Search Results

Learn about software supply chain security and Endor Labs

Search all our {count} unique resources
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Microsoft Defender for Cloud Natively Integrates with Endor Labs
chrome_reader_mode
Article

Microsoft Defender for Cloud Natively Integrates with Endor Labs

Integrate Microsoft Defender for Cloud with Endor Labs for reachability analysis and attack path visibility — available natively within the Defender for Cloud console. Prioritize what to fix without switching tools.

Hugging Face Model Score Curation at Endor Labs
chrome_reader_mode
Article

Hugging Face Model Score Curation at Endor Labs

Understand how models are factored and scored at Endor Labs, new exploration tab for HuggingFace models

Endor Labs Announces Integrated SAST Offerings
chrome_reader_mode
Article

Endor Labs Announces Integrated SAST Offerings

Endor Labs now integrates Static Application Security Testing (SAST) into your application security testing stack.

Understanding the Cyber Resilience Act
chrome_reader_mode
Article

Understanding the Cyber Resilience Act

The Cyber Resilience Act (CRA) sets mandatory security requirements for hardware and software. This blog covers key compliance objectives, challenges with OSS vulnerabilities, and best practices for maintaining security throughout the product life cycle.

Start Clean With AI: Select Safer LLM Models with Endor Labs
chrome_reader_mode
Article

Start Clean With AI: Select Safer LLM Models with Endor Labs

You can now use Endor Labs to evaluate AI models on HuggingFace for security, popularity, quality, and activity.

The U.S. Government Prioritizes Open Source Governance and Security
chrome_reader_mode
Article

The U.S. Government Prioritizes Open Source Governance and Security

The U.S. Federal government's FY 2026 Cybersecurity Priorities focus on securing open source software, improving governance, and supporting OSS sustainability to strengthen the software supply chain.

Understanding the Basics of Large Language Models (LLMs)
chrome_reader_mode
Article

Understanding the Basics of Large Language Models (LLMs)

Understand what LLMs are, how foundational LLMs are built, the opportunities they offer and the risks they pose.

Container Layer Analysis: Clarity in Remediation
chrome_reader_mode
Article

Container Layer Analysis: Clarity in Remediation

Container layer analysis tells you which layer contains a vulnerability so you can prioritize remediation efforts more effectively and meet SLAs like FedRAMP.

Endor Labs Achieves 92% Reduction in SCA Alerts
chrome_reader_mode
Article

Endor Labs Achieves 92% Reduction in SCA Alerts

Endor Labs reduces open-source vulnerability noise by 92%, boosting productivity and improving collaboration between development and security teams.

Blocking with Confidence: Relativity's Dev Experience Journey
chrome_reader_mode
Article

Blocking with Confidence: Relativity's Dev Experience Journey

Relativity changed their security program from a blocker to an enabler by integrating security into developer workflows and empowering developers to prevent risks before they ship to production.

Relativity Blocks Risks with Endor Labs
chrome_reader_mode
Article

Relativity Blocks Risks with Endor Labs

Relativity changed their security program from a blocker to an enabler by integrating security into developer workflows and empowering developers to prevent risks before they ship to production.

Highlights from Our 2024 Dependency Management Webinar
chrome_reader_mode
Article

Highlights from Our 2024 Dependency Management Webinar

Get key insights from the 2024 Dependency Management webinar with Darren Meyer and Henrik Plate. We discuss how to prioritize vulnerabilities, navigate breaking changes, and leverage public vulnerability databases effectively.

Karl Mattson Joins Endor Labs as Chief Information Security Officer
chrome_reader_mode
Article

Karl Mattson Joins Endor Labs as Chief Information Security Officer

We're thrilled to have Karl Mattson as Endor Labs first Chief Information Security Officer (CISO)!

48 most popular open source tools for Python applications, scored
chrome_reader_mode
Article

48 most popular open source tools for Python applications, scored

Discover the top open-source tools for Python applications, ranked by Endor Scores based on security, activity, popularity, and code quality.

