Blog

Learn about software supply chain security and Endor Labs

What is VEX and Why Should I Care?

What is VEX and Why Should I Care?

An SBOM without VEX is like peanut butter without jelly. SBOM is a top buzzword in cybersecurity, but it's important to understand why VEX (Vulnerability Exploitability eXchange) is such a critical companion document.

Whatfuscator, Malicious Open Source Packages, and Other Beasts

Whatfuscator, Malicious Open Source Packages, and Other Beasts

Join Henrik to learn how his journey into Go programming turned into a path of malicious OSS packages.

Exploring Risk: Understanding Software Supply Chain Attacks

Exploring Risk: Understanding Software Supply Chain Attacks

Naming and understanding the attack vectors at the disposal of our adversaries.

Endor Labs and Intuitive Partner to Help Enterprises Leverage OSS

Endor Labs and Intuitive Partner to Help Enterprises Leverage OSS

Endor Labs and Intuitive.Cloud announce strategic partnership and investment with the goal of taking on OSS sprawl.

What is Reachability-Based Dependency Analysis?

What is Reachability-Based Dependency Analysis?

Reachability analysis increases reliability of SCA results, allowing teams to quickly prioritize just the risks that matter.

What are Maven Dependency Scopes and Their Related Security Risks?

What are Maven Dependency Scopes and Their Related Security Risks?

This article explores Maven dependency scopes: What are they, what are they used for, and how do they impact security risks?

The Government's Role in Maintaining Open Source Security

The Government's Role in Maintaining Open Source Security

This blog summarizes highlights from Tragedy of the Digital Commons, by Strauss Center scholar and lecturer Chinmayi Sharma, where she shares the OSS state of affairs and her thoughts on improving security.

Introduction to Program Analysis

Introduction to Program Analysis

Program analysis is the process of checking whether or not a piece of software fulfills certain properties. This article explores the basics of program analysis, so we could then dive deeper into the world of call graphs.

More Than 30 Industry-Leading CISOs Personally Invest in Endor Labs

More Than 30 Industry-Leading CISOs Personally Invest in Endor Labs

After a comprehensive diligence process on startups in the supply chain and open source security space, over 30 CISOs have chosen to personally back Endor Labs.

From Cloud Security to Code Security: Why We've Raised $25M to Take on OSS Dependency Sprawl

From Cloud Security to Code Security: Why We've Raised $25M to Take on OSS Dependency Sprawl

Endor Labs raises $25M seed round.

Endor Labs Launches with $25M Seed Financing to Tackle Massive Sprawl of Open Source Software (OSS)

Endor Labs Launches with $25M Seed Financing to Tackle Massive Sprawl of Open Source Software (OSS)

Solution from category-defining entrepreneurs and world-renowned experts helps developers spend less time dealing with security issues, more time accelerating their development through safe code reuse.

SBOMs are Just a Means to an End

SBOMs are Just a Means to an End

Do you know what goes into the software your company consumes? If your answer was sticky tape and glue, you clearly work in technology. Congratulations, this article is for you.

Introducing the OpenSSF Scorecard API

Introducing the OpenSSF Scorecard API

The Scorecard API makes it easier to automate and enforce your dependency policies. Naveen is one of the key contributors to the Scorecard projects, in this article, he walks through how it works!

How to Get the Most out of GitHub API Rate Limits

How to Get the Most out of GitHub API Rate Limits

Thinking about using Github's REST API within your system, or already doing so? If you have not already encountered this concept, one important thing to keep in mind while developing is Github's concept of rate limiting.

Why I Joined Endor Labs to Build our India Team

Why I Joined Endor Labs to Build our India Team

Sriram Subramanian recently left his position as VP of Engineering at Citrix to lead the India R&D center at Endor Labs. We asked him what made him take the leap and what's his vision for the India team.

How Zero Trust Principles Can Accelerate Enterprise Adoption of OSS

How Zero Trust Principles Can Accelerate Enterprise Adoption of OSS

Learn how Zero Trust principles help OSS adoption

What Security Teams Need to Know about Software Development

What Security Teams Need to Know about Software Development

Learn how to begin threat models and make more informed risk management decisions regarding their software development practices.

CSRB Log4j Report - The Response is as Dangerous as the Vulnerability

CSRB Log4j Report - The Response is as Dangerous as the Vulnerability

The recent report from the CSRB gives a step by step account of Log4j, from discovery to remediation, and uncovers a painful insight - sometimes the response is just as dangerous as the vulnerability.

Polyrepo vs. Monorepo - How Does it Impact Dependency Management?

Polyrepo vs. Monorepo - How Does it Impact Dependency Management?

In this article, we explore the impact of using a monorepo vs a polyrepo architecture on dependency management.

Book a Demo

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.