Learn

Learn about software supply chain security and Endor Labs.

Featured resources

AI Security Code Review: A Multi-Agent Approach for Detecting Security Design Flaws at Scale
Ebook/Report

AI Security Code Review: A Multi-Agent Approach for Detecting Security Design Flaws at Scale

Apr 23, 2025
Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era
Blog

Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era

Apr 23, 2025
Introducing AI Security Code Review
Blog

Introducing AI Security Code Review

Apr 23, 2025
Meet the application security platform built for the AI era
Blog

Meet the application security platform built for the AI era

Apr 23, 2025
Topic
Medium
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security
SCA
Introducing JavaScript Reachability and Phantom Dependency Detection
Blog

Introducing JavaScript Reachability and Phantom Dependency Detection

Dec 12, 2023
Security
SCA
MileIQ securely reimagines a decade old product with Endor Labs
Customer Story

MileIQ Securely Reimagines a Decade Old Product with Endor Labs

Dec 11, 2023
Security
Compliance & SBOM
How CycloneDX VEX Makes Your SBOM Useful
Blog

How CycloneDX VEX Makes Your SBOM Useful

Dec 8, 2023
First Party Code
Security
How to Scan and Prioritize Valid Secrets
Video

How to Scan and Prioritize Valid Secrets - Tutorial

Dec 6, 2023
Security
Compliance & SBOM
SBOM Requirements for Medical Devices
Blog

SBOM Requirements for Medical Devices

Dec 5, 2023
Security
Compliance & SBOM
CISA and NCSC's Take on Secure AI Development
Blog

CISA and NCSC's Take on Secure AI Development

Nov 30, 2023
Security
Open Source
Open Source Security 101: How to Evaluate Your Open Source Security Posture
Blog

Open Source Security 101: How to Evaluate Your Open Source Security Posture

Nov 16, 2023
News
Endor Labs is a CRN 2023 Stellar Startup!
Blog

Endor Labs is a CRN 2023 Stellar Startup!

Nov 13, 2023
SCA
Open Source
How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities
Video

How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial

Nov 9, 2023
SCA
AI/ML
Open Source
Open Source Security for Python and AI Apps
Solution Brief

Open Source Security for Python and AI Apps

Nov 6, 2023
Security
First Party Code
How To Evaluate Secret Detection Tools
Blog

How To Evaluate Secret Detection Tools

Oct 31, 2023
Security
SCA
Why SCA tools can't agree if something is a CVE
Blog

Why SCA Tools Can't Agree if Something is a CVE

Oct 20, 2023
Security
Compliance & SBOM
5 Federal Software Supply Chain Requirements You Should Be Aware Of
Blog

5 Federal Software Supply Chain Requirements You Should Be Aware Of

Oct 16, 2023
Security
SCA
You found vulnerabilities in your dependencies, now what?
Blog

You Found Vulnerabilities in Your Dependencies, Now What?

Oct 6, 2023
SCA
Dependency Resolution in Python: Beware The Phantom Dependency
Blog

Dependency Resolution in Python: Beware The Phantom Dependency

Sep 28, 2023
News
Chris Hughes Joins Endor Labs as Chief Security Advisor
Blog

Chris Hughes Joins Endor Labs as Chief Security Advisor

Sep 26, 2023
Developer Productivity
SCA
Understanding Python Manifest Files: Part 1
Blog

Understanding Python Manifest Files

Sep 20, 2023
SCA
Why Your SCA is Always Wrong
Blog

Why Your SCA is Always Wrong

Sep 12, 2023
Security
Endor Labs Named 2023 SINET16 Innovator Award Winner
Blog

Endor Labs Named 2023 SINET16 Innovator Award Winner

Sep 7, 2023
Security
SCA
Combining the Exploit Prediction Scoring System (EPSS) with reachability analysis to optimize your vulnerability management program
Blog

Combining EPSS and Reachability Analysis to Optimize Vulnerability Management

Sep 6, 2023
SCA
Open Source
Reachability Analysis for Python, Go, C#
Video

Reachability Analysis for Python, Go, C# - Webinar

Sep 5, 2023
no-results
Sorry, no results matching your search.

Want to stay in the loop?

Sign up for our newsletter.