FedRAMP Requirements for Vulnerability Management and Dependency Upgrades
chrome_reader_mode
Article

FedRAMP Requirements for Vulnerability Management and Dependency Upgrades

This blog covers key steps to simplify FedRAMP vulnerability management, helping you reduce risks and meet compliance timelines. It also provides practical tips to empower developers and streamline fixes for a smoother FedRAMP process.

Fix Vulnerabilities Faster with Auto Patching and Endor Patches
chrome_reader_mode
Article

Fix Vulnerabilities Faster with Auto Patching and Endor Patches

Automatically patch open source libraries with Endor Patches during the build process, ensuring software is continuously protected against vulnerabilities without manual intervention.

Announcing the 2024 Dependency Management Report
chrome_reader_mode
Article

Announcing the 2024 Dependency Management Report

Our third-annual Dependency Management Report explores how emerging trends in open source security should guide SDLC security strategy.

2024 Dependency Management Report
chrome_reader_mode
Article

2024 Dependency Management Report

Building a DevSecOps Practice at Starburst
chrome_reader_mode
Article

Building a DevSecOps Practice at Starburst

Wondering how to build or revamp a DevSecOps program? Get some immediately useful tips that you can apply to your startup or mature enterprise…or anywhere in between.

Starburst Gets 98.3% Noise Reduction with Endor Labs
chrome_reader_mode
Article

Starburst Gets 98.3% Noise Reduction with Endor Labs

Starburst, an open data lakehouse, replaced Rezillion with Endor Labs for SCA. They improved their ability to identify and prioritize open source while complementing the developer experience.

What is CI/CD Security and What Tools Do You Need to Do it?
chrome_reader_mode
Article

What is CI/CD Security and What Tools Do You Need to Do it?

Learn what CI/CD security is, why it’s important, and discover the key tools Endor Labs offers to help you secure your CI/CD pipelines.

PWN Request Threat: A Hidden Danger in GitHub Actions
chrome_reader_mode
Article

PWN Request Threat: A Hidden Danger in GitHub Actions

Endor Labs provides comprehensive CI/CD security for GitHub action workflows that detect patterns that may indicate PWN request threats.

Address Open Source Risks with Endor Labs
chrome_reader_mode
Article

Address Open Source Risks with Endor Labs

Endor Labs Partners with Microsoft to Strengthen Software Supply Chains
chrome_reader_mode
Article

Endor Labs Partners with Microsoft to Strengthen Software Supply Chains

Endor Labs is now available on Azure Marketplace!

Give Devs the Confidence to Fix: Making Remediation Less Painful
chrome_reader_mode
Article

Give Devs the Confidence to Fix: Making Remediation Less Painful

Endor Labs’ newest capabilities help you reduce the research required to understand the impact of dependency upgrades and Endor Magic Patches help you stay safe without changing versions.

Prioritize Open Source Risks with Endor Labs
chrome_reader_mode
Article

Prioritize Open Source Risks with Endor Labs

Endor Labs provides several filters to help you prioritize which risks to address first, resulting in an average 92% noise reduction.

Discover Open Source Risks with Endor Labs
chrome_reader_mode
Article

Discover Open Source Risks with Endor Labs

Use Endor Labs to get accurate dependency inventories and complete vulnerability data sources.

48 most popular open source tools for npm applications, scored
chrome_reader_mode
Article

48 most popular open source tools for npm applications, scored

Discover the 48 most popular open-source npm tools, complete with Endor Scores, to help you choose the best dependencies for your projects based on security, activity, popularity, and code quality.

Using Artifact Signing to Establish Provenance for SLSA
chrome_reader_mode
Article

Using Artifact Signing to Establish Provenance for SLSA

Use artifact signing, a feature of Endor Labs, to support build provenance requirements for SLSA.

Benchmarking Endor Labs vs. Snyk’s GitHub Apps
chrome_reader_mode
Article

Benchmarking Endor Labs vs. Snyk’s GitHub Apps

Compare Endor Labs and Snyk GitHub Apps.

