an SCA tool, you’ll need to understand how the tool generates an inventory, correlates to risks, helps you prioritize results, and integrates into your toolchain.

Managing Open Source Vulnerabilities for PCI DSS Compliance - On-Demand Webinar
chrome_reader_mode
Article

Managing Open Source Vulnerabilities for PCI DSS Compliance - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn about changes to PCI DSS that impact OSS vulnerability management.

Backstage and Endor Labs: AppSec in a Dev’s Dream Workspace
chrome_reader_mode
Article

Backstage and Endor Labs: AppSec in a Dev’s Dream Workspace

The Endor Labs plugins for Backstage create an application security experience that doesn’t require developers to leave Backstage.

Container Scanning + SCA = Better Together
chrome_reader_mode
Article

Container Scanning + SCA = Better Together

We’re excited to announce that Endor Labs now extends our software supply chain platform to include container scanning.

Evaluating and Scoring OSS Packages
chrome_reader_mode
Article

Evaluating and Scoring OSS Packages

How can you tell if an OSS package is “good” or “bad”? A rigorous evaluation model, such as the Endor Score, can help developers make quick and informed decisions.

Endor Labs Named to Rising in Cyber by CISOs and Venture Capital Investors
chrome_reader_mode
Article

Endor Labs Named to Rising in Cyber by CISOs and Venture Capital Investors

Company Recognized for Creating Secure Supply Chains that Improve Application Development Productivity

Demystifying Transitive Dependency Vulnerabilities
chrome_reader_mode
Article

Demystifying Transitive Dependency Vulnerabilities

95% of vulnerabilities are found in transitive dependencies. Learn how they’re unique from direct dependencies and how to incorporate them into your risk management program.

Surprise! Your GitHub Actions Are Dependencies, Too
chrome_reader_mode
Article

Surprise! Your GitHub Actions Are Dependencies, Too

GitHub Actions are open source dependencies - secure them accordingly! Learn how to effectively manage the security risks associated with GitHub Actions with a proactive approach focusing on three key areas: visibility, hardening, and dependency management.

Endor Labs Partners with GuidePoint Security to Secure The Software Supply Chain
chrome_reader_mode
Article

Endor Labs Partners with GuidePoint Security to Secure The Software Supply Chain

Protect Mobile Apps with Kotlin and Swift SCA
chrome_reader_mode
Article

Protect Mobile Apps with Kotlin and Swift SCA

Learn about the mobile application threat landscape and how you can protect mobile apps from security and legal risk associated with open source software with Endor Labs Open Source.

OSS Vulnerabilities and the Digital Operational Resilience Act (DORA)
chrome_reader_mode
Article

OSS Vulnerabilities and the Digital Operational Resilience Act (DORA)

Learn how your organization can achieve DORA compliance for managing open source software vulnerabilities with reachability-based SCA, SBOMs, and more.

Intro to Endor Labs - On-Demand Webinar
chrome_reader_mode
Article

Intro to Endor Labs - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn how to Endor Labs supports a Software Supply Chain Security program.

 OWASP OSS Risk 1: Known Vulnerabilities
chrome_reader_mode
Article

OWASP OSS Risk 1: Known Vulnerabilities

Known vulnerabilities are a well-understood software risk…but managing and prioritizing them is anything but simple. Learn about key considerations when building a program to detect and remediate CVEs.

Low-Code/No Code Artifact Signing
chrome_reader_mode
Article

Low-Code/No Code Artifact Signing

A low-code/no code artifact signing solution makes it easy to implement an enterprise solution for verifying authenticity of software artifacts and tracing their origins.

An Auditor’s Perspective on Addressing OSS Vulnerabilities for PCI DSS v4
chrome_reader_mode
Article

An Auditor’s Perspective on Addressing OSS Vulnerabilities for PCI DSS v4

Learn how your organization can achieve PCI DSS v4 compliance for managing open source software vulnerabilities with reachability-based SCA and more.

Guide to Implementing Software Supply Chain Security
chrome_reader_mode
Article

Guide to Implementing Software Supply Chain Security

In this free guide, experts answer key questions like "what is it?", "why is it important?", "and how do I secure it?" so you can make informed decisions and thoughtfully design your organization's SSCS program.

Your Git Repo is a Supply Chain Risk
chrome_reader_mode
Article

Your Git Repo is a Supply Chain Risk

Source code repository misconfigurations can expose your organization to supply chain attacks. Repository Security Posture Management (RSPM) can offer a reliable system to enforce best practices.

