Speakers
Sign up now
Register Now
Speakers
Schedule
Want to stay in the loop?
Sign up for our newsletter.
Control which images get deployed in Kubernetes by configuring an admission controller to admit only those which have been signed by Endor Labs.
What happens when an AppSec professional attends a Java conference? Great conversations on productivity, tool pain, AI/ML, and vulnerability management.
While it’s improbable to prevent all exposure to supply chain risks, organizations can absolutely focus on a strategy to reduce the probability of successful attacks and reduce the time it takes them to respond to such threats.
The xz backdoor shines a light on everything we're doing wrong in software supply chain security. Get an overview of the incident, what we can learn from it, and what we can do about it.
Learn ways to comply with SSDF requirements for secure environments, trusted source code supply chains, code and artifact provenance, and vulnerabilities.
Learn how to establish automated CI/CD controls to reveal what’s running in your pipelines and which configs don’t align with risk and compliance requirements.
Watch this 30-minute on-demand webinar to learn using strong cryptographic artifact signatures to enable strong admission control, provenance, and traceability that support effective security, quality, and compliance programs.
Watch this 30-minute on-demand webinar to learn how reachability analysis works.
Code Signing and other Artifact Signing enable application provenance to enhance admission control, incident response, and other essential capabilities.
Learn about the pros and cons of maintaining current dependencies, backed by a TU Delft study on 262 Java projects on Github
Learn about emerging malicious code trends, including typosquatting and dependency confusion attacks, and two techniques for detecting malware in your applications.
In this short video we demonstrate how to ingest 1st and 3rd party software bills of material, manage them centrally, and detect new vulnerabilities in a timely manner.
In this short video we demonstrate how to use Endor Labs and GitHub Advanced Security to manage and prioritize open source risk.
In this short video we demonstrate how to use Endor Labs to produce SBOM and VEX documents.
In this short video we demonstrate how to use DroidGPT to research open source packages in a conversational manner.
In this short video we demonstrate how to use Endor Labs to discover if your organization has leaked valid secrets and provide developers with instructions for resolving the leak.
Tom Gleason is a security enthusiast with a knack for building and leading technically-focused customer teams. Formerly at Snyk, Akamai, and Palo Alto Networks, Tom joins Endor Labs to lead Customer Solutions.
Endor Labs CI/CD helps organizations secure their pipelines through pipeline discovery, repository security posture management, and build integrity verification (artifact signing).
In this on-demand webinar we discuss the key research findings from our 2022 report "State of Dependency Management."
In this on-demand webinar, get an in-depth reachability analysis for Python, Go, and C#. Watch now.
In this on-demand video we discuss open source dependency management and considerations for implementing AppSec programs to protect OSS.
In this on-demand webinar we help you understand the basics of dependency management and how they can be vulnerable to security risks.
In this on-demand webinar, we share research on the variation in SBOMs depending on tool and when the documents are generated.
In this on-demand webinar, we explain the role of static analysis of open source dependencies in an application security program.
In their inaugural report, the Station 9 research team explores the complexities of open source dependencies and the top security considerations for open source adoption at the enterprise.
Emerging trends impacting open source dependency management
In this short video we demonstrate how to use Endor Labs for reachability-based SCA and noise reduction.
Discover the critical details of CVE-2023-50164, a severe vulnerability in Apache Struts.
Third-party open source dependencies offer convenience but also pose a significant security risk. Learn how tools like Endor Labs can detect & address vulnerabilities here.
One scanner says this is a CVE, and the other says it's not. Which is right?
Chris Hughes brings nearly 20 years of IT and cybersecurity experience to his role as Chief Security Advisor. Learn what made him choose Endor Labs.
Learn best practices for a proper software identification ecosystem that supports asset inventory, version control, vulnerability management, incident response, and more.
Like anything in computer science and programming, there’s more than one way to solve a problem or get a result. SCA (software composition analysis) is no different.
A breakdown of why your SCA results are always so full of false positives (and sometimes false negatives), and why treating source code as a first class citizen can lead us to the solution.
Join Henrik to learn how his journey into Go programming turned into a path of malicious OSS packages.
Learn how to begin threat models and make more informed risk management decisions regarding their software development practices.
GitHub rolled out a release that had some breaking changes to Git. Here's what we learned from it.
An SBOM without VEX is like peanut butter without jelly. SBOM is a top buzzword in cybersecurity, but it's important to understand why VEX (Vulnerability Exploitability eXchange) is such a critical companion document.