Introducing Upgrades & Remediation: Give Developers the Confidence to Fix
chrome_reader_mode
Article

Introducing Upgrades & Remediation: Give Developers the Confidence to Fix

Upgrade Impact Analysis shows you what breaking changes a fix could cause. Endor Patches are trusted patches you can use when upgrades are too painful.

How to Fix Vulnerabilities Without Breaking Changes
chrome_reader_mode
Article

How to Fix Vulnerabilities Without Breaking Changes

Static SCA vs. Dynamic SCA: Which is Better (and Why It's Neither)
chrome_reader_mode
Article

Static SCA vs. Dynamic SCA: Which is Better (and Why It's Neither)

Software composition analysis (SCA) tools can take a static or dynamic approach. Learn the pros and cons of each option and see how the results differ.

33 Most Popular Open Source Tools for Maven Applications, Scored
chrome_reader_mode
Article

33 Most Popular Open Source Tools for Maven Applications, Scored

Explore the top 33 open source tools for Maven, scored by Endor Labs on security, activity, popularity, and code quality.

Jellyfish’s Data-Driven Security Program
chrome_reader_mode
Article

Jellyfish’s Data-Driven Security Program

Learn how Jellyfish’s security team uses a data-driven approach to risk management and the role SCA plays in their strategy.

Jellyfish Enables Data-Driven AppSec with Endor Labs
chrome_reader_mode
Article

Jellyfish Enables Data-Driven AppSec with Endor Labs

Jellyfish replaced Snyk with Endor Labs to improve their ability to identify, prioritize, address, and predict open source risk. Learn more!

What's a Security Pipeline? - On-Demand Webinar
chrome_reader_mode
Article

What's a Security Pipeline? - On-Demand Webinar

Learn about common patterns and tradeoffs for security pipelines in this introductory webinar.

Endor Labs Receives Strategic Investment from Citi Ventures
chrome_reader_mode
Article

Endor Labs Receives Strategic Investment from Citi Ventures

Endor Labs, a leader in software supply chain security, today announced a strategic investment from Citi Ventures.

We made the Inc. Best Workplaces List for 2024!
chrome_reader_mode
Article

We made the Inc. Best Workplaces List for 2024!

Endor Labs is named to Inc.’s annual Best Workplaces list for 2024.

New CocoaPods CVEs: Swift and Objective-C Supply Chains Are Fragile
chrome_reader_mode
Article

New CocoaPods CVEs: Swift and Objective-C Supply Chains Are Fragile

Three CocoaPods CVEs raise serious security concerns for consumers of Swift and Objective-C libraries used for macOS and iOS mobile development.

Questions to Ask Your Software Composition Analysis Vendor
chrome_reader_mode
Article

Questions to Ask Your Software Composition Analysis Vendor

When choosing an SCA tool, you’ll need to understand how the tool generates an inventory, correlates to risks, helps you prioritize results, and integrates into your toolchain.

Managing Open Source Vulnerabilities for PCI DSS Compliance - On-Demand Webinar
chrome_reader_mode
Article

Managing Open Source Vulnerabilities for PCI DSS Compliance - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn about changes to PCI DSS that impact OSS vulnerability management.

Backstage and Endor Labs: AppSec in a Dev’s Dream Workspace
chrome_reader_mode
Article

Backstage and Endor Labs: AppSec in a Dev’s Dream Workspace

The Endor Labs plugins for Backstage create an application security experience that doesn’t require developers to leave Backstage.

Container Scanning + SCA = Better Together
chrome_reader_mode
Article

Container Scanning + SCA = Better Together

We’re excited to announce that Endor Labs now extends our software supply chain platform to include container scanning.

Evaluating and Scoring OSS Packages
chrome_reader_mode
Article

Evaluating and Scoring OSS Packages

How can you tell if an OSS package is “good” or “bad”? A rigorous evaluation model, such as the Endor Score, can help developers make quick and informed decisions.