Improve Kubernetes Security with Signed Artifacts and Admission Controllers
chrome_reader_mode
Article

Improve Kubernetes Security with Signed Artifacts and Admission Controllers

Control which images get deployed in Kubernetes by configuring an admission controller to admit only those which have been signed by Endor Labs.

AppSec Goes to Devnexus: Lessons from a Thriving, Modern Java Community
chrome_reader_mode
Article

AppSec Goes to Devnexus: Lessons from a Thriving, Modern Java Community

What happens when an AppSec professional attends a Java conference? Great conversations on productivity, tool pain, AI/ML, and vulnerability management.

Artifact Signing 101 - On-Demand Webinar
chrome_reader_mode
Article

Artifact Signing 101 - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn using strong cryptographic artifact signatures to enable strong admission control, provenance, and traceability that support effective security, quality, and compliance programs.

XZ Backdoor: How to Prepare for the Next One
chrome_reader_mode
Article

XZ Backdoor: How to Prepare for the Next One

While it’s improbable to prevent all exposure to supply chain risks, organizations can absolutely focus on a strategy to reduce the probability of successful attacks and reduce the time it takes them to respond to such threats.

XZ is A Wake Up Call For Software Security: Here's Why
chrome_reader_mode
Article

XZ is A Wake Up Call For Software Security: Here's Why

The xz backdoor shines a light on everything we're doing wrong in software supply chain security. Get an overview of the incident, what we can learn from it, and what we can do about it.

SSDF Compliance and Attestation
chrome_reader_mode
Article

SSDF Compliance and Attestation

Learn ways to comply with SSDF requirements for secure environments, trusted source code supply chains, code and artifact provenance, and vulnerabilities.

You Have a Shadow Pipeline Problem
chrome_reader_mode
Article

You Have a Shadow Pipeline Problem

Learn how to establish automated CI/CD controls to reveal what’s running in your pipelines and which configs don’t align with risk and compliance requirements.

Remediating Vulnerabilities vs. Maintaining Current Dependencies
chrome_reader_mode
Article

Remediating Vulnerabilities vs. Maintaining Current Dependencies

Learn about the pros and cons of maintaining current dependencies, backed by a TU Delft study on 262 Java projects on Github

Prioritizing SCA Findings with Reachability Analysis - On-Demand Webinar
chrome_reader_mode
Article

Prioritizing SCA Findings with Reachability Analysis - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn how reachability analysis works.

Signing Your Artifacts For Security, Quality, and Compliance
chrome_reader_mode
Article

Signing Your Artifacts For Security, Quality, and Compliance

Code Signing and other Artifact Signing enable application provenance to enhance admission control, incident response, and other essential capabilities.

Detect Malicious Packages Among Your Open Source Dependencies
chrome_reader_mode
Article

Detect Malicious Packages Among Your Open Source Dependencies

Learn about emerging malicious code trends, including typosquatting and dependency confusion attacks, and two techniques for detecting malware in your applications.

Tom Gleason Joins Endor Labs as VP of Customer Solutions
chrome_reader_mode
Article

Tom Gleason Joins Endor Labs as VP of Customer Solutions

Tom Gleason is a security enthusiast with a knack for building and leading technically-focused customer teams. Formerly at Snyk, Akamai, and Palo Alto Networks, Tom joins Endor Labs to lead Customer Solutions.

Introducing CI/CD Security with Endor Labs
chrome_reader_mode
Article

Introducing CI/CD Security with Endor Labs

Endor Labs CI/CD helps organizations secure their pipelines through pipeline discovery, repository security posture management, and build integrity verification (artifact signing).

How to Improve SCA in GitHub Advanced Security - Tutorial
chrome_reader_mode
Article

How to Improve SCA in GitHub Advanced Security - Tutorial

In this short video we demonstrate how to use Endor Labs and GitHub Advanced Security to manage and prioritize open source risk.

How to Ingest and Manage SBOMs - Tutorial
chrome_reader_mode
Article

How to Ingest and Manage SBOMs - Tutorial

In this short video we demonstrate how to ingest 1st and 3rd party software bills of material, manage them centrally, and detect new vulnerabilities in a timely manner.

VMware Achieves SBOM Compliance for Over 100 Services with Endor Labs
chrome_reader_mode
Article

VMware Achieves SBOM Compliance for Over 100 Services with Endor Labs

Learn how the VMWare compliance team built a a scalable process to collect and attest to SBOMs using Endor Labs.

