Blog

Learn about software supply chain security and Endor Labs

Understanding the Cyber Resilience Act

Understanding the Cyber Resilience Act

The Cyber Resilience Act (CRA) sets mandatory security requirements for hardware and software. This blog covers key compliance objectives, challenges with OSS vulnerabilities, and best practices for maintaining security throughout the product life cycle.

Start Clean With AI: Select Safer LLM Models with Endor Labs

Start Clean With AI: Select Safer LLM Models with Endor Labs

You can now use Endor Labs to evaluate AI models on HuggingFace for security, popularity, quality, and activity.

The U.S. Government Prioritizes Open Source Governance and Security

The U.S. Government Prioritizes Open Source Governance and Security

The U.S. Federal government's FY 2026 Cybersecurity Priorities focus on securing open source software, improving governance, and supporting OSS sustainability to strengthen the software supply chain.

Understanding the Basics of Large Language Models (LLMs)

Understanding the Basics of Large Language Models (LLMs)

Understand what LLMs are, how foundational LLMs are built, the opportunities they offer and the risks they pose.

Container Layer Analysis: Clarity in Remediation

Container Layer Analysis: Clarity in Remediation

Container layer analysis tells you which layer contains a vulnerability so you can prioritize remediation efforts more effectively and meet SLAs like FedRAMP.

Endor Labs Achieves 92% Reduction in SCA Alerts

Endor Labs Achieves 92% Reduction in SCA Alerts

Endor Labs reduces open-source vulnerability noise by 92%, boosting productivity and improving collaboration between development and security teams.

Karl Mattson Joins Endor Labs as Chief Information Security Officer

Karl Mattson Joins Endor Labs as Chief Information Security Officer

We're thrilled to have Karl Mattson as Endor Labs first Chief Information Security Officer (CISO)!

Highlights from Our 2024 Dependency Management Webinar

Highlights from Our 2024 Dependency Management Webinar

Get key insights from the 2024 Dependency Management webinar with Darren Meyer and Henrik Plate. We discuss how to prioritize vulnerabilities, navigate breaking changes, and leverage public vulnerability databases effectively.

Under the Hood: How Blocking with Confidence Improves DevEx at Relativity

Under the Hood: How Blocking with Confidence Improves DevEx at Relativity

Relativity changed their security program from a blocker to an enabler by integrating security into developer workflows and empowering developers to prevent risks before they ship to production.

48 most popular open source tools for Python applications, scored

48 most popular open source tools for Python applications, scored

Discover the top open-source tools for Python applications, ranked by Endor Scores based on security, activity, popularity, and code quality.

FedRAMP Requirements for Vulnerability Management and Dependency Upgrades

FedRAMP Requirements for Vulnerability Management and Dependency Upgrades

This blog covers key steps to simplify FedRAMP vulnerability management, helping you reduce risks and meet compliance timelines. It also provides practical tips to empower developers and streamline fixes for a smoother FedRAMP process.

Fix Vulnerabilities Faster with Auto Patching and Endor Patches

Fix Vulnerabilities Faster with Auto Patching and Endor Patches

Automatically patch open source libraries with Endor Patches during the build process, ensuring software is continuously protected against vulnerabilities without manual intervention.

Announcing the 2024 Dependency Management Report

Announcing the 2024 Dependency Management Report

Our third-annual Dependency Management Report explores how emerging trends in open source security should guide SDLC security strategy in 2024.

Under the Hood: Building a DevSecOps Practice at Starburst

Under the Hood: Building a DevSecOps Practice at Starburst

Wondering how to build or revamp a DevSecOps program? Get some immediately useful tips that you can apply to your startup or mature enterprise…or anywhere in between.

What is CI/CD Security and What Tools Do You Need to Do it?

What is CI/CD Security and What Tools Do You Need to Do it?

Learn what CI/CD security is, why it’s important, and discover the key tools Endor Labs offers to help you secure your CI/CD pipelines.

PWN Request Threat: A Hidden Danger in GitHub Actions

PWN Request Threat: A Hidden Danger in GitHub Actions

Endor Labs provides comprehensive CI/CD security for GitHub action workflows that detect patterns that may indicate PWN request threats.

Address Open Source Risks with Endor Labs

Address Open Source Risks with Endor Labs

Give Devs the Confidence to Fix: Making Remediation Less Painful

Give Devs the Confidence to Fix: Making Remediation Less Painful

Endor Labs’ newest capabilities help you reduce the research required to understand the impact of dependency upgrades and Endor Magic Patches help you stay safe without changing versions.

Endor Labs Partners with Microsoft to Strengthen Software Supply Chains

Endor Labs Partners with Microsoft to Strengthen Software Supply Chains

Endor Labs is now available on Azure Marketplace!

Prioritize Open Source Risks with Endor Labs

Prioritize Open Source Risks with Endor Labs

Endor Labs provides several filters to help you prioritize which risks to address first, resulting in an average 92% noise reduction.

Discover Open Source Risks with Endor Labs

Discover Open Source Risks with Endor Labs

Use Endor Labs to get accurate dependency inventories and complete vulnerability data sources.

48 most popular open source tools for npm applications, scored

48 most popular open source tools for npm applications, scored

Discover the 48 most popular open-source npm tools, complete with Endor Scores, to help you choose the best dependencies for your projects based on security, activity, popularity, and code quality.

Benchmarking Endor Labs vs. Snyk’s GitHub Apps

Benchmarking Endor Labs vs. Snyk’s GitHub Apps

Compare Endor Labs and Snyk GitHub Apps.

Using Artifact Signing to Establish Provenance for SLSA

Using Artifact Signing to Establish Provenance for SLSA

Use artifact signing, a feature of Endor Labs, to support build provenance requirements for SLSA.

Introducing Upgrades & Remediation: Give Developers the Confidence to Fix

Introducing Upgrades & Remediation: Give Developers the Confidence to Fix

Upgrade Impact Analysis shows you what breaking changes a fix could cause. Endor Patches are trusted patches you can use when upgrades are too painful.

Book a Demo

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.