Endor Labs Named to Rising in Cyber by CISOs and Venture Capital Investors
chrome_reader_mode
Article

Endor Labs Named to Rising in Cyber by CISOs and Venture Capital Investors

Company Recognized for Creating Secure Supply Chains that Improve Application Development Productivity

Demystifying Transitive Dependency Vulnerabilities
chrome_reader_mode
Article

Demystifying Transitive Dependency Vulnerabilities

95% of vulnerabilities are found in transitive dependencies. Learn how they’re unique from direct dependencies and how to incorporate them into your risk management program.

Surprise! Your GitHub Actions Are Dependencies, Too
chrome_reader_mode
Article

Surprise! Your GitHub Actions Are Dependencies, Too

GitHub Actions are open source dependencies - secure them accordingly! Learn how to effectively manage the security risks associated with GitHub Actions with a proactive approach focusing on three key areas: visibility, hardening, and dependency management.

Endor Labs Partners with GuidePoint Security to Secure The Software Supply Chain
chrome_reader_mode
Article

Endor Labs Partners with GuidePoint Security to Secure The Software Supply Chain

Protect Mobile Apps with Kotlin and Swift SCA
chrome_reader_mode
Article

Protect Mobile Apps with Kotlin and Swift SCA

Learn about the mobile application threat landscape and how you can protect mobile apps from security and legal risk associated with open source software with Endor Labs Open Source.

OSS Vulnerabilities and the Digital Operational Resilience Act (DORA)
chrome_reader_mode
Article

OSS Vulnerabilities and the Digital Operational Resilience Act (DORA)

Learn how your organization can achieve DORA compliance for managing open source software vulnerabilities with reachability-based SCA, SBOMs, and more.

Intro to Endor Labs - On-Demand Webinar
chrome_reader_mode
Article

Intro to Endor Labs - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn how to Endor Labs supports a Software Supply Chain Security program.

 OWASP OSS Risk 1: Known Vulnerabilities
chrome_reader_mode
Article

OWASP OSS Risk 1: Known Vulnerabilities

Known vulnerabilities are a well-understood software risk…but managing and prioritizing them is anything but simple. Learn about key considerations when building a program to detect and remediate CVEs.

Low-Code/No Code Artifact Signing
chrome_reader_mode
Article

Low-Code/No Code Artifact Signing

A low-code/no code artifact signing solution makes it easy to implement an enterprise solution for verifying authenticity of software artifacts and tracing their origins.

An Auditor’s Perspective on Addressing OSS Vulnerabilities for PCI DSS v4
chrome_reader_mode
Article

An Auditor’s Perspective on Addressing OSS Vulnerabilities for PCI DSS v4

Learn how your organization can achieve PCI DSS v4 compliance for managing open source software vulnerabilities with reachability-based SCA and more.

Guide to Implementing Software Supply Chain Security
chrome_reader_mode
Article

Guide to Implementing Software Supply Chain Security

In this free guide, experts answer key questions like "what is it?", "why is it important?", "and how do I secure it?" so you can make informed decisions and thoughtfully design your organization's SSCS program.

Your Git Repo is a Supply Chain Risk
chrome_reader_mode
Article

Your Git Repo is a Supply Chain Risk

Source code repository misconfigurations can expose your organization to supply chain attacks. Repository Security Posture Management (RSPM) can offer a reliable system to enforce best practices.

Improve Kubernetes Security with Signed Artifacts and Admission Controllers
chrome_reader_mode
Article

Improve Kubernetes Security with Signed Artifacts and Admission Controllers

Control which images get deployed in Kubernetes by configuring an admission controller to admit only those which have been signed by Endor Labs.

AppSec Goes to Devnexus: Lessons from a Thriving, Modern Java Community
chrome_reader_mode
Article

AppSec Goes to Devnexus: Lessons from a Thriving, Modern Java Community

What happens when an AppSec professional attends a Java conference? Great conversations on productivity, tool pain, AI/ML, and vulnerability management.