This article explores Maven dependency scopes: What are they, what are they used for, and how do they impact security risks?
Reachability analysis increases reliability of SCA results, allowing teams to quickly prioritize just the risks that matter.
Learn how the VMWare compliance team built a a scalable process to collect and attest to SBOMs using Endor Labs.
In this blog, we delve into the various Python manifest files used to declare dependencies and how they collaborate seamlessly.
The recent report from the CSRB gives a step by step account of Log4j, from discovery to remediation, and uncovers a painful insight - sometimes the response is just as dangerous as the vulnerability.
Learn how packages.lock.json can help maintain a secure .NET development and why it should be part of your development workflow.
Endor Labs raises a total of $70M to achieve application security without the developer productivity tax. Here's what we're doing, and where we're going.
This blog summarizes highlights from Tragedy of the Digital Commons, by Strauss Center scholar and lecturer Chinmayi Sharma, where she shares the OSS state of affairs and her thoughts on improving security.
Software composition analysis (SCA) tools take a static or dynamic approach. Learn the pros and cons of each option and see how the results differ.
Endor Labs raises $25M seed round.
A call graph is a visualization of invocation of vulnerable open source methods by a given client. Learn how to use call graphs to understand relevancy and impact of vulnerabilities.
Software vendors active in certain verticals will soon be required to provide customers with SBOMs for their products. But how and when should an SBOM for a given piece of software be produced?
Solution from category-defining entrepreneurs and world-renowned experts helps developers spend less time dealing with security issues, more time accelerating their development through safe code reuse.
All the questions (and some of the answers) you need before kicking off your SBOM program.
Do you know what goes into the software your company consumes? If your answer was sticky tape and glue, you clearly work in technology. Congratulations, this article is for you.
At Endor Labs, we continue evaluating the use of large language models (LLMs) for all kinds of use-cases related to application security. And we continue to be amazed about high-quality responses … until we’re amused about the next laughably wrong answer.
Learn about the 2023 FDA rule for medical devices, including requirements for SBOMs, a mitigation plan, and secure software development practices.
In this article, we explore the impact of using a monorepo vs a polyrepo architecture on dependency management.
Organizations need to evolve their approach to using open source securely. Find four fundamental considerations to consider when it comes to securely using OSS.
The Hyperdrive partner program enables organizations of all sizes to embrace open source software with confidence.
What’s the best of the best when it comes to open source security tools?We’ve previously talked about the OpenSSF Scorecard, which gives developers a high-level snapshot of the security of any given open source project. But in this post, we’ll talk about a related project, the Open Source Security Index (OSSI), which does something slightly different and complementary.
Lean MileIQ, the #1 mileage tracking app, selected Endor Labs to help their security and engineering teams focus on the software supply chain risks that actually matter.
Experiments with GPT-3.5 suggest that LLM-based malware reviews can complement, but not yet substitute human reviews. 1800 binary classifications performed with GPT-3.5 included false-positives and false-negatives.
Explore the different types of open source licenses and how they impact the use, modification, and distribution of open source software. From GPL to Apache, MIT and more, learn the key differences between permissive and restrictive licenses and how to choose the right one for your project.
Developers are bombarded with information every day. Constant context switching and information overload are among the biggest barriers to productivity. There are simply too many demands for their attention. One day the sales team will understand. Right?
After a comprehensive diligence process on startups in the supply chain and open source security space, over 30 CISOs have chosen to personally back Endor Labs.
Endor Labs’ JavaScript SCA capabilities cut down noise with a program analysis approach that outperforms manifest scanning SCA tools like Snyk, Veracode, and BlackDuck.
Program analysis is the process of checking whether or not a piece of software fulfills certain properties. This article explores the basics of program analysis, so we could then dive deeper into the world of call graphs.
The Scorecard API makes it easier to automate and enforce your dependency policies. Naveen is one of the key contributors to the Scorecard projects, in this article, he walks through how it works!
Announcing new language support for Endor Labs Open Source
Learn how Zero Trust principles help OSS adoption
Endor Labs’ reachability-based SCA now supports Bazel so you can get fully accurate results without any of the messy workarounds usually required for monorepos.
SBOM-Lab is an open source tool that lets you quickly compare SBOM generation methods for Maven projects and find the right one for you.
Sriram Subramanian recently left his position as VP of Engineering at Citrix to lead the India R&D center at Endor Labs. We asked him what made him take the leap and what's his vision for the India team.
