
Schedule
Want to stay in the loop?
Sign up for our newsletter.
Join us for Software Supply Chain (SSC) Security & Craft Beer!
We’re excited to feature Jamie Scott, Founding Product Manager at Endor Labs, at this meetup, who will deliver an insightful session titled “The Hidden Risks of Software Re-use: OWASP Top 10 for Open Source.”
Session Overview:
While known vulnerabilities and out-of-date components seem like apparent risks, OSS has several other key risks that should be considered as well. In this talk, we will cover the Top 10 OSS Risks. This includes common considerations such as known vulnerabilities and unmaintained or outdated software but also other key risks such as the compromise of a legitimate package, license risks, and excessive use of dependencies. This talk will feature the Top 10 OSS Risks https://owasp.org/www-project-open-source-software-top-10/ and include examples and case studies of notable OSS incidents tied to the risks discussed. It will also provide actionable takeaways for security and technology leaders to equip them to securely consume and utilize OSS in their enterprise environments and software/products while mitigating some of the most relevant risks associated with OSS.
Don’t miss this thought-provoking discussion on practical steps and processes that you can implement to minimize the risks associated with software and dependency re-use within your environments.
Sign up for our newsletter.
This whitepaper talks about how Endor Labs uses context-aware security policies, like finding, action, exception, and remediation policies, to reduce noise, improve remediation speed, and help developers focus on real risks.
Click to read
This solution brief shows how application security teams can fix risks from AI-generated code earlier in development and become the catalyst for secure, scalable adoption of AI coding tools like GitHub Copilot and Cursor in their organizations.
Click to read
This whitepaper introduces how AI Security Code Review works, what it detects, how it integrates into your workflows, and why it represents the next generation of code scanning technology — built for the complexity and speed of AI-native software development.
Click to read
Integrate Microsoft Defender for Cloud with Endor Labs for reachability analysis and attack path visibility — available natively within the Defender for Cloud console. Prioritize what to fix without switching tools.
Click to read
The Cyber Resilience Act (CRA) sets mandatory security requirements for hardware and software. This blog covers key compliance objectives, challenges with OSS vulnerabilities, and best practices for maintaining security throughout the product life cycle.
Click to read
Get key insights from the 2024 Dependency Management webinar with Darren Meyer and Henrik Plate. We discuss how to prioritize vulnerabilities, navigate breaking changes, and leverage public vulnerability databases effectively.
Click to read
This blog covers key steps to simplify FedRAMP vulnerability management, helping you reduce risks and meet compliance timelines. It also provides practical tips to empower developers and streamline fixes for a smoother FedRAMP process.
Click to read
GitHub Actions are open source dependencies - secure them accordingly! Learn how to effectively manage the security risks associated with GitHub Actions with a proactive approach focusing on three key areas: visibility, hardening, and dependency management.
Click to read
Lightsaber Stunt Training Series - Europe
Click to view
Innovate Cybersecurity Summit - Nashville
Click to view
Innovate Cybersecurity Summit, Scottsdale
Click to view