Search Results
Learn about software supply chain security and Endor Labs
FedRAMP Requirements for Vulnerability Management and Dependency Upgrades
This blog covers key steps to simplify FedRAMP vulnerability management, helping you reduce risks and meet compliance timelines. It also provides practical tips to empower developers and streamline fixes for a smoother FedRAMP process.
Surprise! Your GitHub Actions Are Dependencies, Too
GitHub Actions are open source dependencies - secure them accordingly! Learn how to effectively manage the security risks associated with GitHub Actions with a proactive approach focusing on three key areas: visibility, hardening, and dependency management.
5 Types of Reachability Analysis (and Which is Right for You)
Explore the five key categories of reachability and their practical applications in AppSec and development. Learn the differences between SCA and container scanning, and understand how various tools like Function-Level Reachability, Package Baselining, and Internet Reachability play crucial roles in identifying and prioritizing security risks.
How CycloneDX VEX Makes Your SBOM Useful
Explore the challenges of modern vulnerability management and the efficiency of the Vulnerability Exploitability eXchange (VEX) in our latest blog post. Learn how VEX helps identify and communicate the true exploitability of vulnerabilities, streamlining cybersecurity efforts in the face of overwhelming scanner findings.
Get a Free Trial
Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.
Try the Endor Labs Software Supply Chain Security platform for 30 days.