AI-Supported Environment Debugging for Endor Labs
chrome_reader_mode
Article

AI-Supported Environment Debugging for Endor Labs

Testing and installing new security tools is painful. Using generative AI, DroidGPT by Endor Labs makes it easy to troubleshoot and even prevent compatibility errors when installing the platform.

How to Generate SBOM and VEX - Tutorial
chrome_reader_mode
Article

How to Generate SBOM and VEX - Tutorial

In this short video we demonstrate how to use Endor Labs to produce SBOM and VEX documents.

How to Use AI for Open Source Selection - Tutorial
chrome_reader_mode
Article

How to Use AI for Open Source Selection - Tutorial

In this short video we demonstrate how to use DroidGPT to research open source packages in a conversational manner.

Introducing a Better Way to SCA for Monorepos and Bazel
chrome_reader_mode
Article

Introducing a Better Way to SCA for Monorepos and Bazel

Endor Labs’ reachability-based SCA now supports Bazel so you can get fully accurate results without any of the messy workarounds usually required for monorepos.

5 Types of Reachability Analysis (and Which is Right for You)
chrome_reader_mode
Article

5 Types of Reachability Analysis (and Which is Right for You)

Explore the five key categories of reachability and their practical applications in AppSec and development. Learn the differences between SCA and container scanning, and understand how various tools like Function-Level Reachability, Package Baselining, and Internet Reachability play crucial roles in identifying and prioritizing security risks.

What’s in a Name? A Look at the Software Identification Ecosystem
chrome_reader_mode
Article

What’s in a Name? A Look at the Software Identification Ecosystem

Learn best practices for a proper software identification ecosystem that supports asset inventory, version control, vulnerability management, incident response, and more.

What You Need to Know About Apache Struts and CVE-2023-50164
chrome_reader_mode
Article

What You Need to Know About Apache Struts and CVE-2023-50164

Discover the critical details of CVE-2023-50164, a severe vulnerability in Apache Struts.

Introducing JavaScript Reachability and Phantom Dependency Detection
chrome_reader_mode
Article

Introducing JavaScript Reachability and Phantom Dependency Detection

Endor Labs’ JavaScript SCA capabilities cut down noise with a program analysis approach that outperforms manifest scanning SCA tools like Snyk, Veracode, and BlackDuck.

MileIQ Securely Reimagines a Decade Old Product with Endor Labs
chrome_reader_mode
Article

MileIQ Securely Reimagines a Decade Old Product with Endor Labs

Lean MileIQ, the #1 mileage tracking app, selected Endor Labs to help their security and engineering teams focus on the software supply chain risks that actually matter.

How CycloneDX VEX Makes Your SBOM Useful
chrome_reader_mode
Article

How CycloneDX VEX Makes Your SBOM Useful

Explore the challenges of modern vulnerability management and the efficiency of the Vulnerability Exploitability eXchange (VEX) in our latest blog post. Learn how VEX helps identify and communicate the true exploitability of vulnerabilities, streamlining cybersecurity efforts in the face of overwhelming scanner findings.

How to Scan and Prioritize Valid Secrets - Tutorial
chrome_reader_mode
Article

How to Scan and Prioritize Valid Secrets - Tutorial

In this short video we demonstrate how to use Endor Labs to discover if your organization has leaked valid secrets and provide developers with instructions for resolving the leak.

SBOM Requirements for Medical Devices
chrome_reader_mode
Article

SBOM Requirements for Medical Devices

Learn about the 2023 FDA rule for medical devices, including requirements for SBOMs, a mitigation plan, and secure software development practices.

CISA and NCSC's Take on Secure AI Development
chrome_reader_mode
Article

CISA and NCSC's Take on Secure AI Development

A breakdown of the "Guidelines for Secure AI System Development document from CISA and NCSC.

Open Source Security 101: How to Evaluate Your Open Source Security Posture
chrome_reader_mode
Article

Open Source Security 101: How to Evaluate Your Open Source Security Posture

Organizations need to evolve their approach to using open source securely. Find four fundamental considerations to consider when it comes to securely using OSS.

Endor Labs is a CRN 2023 Stellar Startup!
chrome_reader_mode
Article

Endor Labs is a CRN 2023 Stellar Startup!

CRN®, a brand of The Channel Company, has named Endor Labs to its 2023 Stellar Startups list in the Security category. Learn more about the list and us here.

no-results
Sorry, no results matching your search.

Get a Free Trial

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.
Try the Endor Labs Software Supply Chain Security platform for 30 days.