Learn

Learn about software supply chain security and Endor Labs.

Featured resources

AURI: Security Intelligence for Agentic Software Development
Solution Brief

AURI: Security Intelligence for Agentic Software Development

Mar 19, 2026
How the EU Cyber Resilience Act (CRA) rewrites the rules of software liability
Blog

How the EU Cyber Resilience Act (CRA) rewrites the rules of software liability

Mar 13, 2026
Introducing AURI: Security Intelligence for AI Coding Agents and Developers
Blog

Introducing AURI: Security Intelligence for AI Coding Agents and Developers

Mar 3, 2026
How AI SAST Traced Data Flows to Uncover Six OpenClaw Vulnerabilities
Blog

How AI SAST Traced Data Flows to Uncover Six OpenClaw Vulnerabilities

Feb 18, 2026
Topic
Medium
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Compliance & SBOM
Tech
VMware achieves SBOM compliance for over 100 services with Endor Labs
Customer Story

VMware Achieves SBOM Compliance for Over 100 Services with Endor Labs

Jan 29, 2024
Security
AI/ML
AI-Supported Environment Debugging for Endor Labs
Blog

AI-Supported Environment Debugging for Endor Labs

Jan 25, 2024
Security
Open Source
SCA
Compliance & SBOM
How to Generate SBOM and VEX
Video

How to Generate SBOM and VEX - Tutorial

Jan 23, 2024
Security
AI/ML
Open Source
How to Use AI for Open Source Selection
Video

How to Use AI for Open Source Selection - Tutorial

Jan 9, 2024
Security
SCA
News
Introducing a Better Way to SCA for Monorepos and Bazel
Blog

Introducing a Better Way to SCA for Monorepos and Bazel

Jan 8, 2024
SCA
Security
Opinion
5 Types of Reachability Analysis (and Which is Right for You)
Blog

5 Types of Reachability Analysis (and Which is Right for You)

Jan 2, 2024
Security
Tech
What’s in a Name? A Look at the Software Identification Ecosystem
Blog

What’s in a Name? A Look at the Software Identification Ecosystem

Dec 20, 2023
Security
What you need to know about Apache Struts and CVE-2023-50164
Blog

What You Need to Know About Apache Struts and CVE-2023-50164

Dec 18, 2023
Security
SCA
Introducing JavaScript Reachability and Phantom Dependency Detection
Blog

Introducing JavaScript Reachability and Phantom Dependency Detection

Dec 12, 2023
Security
SCA
Tech
MileIQ securely reimagines a decade old product with Endor Labs
Customer Story

MileIQ Securely Reimagines a Decade Old Product with Endor Labs

Dec 11, 2023
Security
Compliance & SBOM
How CycloneDX VEX Makes Your SBOM Useful
Blog

How CycloneDX VEX Makes Your SBOM Useful

Dec 8, 2023
First Party Code
Security
How to Scan and Prioritize Valid Secrets
Video

How to Scan and Prioritize Valid Secrets - Tutorial

Dec 6, 2023
Security
Compliance & SBOM
SBOM Requirements for Medical Devices
Blog

SBOM Requirements for Medical Devices

Dec 5, 2023
Security
Compliance & SBOM
CISA and NCSC's Take on Secure AI Development
Blog

CISA and NCSC's Take on Secure AI Development

Nov 30, 2023
Security
Open Source
Open Source Security 101: How to Evaluate Your Open Source Security Posture
Blog

Open Source Security 101: How to Evaluate Your Open Source Security Posture

Nov 16, 2023
News
Endor Labs is a CRN 2023 Stellar Startup!
Blog

Endor Labs is a CRN 2023 Stellar Startup!

Nov 13, 2023
SCA
Open Source
How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities
Video

How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial

Nov 9, 2023
SCA
AI/ML
Open Source
Open Source Security for Python and AI Apps
Solution Brief

Open Source Security for Python and AI Apps

Nov 6, 2023
Security
First Party Code
How To Evaluate Secret Detection Tools
Blog

How To Evaluate Secret Detection Tools

Oct 31, 2023
Security
SCA
Why SCA tools can't agree if something is a CVE
Blog

Why SCA Tools Can't Agree if Something is a CVE

Oct 20, 2023
Security
Compliance & SBOM
5 Federal Software Supply Chain Requirements You Should Be Aware Of
Blog

5 Federal Software Supply Chain Requirements You Should Be Aware Of

Oct 16, 2023

Want to stay in the loop?

Sign up for our newsletter.