Blog

Learn about software supply chain security and Endor Labs

Tom Gleason Joins Endor Labs as VP of Customer Solutions

Tom Gleason Joins Endor Labs as VP of Customer Solutions

Tom Gleason is a security enthusiast with a knack for building and leading technically-focused customer teams. Formerly at Snyk, Akamai, and Palo Alto Networks, Tom joins Endor Labs to lead Customer Solutions.

Introducing CI/CD Security with Endor Labs

Introducing CI/CD Security with Endor Labs

Endor Labs CI/CD helps organizations secure their pipelines through pipeline discovery, repository security posture management, and build integrity verification (artifact signing).

AI-Supported Environment Debugging for Endor Labs

AI-Supported Environment Debugging for Endor Labs

Testing and installing new security tools is painful. Using generative AI, DroidGPT by Endor Labs makes it easy to troubleshoot and even prevent compatibility errors when installing the platform.

Introducing a Better Way to SCA for Monorepos and Bazel

Introducing a Better Way to SCA for Monorepos and Bazel

Endor Labs’ reachability-based SCA now supports Bazel so you can get fully accurate results without any of the messy workarounds usually required for monorepos.

5 Types of Reachability Analysis (and Which is Right for You)

5 Types of Reachability Analysis (and Which is Right for You)

Explore the five key categories of reachability and their practical applications in AppSec and development. Learn the differences between SCA and container scanning, and understand how various tools like Function-Level Reachability, Package Baselining, and Internet Reachability play crucial roles in identifying and prioritizing security risks.

What’s in a Name? A Look at the Software Identification Ecosystem

What’s in a Name? A Look at the Software Identification Ecosystem

Learn best practices for a proper software identification ecosystem that supports asset inventory, version control, vulnerability management, incident response, and more.

What You Need to Know About Apache Struts and CVE-2023-50164

What You Need to Know About Apache Struts and CVE-2023-50164

Discover the critical details of CVE-2023-50164, a severe vulnerability in Apache Struts.

Introducing JavaScript Reachability and Phantom Dependency Detection

Introducing JavaScript Reachability and Phantom Dependency Detection

Endor Labs’ JavaScript SCA capabilities cut down noise with a program analysis approach that outperforms manifest scanning SCA tools like Snyk, Veracode, and BlackDuck.

How CycloneDX VEX Makes Your SBOM Useful

How CycloneDX VEX Makes Your SBOM Useful

Explore the challenges of modern vulnerability management and the efficiency of the Vulnerability Exploitability eXchange (VEX) in our latest blog post. Learn how VEX helps identify and communicate the true exploitability of vulnerabilities, streamlining cybersecurity efforts in the face of overwhelming scanner findings.

SBOM Requirements for Medical Devices

SBOM Requirements for Medical Devices

Learn about the 2023 FDA rule for medical devices, including requirements for SBOMs, a mitigation plan, and secure software development practices.

CISA and NCSC's Take on Secure AI Development

CISA and NCSC's Take on Secure AI Development

A breakdown of the "Guidelines for Secure AI System Development document from CISA and NCSC.

Open Source Security 101: How to Evaluate Your Open Source Security Posture

Open Source Security 101: How to Evaluate Your Open Source Security Posture

Organizations need to evolve their approach to using open source securely. Find four fundamental considerations to consider when it comes to securely using OSS.

Endor Labs is a CRN 2023 Stellar Startup!

Endor Labs is a CRN 2023 Stellar Startup!

CRN®, a brand of The Channel Company, has named Endor Labs to its 2023 Stellar Startups list in the Security category. Learn more about the list and us here.

How To Evaluate Secret Detection Tools

How To Evaluate Secret Detection Tools

An overview of 3 requirements for a secret detection program, and how to do it with Endor Labs.

Why SCA Tools Can't Agree if Something is a CVE

Why SCA Tools Can't Agree if Something is a CVE

One scanner says this is a CVE, and the other says it's not. Which is right?

5 Federal Software Supply Chain Requirements You Should Be Aware Of

5 Federal Software Supply Chain Requirements You Should Be Aware Of

If you’ve been watching the software supply chain security space evolve, you likely know that a lot of the momentum and effort is coming out of the U.S. Federal government. This may seem surprising at first, but it shouldn’t be, when you account for the fact that the Federal government is one of the single largest procurers of technology and software in the world. 

You Found Vulnerabilities in Your Dependencies, Now What?

You Found Vulnerabilities in Your Dependencies, Now What?

Third-party open source dependencies offer convenience but also pose a significant security risk. Learn how tools like Endor Labs can detect & address vulnerabilities here.

Dependency Resolution in Python: Beware The Phantom Dependency

Dependency Resolution in Python: Beware The Phantom Dependency

Phantom dependencies are dependencies used by your code that are not declared in the manifest. If you miss them, they can sneak reachable risks into your application, lead to false positives, or inaccurate SBOMs. All very spooky. This article breaks down how phantom dependencies happen, and how to catch them.

Chris Hughes Joins Endor Labs as Chief Security Advisor

Chris Hughes Joins Endor Labs as Chief Security Advisor

Chris Hughes brings nearly 20 years of IT and cybersecurity experience to his role as Chief Security Advisor. Learn what made him choose Endor Labs.

Understanding Python Manifest Files

Understanding Python Manifest Files

In this blog, we delve into the various Python manifest files used to declare dependencies and how they collaborate seamlessly.

Why Your SCA is Always Wrong

Why Your SCA is Always Wrong

A breakdown of why your SCA results are always so full of false positives (and sometimes false negatives), and why treating source code as a first class citizen can lead us to the solution.

Endor Labs Named 2023 SINET16 Innovator Award Winner

Endor Labs Named 2023 SINET16 Innovator Award Winner

SINET, an organization with the mission to accelerate Cybersecurity innovation through public-private partnerships, announced today that Endor Labs is one of the winners of its annual SINET16 Innovator Award. Endor Labs and 15 other emerging companies are identified as the most innovative and compelling technologies in their fields to address Cybersecurity threats and vulnerabilities.

Combining EPSS and Reachability Analysis to Optimize Vulnerability Management

Combining EPSS and Reachability Analysis to Optimize Vulnerability Management

Exploit Prediction Scoring Systems (EPSS) is a data set that helps you understand the likelihood that a CVE will be exploited. Learn what the EPSS includes and how to use it to prioritize vulnerability remediation.

Introducing Reachability-Based SCA for Python, Go, and C#

Introducing Reachability-Based SCA for Python, Go, and C#

Announcing new language support for Endor Labs Open Source

The Open Source Security Index Top 5

The Open Source Security Index Top 5

What’s the best of the best when it comes to open source security tools?We’ve previously talked about the OpenSSF Scorecard, which gives developers a high-level snapshot of the security of any given open source project. But in this post, we’ll talk about a related project, the Open Source Security Index (OSSI), which does something slightly different and complementary.

Book a Demo

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.