An overview of 3 requirements for a secret detection program, and how to do it with Endor Labs.
Thinking about using Github's REST API within your system, or already doing so? If you have not already encountered this concept, one important thing to keep in mind while developing is Github's concept of rate limiting.
Explore the challenges of modern vulnerability management and the efficiency of the Vulnerability Exploitability eXchange (VEX) in our latest blog post. Learn how VEX helps identify and communicate the true exploitability of vulnerabilities, streamlining cybersecurity efforts in the face of overwhelming scanner findings.
Naming and understanding the attack vectors at the disposal of our adversaries.
As projects grow larger and more complex, developers face challenges in maintaining a clean and efficient development workflow. Fortunately, npm workspaces offer an essential solution to streamline JavaScript development. In this blog post, we will explore the concept of npm/yarn workspaces, its importance, and how Endor Labs works with them.
Exploit Prediction Scoring Systems (EPSS) is a data set that helps you understand the likelihood that a CVE will be exploited. Learn what the EPSS includes and how to use it to prioritize vulnerability remediation.
The State of Dependency Management 2023 reports on the latest research on dependency management and how AI is impacting the application security landscape.
We've been named a winner of the 2023 Intellyx Digital Innovator Award, recognizing technology providers driving enterprise digital transformation. Learn more.
Endor Labs recognized for innovation in helping enterprises manage open source risk.
If you’ve been watching the software supply chain security space evolve, you likely know that a lot of the momentum and effort is coming out of the U.S. Federal government. This may seem surprising at first, but it shouldn’t be, when you account for the fact that the Federal government is one of the single largest procurers of technology and software in the world.
Endor Labs is committed to providing cutting-edge solutions that address the challenges faced by platform engineering and DevSecOps teams in meeting application security needs.
I mean, who wouldn't want to work with a bunch of Ewoks?
We’re excited to announce our latest partnership with Zinfinity as a strategic partner. Zinfinity is a global provider of technology solutions and services with a focus on Cyber Security, Cloud and Digital Infrastructure.
SINET, an organization with the mission to accelerate Cybersecurity innovation through public-private partnerships, announced today that Endor Labs is one of the winners of its annual SINET16 Innovator Award. Endor Labs and 15 other emerging companies are identified as the most innovative and compelling technologies in their fields to address Cybersecurity threats and vulnerabilities.
Open Source security doesn't have to SOC (sorry, I had to). We're excited to announce we have received a clean audit result on our SOC2 Type 1 certification.
The Station 9 research team discovered malicious code that was divided and distributed across different packages, remaining obfuscated for months while getting nearly 2000 downloads.
Endor Labs integrates with GitHub Advanced Security to enable developers to easily view and remediate SCA alerts without ever needing to leave GitHub.
Endor Labs and Intuitive.Cloud announce strategic partnership and investment with the goal of taking on OSS sprawl.
CRN®, a brand of The Channel Company, has named Endor Labs to its 2023 Stellar Startups list in the Security category. Learn more about the list and us here.
Proving once again open source governance doesn’t have to SOC, yes I made that joke again and I’m not sorry. We’re excited to announce we have received a clean audit result on our SOC2 Type II certification.
Explore the five key categories of reachability and their practical applications in AppSec and development. Learn the differences between SCA and container scanning, and understand how various tools like Function-Level Reachability, Package Baselining, and Internet Reachability play crucial roles in identifying and prioritizing security risks.
Testing and installing new security tools is painful. Using generative AI, DroidGPT by Endor Labs makes it easy to troubleshoot and even prevent compatibility errors when installing the platform.
Phantom dependencies are dependencies used by your code that are not declared in the manifest. If you miss them, they can sneak reachable risks into your application, lead to false positives, or inaccurate SBOMs. All very spooky. This article breaks down how phantom dependencies happen, and how to catch them.
A breakdown of the "Guidelines for Secure AI System Development document from CISA and NCSC.
CVSS, KEV, SVCC, EPSS, and reachability analysis are 5 method used to prioritize open source vulnerabilities for remediation. Do you need all 5? Which is the best? It turns out a combination of factors (and a tool that can bring it all together) is the best solution.
Reserve your spot today for an exclusive one-on-one meeting with our experts. Delve deeper into topics such as:
When: April 10-11th, 2024
Where: World Congress Center | 285 Andrew Young International Blvd NW | Atlanta, GA
Sign up for our newsletter.