
Speakers
Speakers
Schedule


%20(1).png)
Want to stay in the loop?
Sign up for our newsletter.
Welcome to the Endor Labs' Base at Trace Restaurant—where the force of community, connection, and relaxation converge for a much-needed safe space retreat during RSAC 2025. This is no ordinary RSAC event. We invite women to gather for a Birds of a Feather experience, free from the pressure of traditional networking.
We’ve got activities to spark joy and creativity: dive into a world of LEGO building, challenge your mind with board games, and engage in activities that help you relax and unwind. This is not about business cards or elevator pitches; it’s about people and passion.
Join us for an evening of fun and camaraderie—your safe haven in the heart of the RSAC!
Sign up for our newsletter.
This whitepaper talks about how Endor Labs uses context-aware security policies, like finding, action, exception, and remediation policies, to reduce noise, improve remediation speed, and help developers focus on real risks.
Click to read
This solution brief shows how application security teams can fix risks from AI-generated code earlier in development and become the catalyst for secure, scalable adoption of AI coding tools like GitHub Copilot and Cursor in their organizations.
Click to read
This whitepaper introduces how AI Security Code Review works, what it detects, how it integrates into your workflows, and why it represents the next generation of code scanning technology — built for the complexity and speed of AI-native software development.
Click to read
Integrate Microsoft Defender for Cloud with Endor Labs for reachability analysis and attack path visibility — available natively within the Defender for Cloud console. Prioritize what to fix without switching tools.
Click to read
The Cyber Resilience Act (CRA) sets mandatory security requirements for hardware and software. This blog covers key compliance objectives, challenges with OSS vulnerabilities, and best practices for maintaining security throughout the product life cycle.
Click to read
Get key insights from the 2024 Dependency Management webinar with Darren Meyer and Henrik Plate. We discuss how to prioritize vulnerabilities, navigate breaking changes, and leverage public vulnerability databases effectively.
Click to read
This blog covers key steps to simplify FedRAMP vulnerability management, helping you reduce risks and meet compliance timelines. It also provides practical tips to empower developers and streamline fixes for a smoother FedRAMP process.
Click to read
GitHub Actions are open source dependencies - secure them accordingly! Learn how to effectively manage the security risks associated with GitHub Actions with a proactive approach focusing on three key areas: visibility, hardening, and dependency management.
Click to read
Lightsaber Stunt Training Series - Europe
Click to view
Innovate Cybersecurity Summit - Nashville
Click to view
Innovate Cybersecurity Summit, Scottsdale
Click to view