Artifact Signing 101 - On-Demand Webinar
chrome_reader_mode
Article

Artifact Signing 101 - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn using strong cryptographic artifact signatures to enable strong admission control, provenance, and traceability that support effective security, quality, and compliance programs.

XZ Backdoor: How to Prepare for the Next One
chrome_reader_mode
Article

XZ Backdoor: How to Prepare for the Next One

While it’s improbable to prevent all exposure to supply chain risks, organizations can absolutely focus on a strategy to reduce the probability of successful attacks and reduce the time it takes them to respond to such threats.

XZ is A Wake Up Call For Software Security: Here's Why
chrome_reader_mode
Article

XZ is A Wake Up Call For Software Security: Here's Why

The xz backdoor shines a light on everything we're doing wrong in software supply chain security. Get an overview of the incident, what we can learn from it, and what we can do about it.

SSDF Compliance and Attestation
chrome_reader_mode
Article

SSDF Compliance and Attestation

Learn ways to comply with SSDF requirements for secure environments, trusted source code supply chains, code and artifact provenance, and vulnerabilities.

You Have a Shadow Pipeline Problem
chrome_reader_mode
Article

You Have a Shadow Pipeline Problem

Learn how to establish automated CI/CD controls to reveal what’s running in your pipelines and which configs don’t align with risk and compliance requirements.

Remediating Vulnerabilities vs. Maintaining Current Dependencies
chrome_reader_mode
Article

Remediating Vulnerabilities vs. Maintaining Current Dependencies

Learn about the pros and cons of maintaining current dependencies, backed by a TU Delft study on 262 Java projects on Github

Prioritizing SCA Findings with Reachability Analysis - On-Demand Webinar
chrome_reader_mode
Article

Prioritizing SCA Findings with Reachability Analysis - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn how reachability analysis works.

Signing Your Artifacts For Security, Quality, and Compliance
chrome_reader_mode
Article

Signing Your Artifacts For Security, Quality, and Compliance

Code Signing and other Artifact Signing enable application provenance to enhance admission control, incident response, and other essential capabilities.

Detect Malicious Packages Among Your Open Source Dependencies
chrome_reader_mode
Article

Detect Malicious Packages Among Your Open Source Dependencies

Learn about emerging malicious code trends, including typosquatting and dependency confusion attacks, and two techniques for detecting malware in your applications.

Tom Gleason Joins Endor Labs as VP of Customer Solutions
chrome_reader_mode
Article

Tom Gleason Joins Endor Labs as VP of Customer Solutions

Tom Gleason is a security enthusiast with a knack for building and leading technically-focused customer teams. Formerly at Snyk, Akamai, and Palo Alto Networks, Tom joins Endor Labs to lead Customer Solutions.

Introducing CI/CD Security with Endor Labs
chrome_reader_mode
Article

Introducing CI/CD Security with Endor Labs

Endor Labs CI/CD helps organizations secure their pipelines through pipeline discovery, repository security posture management, and build integrity verification (artifact signing).

How to Improve SCA in GitHub Advanced Security - Tutorial
chrome_reader_mode
Article

How to Improve SCA in GitHub Advanced Security - Tutorial

In this short video we demonstrate how to use Endor Labs and GitHub Advanced Security to manage and prioritize open source risk.

How to Ingest and Manage SBOMs - Tutorial
chrome_reader_mode
Article

How to Ingest and Manage SBOMs - Tutorial

In this short video we demonstrate how to ingest 1st and 3rd party software bills of material, manage them centrally, and detect new vulnerabilities in a timely manner.

VMware Achieves SBOM Compliance for Over 100 Services with Endor Labs
chrome_reader_mode
Article

VMware Achieves SBOM Compliance for Over 100 Services with Endor Labs

Learn how the VMWare compliance team built a a scalable process to collect and attest to SBOMs using Endor Labs.

