Video

Learn about software supply chain security and Endor Labs

Fireside Chat: Building an AppSec Program for Cursor

Fireside Chat: Building an AppSec Program for Cursor

Learn how Travis McPeak is building an AppSec program that's both effective and non-disruptive to the engineering team's workflow.

Fireside Chat: CISOs on AI, Shift Left, and Building Trust at People.ai and AppLovin

Fireside Chat: CISOs on AI, Shift Left, and Building Trust at People.ai and AppLovin

Learn how top security leaders think about using AI code assistants to achieve the shift-left dream, increase release velocity, and build developer trust.

Fireside Chat: Building a High-Trust Product Security Program at Zebra

Fireside Chat: Building a High-Trust Product Security Program at Zebra

Learn how Zebra Technologies builds a successful Product Security program by using reachability and risk ranking to prioritize critical vulnerabilities, making fixes fast and building developer trust.

How to Fix Vulnerabilities Without Breaking Changes

How to Fix Vulnerabilities Without Breaking Changes

Endor Labs Partner Program Overview

Endor Labs Partner Program Overview

What's a Security Pipeline? - On-Demand Webinar

What's a Security Pipeline? - On-Demand Webinar

Learn about common patterns and tradeoffs for security pipelines in this introductory webinar.

Managing Open Source Vulnerabilities for PCI DSS Compliance - On-Demand Webinar

Managing Open Source Vulnerabilities for PCI DSS Compliance - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn about changes to PCI DSS that impact OSS vulnerability management.

Intro to Endor Labs - On-Demand Webinar

Intro to Endor Labs - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn how to Endor Labs supports a Software Supply Chain Security program.

Artifact Signing 101 - On-Demand Webinar

Artifact Signing 101 - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn using strong cryptographic artifact signatures to enable strong admission control, provenance, and traceability that support effective security, quality, and compliance programs.

Prioritizing SCA Findings with Reachability Analysis - On-Demand Webinar

Prioritizing SCA Findings with Reachability Analysis - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn how reachability analysis works.

How to Improve SCA in GitHub Advanced Security - Tutorial

How to Improve SCA in GitHub Advanced Security - Tutorial

In this short video we demonstrate how to use Endor Labs and GitHub Advanced Security to manage and prioritize open source risk.

How to Ingest and Manage SBOMs - Tutorial

How to Ingest and Manage SBOMs - Tutorial

In this short video we demonstrate how to ingest 1st and 3rd party software bills of material, manage them centrally, and detect new vulnerabilities in a timely manner.

How to Generate SBOM and VEX - Tutorial

How to Generate SBOM and VEX - Tutorial

In this short video we demonstrate how to use Endor Labs to produce SBOM and VEX documents.

How to Use AI for Open Source Selection - Tutorial

How to Use AI for Open Source Selection - Tutorial

In this short video we demonstrate how to use DroidGPT to research open source packages in a conversational manner.

How to Scan and Prioritize Valid Secrets - Tutorial

How to Scan and Prioritize Valid Secrets - Tutorial

In this short video we demonstrate how to use Endor Labs to discover if your organization has leaked valid secrets and provide developers with instructions for resolving the leak.

How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial

How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial

In this short video we demonstrate how to use Endor Labs for reachability-based SCA and noise reduction.

Reachability Analysis for Python, Go, C# - Webinar

Reachability Analysis for Python, Go, C# - Webinar

In this on-demand webinar, get an in-depth reachability analysis for Python, Go, and C#. Watch now.

Highlights from State of Dependency Management 2022 - Webinar

Highlights from State of Dependency Management 2022 - Webinar

In this on-demand webinar we discuss the key research findings from our 2022 report "State of Dependency Management."

How Security and Engineering Can Scale Open Source Security - Webinar

How Security and Engineering Can Scale Open Source Security - Webinar

In this on-demand video we discuss open source dependency management and considerations for implementing AppSec programs to protect OSS.

Introduction to Open Source Security - Webinar

Introduction to Open Source Security - Webinar

In this on-demand webinar we help you understand the basics of dependency management and how they can be vulnerable to security risks.

Comparing SBOMs Generated at Different Lifecycle Stages - Webinar

Comparing SBOMs Generated at Different Lifecycle Stages - Webinar

In this on-demand webinar, we share research on the variation in SBOMs depending on tool and when the documents are generated.

Why We Need Static Analysis When Prioritizing Vulnerabilities - Webinar

Why We Need Static Analysis When Prioritizing Vulnerabilities - Webinar

In this on-demand webinar, we explain the role of static analysis of open source dependencies in an application security program.

Book a Demo

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.