AI-Supported Environment Debugging for Endor Labs
chrome_reader_mode
Article

AI-Supported Environment Debugging for Endor Labs

Testing and installing new security tools is painful. Using generative AI, DroidGPT by Endor Labs makes it easy to troubleshoot and even prevent compatibility errors when installing the platform.

How to Generate SBOM and VEX - Tutorial
chrome_reader_mode
Article

How to Generate SBOM and VEX - Tutorial

In this short video we demonstrate how to use Endor Labs to produce SBOM and VEX documents.

How to Use AI for Open Source Selection - Tutorial
chrome_reader_mode
Article

How to Use AI for Open Source Selection - Tutorial

In this short video we demonstrate how to use DroidGPT to research open source packages in a conversational manner.

Introducing a Better Way to SCA for Monorepos and Bazel
chrome_reader_mode
Article

Introducing a Better Way to SCA for Monorepos and Bazel

Endor Labs’ reachability-based SCA now supports Bazel so you can get fully accurate results without any of the messy workarounds usually required for monorepos.

5 Types of Reachability Analysis (and Which is Right for You)
chrome_reader_mode
Article

5 Types of Reachability Analysis (and Which is Right for You)

Explore the five key categories of reachability and their practical applications in AppSec and development. Learn the differences between SCA and container scanning, and understand how various tools like Function-Level Reachability, Package Baselining, and Internet Reachability play crucial roles in identifying and prioritizing security risks.

What’s in a Name? A Look at the Software Identification Ecosystem
chrome_reader_mode
Article

What’s in a Name? A Look at the Software Identification Ecosystem

Learn best practices for a proper software identification ecosystem that supports asset inventory, version control, vulnerability management, incident response, and more.

What You Need to Know About Apache Struts and CVE-2023-50164
chrome_reader_mode
Article

What You Need to Know About Apache Struts and CVE-2023-50164

Discover the critical details of CVE-2023-50164, a severe vulnerability in Apache Struts.

Introducing JavaScript Reachability and Phantom Dependency Detection
chrome_reader_mode
Article

Introducing JavaScript Reachability and Phantom Dependency Detection

Endor Labs’ JavaScript SCA capabilities cut down noise with a program analysis approach that outperforms manifest scanning SCA tools like Snyk, Veracode, and BlackDuck.

MileIQ Securely Reimagines a Decade Old Product with Endor Labs
chrome_reader_mode
Article

MileIQ Securely Reimagines a Decade Old Product with Endor Labs

Lean MileIQ, the #1 mileage tracking app, selected Endor Labs to help their security and engineering teams focus on the software supply chain risks that actually matter.

How CycloneDX VEX Makes Your SBOM Useful
chrome_reader_mode
Article

How CycloneDX VEX Makes Your SBOM Useful

Explore the challenges of modern vulnerability management and the efficiency of the Vulnerability Exploitability eXchange (VEX) in our latest blog post. Learn how VEX helps identify and communicate the true exploitability of vulnerabilities, streamlining cybersecurity efforts in the face of overwhelming scanner findings.

How to Scan and Prioritize Valid Secrets - Tutorial
chrome_reader_mode
Article

How to Scan and Prioritize Valid Secrets - Tutorial

In this short video we demonstrate how to use Endor Labs to discover if your organization has leaked valid secrets and provide developers with instructions for resolving the leak.

SBOM Requirements for Medical Devices
chrome_reader_mode
Article

SBOM Requirements for Medical Devices

Learn about the 2023 FDA rule for medical devices, including requirements for SBOMs, a mitigation plan, and secure software development practices.

CISA and NCSC's Take on Secure AI Development
chrome_reader_mode
Article

CISA and NCSC's Take on Secure AI Development

A breakdown of the "Guidelines for Secure AI System Development document from CISA and NCSC.

Open Source Security 101: How to Evaluate Your Open Source Security Posture
chrome_reader_mode
Article

Open Source Security 101: How to Evaluate Your Open Source Security Posture

Organizations need to evolve their approach to using open source securely. Find four fundamental considerations to consider when it comes to securely using OSS.

Endor Labs is a CRN 2023 Stellar Startup!
chrome_reader_mode
Article

Endor Labs is a CRN 2023 Stellar Startup!

CRN®, a brand of The Channel Company, has named Endor Labs to its 2023 Stellar Startups list in the Security category. Learn more about the list and us here.

How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial
chrome_reader_mode
Article

How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial

In this short video we demonstrate how to use Endor Labs for reachability-based SCA and noise reduction.

Open Source Security for Python and AI Apps
chrome_reader_mode
Article

Open Source Security for Python and AI Apps

Gain visibility into your hidden Python dependencies and prioritize reachable, exploitable risks.

How To Evaluate Secret Detection Tools
chrome_reader_mode
Article

How To Evaluate Secret Detection Tools

An overview of 3 requirements for a secret detection program, and how to do it with Endor Labs.

Why SCA Tools Can't Agree if Something is a CVE
chrome_reader_mode
Article

Why SCA Tools Can't Agree if Something is a CVE

One scanner says this is a CVE, and the other says it's not. Which is right?

5 Federal Software Supply Chain Requirements You Should Be Aware Of
chrome_reader_mode
Article

5 Federal Software Supply Chain Requirements You Should Be Aware Of

If you’ve been watching the software supply chain security space evolve, you likely know that a lot of the momentum and effort is coming out of the U.S. Federal government. This may seem surprising at first, but it shouldn’t be, when you account for the fact that the Federal government is one of the single largest procurers of technology and software in the world. 

You Found Vulnerabilities in Your Dependencies, Now What?
chrome_reader_mode
Article

You Found Vulnerabilities in Your Dependencies, Now What?

Third-party open source dependencies offer convenience but also pose a significant security risk. Learn how tools like Endor Labs can detect & address vulnerabilities here.

Dependency Resolution in Python: Beware The Phantom Dependency
chrome_reader_mode
Article

Dependency Resolution in Python: Beware The Phantom Dependency

Phantom dependencies are dependencies used by your code that are not declared in the manifest. If you miss them, they can sneak reachable risks into your application, lead to false positives, or inaccurate SBOMs. All very spooky. This article breaks down how phantom dependencies happen, and how to catch them.

Chris Hughes Joins Endor Labs as Chief Security Advisor
chrome_reader_mode
Article

Chris Hughes Joins Endor Labs as Chief Security Advisor

Chris Hughes brings nearly 20 years of IT and cybersecurity experience to his role as Chief Security Advisor. Learn what made him choose Endor Labs.

Understanding Python Manifest Files
chrome_reader_mode
Article

Understanding Python Manifest Files

In this blog, we delve into the various Python manifest files used to declare dependencies and how they collaborate seamlessly.

Why Your SCA is Always Wrong
chrome_reader_mode
Article

Why Your SCA is Always Wrong

A breakdown of why your SCA results are always so full of false positives (and sometimes false negatives), and why treating source code as a first class citizen can lead us to the solution.

Endor Labs Named 2023 SINET16 Innovator Award Winner
chrome_reader_mode
Article

Endor Labs Named 2023 SINET16 Innovator Award Winner

SINET, an organization with the mission to accelerate Cybersecurity innovation through public-private partnerships, announced today that Endor Labs is one of the winners of its annual SINET16 Innovator Award. Endor Labs and 15 other emerging companies are identified as the most innovative and compelling technologies in their fields to address Cybersecurity threats and vulnerabilities.

Combining EPSS and Reachability Analysis to Optimize Vulnerability Management
chrome_reader_mode
Article

Combining EPSS and Reachability Analysis to Optimize Vulnerability Management

Exploit Prediction Scoring Systems (EPSS) is a data set that helps you understand the likelihood that a CVE will be exploited. Learn what the EPSS includes and how to use it to prioritize vulnerability remediation.

no-results
Sorry, no results matching your search.

Get a Free Trial

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.
Try the Endor Labs Software Supply Chain Security platform for 30 days.