Learn

Learn about software supply chain security and Endor Labs.

Featured resources

Introducing AURI: Security Intelligence for AI Coding Agents and Developers
Blog

Introducing AURI: Security Intelligence for AI Coding Agents and Developers

Mar 3, 2026
How AI SAST Traced Data Flows to Uncover Six OpenClaw Vulnerabilities
Blog

How AI SAST Traced Data Flows to Uncover Six OpenClaw Vulnerabilities

Feb 18, 2026
Introducing Full Stack Reachability: Container Scanning That Actually Reduces Noise
Blog

Introducing Full Stack Reachability: Container Scanning That Actually Reduces Noise

Feb 11, 2026
Context Engineering for Application Security Whitepaper
Ebook/Report

Context Engineering for Application Security

Feb 10, 2026
Topic
Medium
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security
What you need to know about Apache Struts and CVE-2023-50164
Blog

What You Need to Know About Apache Struts and CVE-2023-50164

Dec 18, 2023
Security
SCA
Introducing JavaScript Reachability and Phantom Dependency Detection
Blog

Introducing JavaScript Reachability and Phantom Dependency Detection

Dec 12, 2023
Security
SCA
Tech
MileIQ securely reimagines a decade old product with Endor Labs
Customer Story

MileIQ Securely Reimagines a Decade Old Product with Endor Labs

Dec 11, 2023
Security
Compliance & SBOM
How CycloneDX VEX Makes Your SBOM Useful
Blog

How CycloneDX VEX Makes Your SBOM Useful

Dec 8, 2023
First Party Code
Security
How to Scan and Prioritize Valid Secrets
Video

How to Scan and Prioritize Valid Secrets - Tutorial

Dec 6, 2023
Security
Compliance & SBOM
SBOM Requirements for Medical Devices
Blog

SBOM Requirements for Medical Devices

Dec 5, 2023
Security
Compliance & SBOM
CISA and NCSC's Take on Secure AI Development
Blog

CISA and NCSC's Take on Secure AI Development

Nov 30, 2023
Security
Open Source
Open Source Security 101: How to Evaluate Your Open Source Security Posture
Blog

Open Source Security 101: How to Evaluate Your Open Source Security Posture

Nov 16, 2023
News
Endor Labs is a CRN 2023 Stellar Startup!
Blog

Endor Labs is a CRN 2023 Stellar Startup!

Nov 13, 2023
SCA
Open Source
How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities
Video

How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial

Nov 9, 2023
SCA
AI/ML
Open Source
Open Source Security for Python and AI Apps
Solution Brief

Open Source Security for Python and AI Apps

Nov 6, 2023
Security
First Party Code
How To Evaluate Secret Detection Tools
Blog

How To Evaluate Secret Detection Tools

Oct 31, 2023
Security
SCA
Why SCA tools can't agree if something is a CVE
Blog

Why SCA Tools Can't Agree if Something is a CVE

Oct 20, 2023
Security
Compliance & SBOM
5 Federal Software Supply Chain Requirements You Should Be Aware Of
Blog

5 Federal Software Supply Chain Requirements You Should Be Aware Of

Oct 16, 2023
Security
SCA
You found vulnerabilities in your dependencies, now what?
Blog

You Found Vulnerabilities in Your Dependencies, Now What?

Oct 6, 2023
SCA
Dependency Resolution in Python: Beware The Phantom Dependency
Blog

Dependency Resolution in Python: Beware The Phantom Dependency

Sep 28, 2023
News
Chris Hughes Joins Endor Labs as Chief Security Advisor
Blog

Chris Hughes Joins Endor Labs as Chief Security Advisor

Sep 26, 2023
Developer Productivity
SCA
Understanding Python Manifest Files: Part 1
Blog

Understanding Python Manifest Files

Sep 20, 2023
SCA
Why Your SCA is Always Wrong
Blog

Why Your SCA is Always Wrong

Sep 12, 2023
Security
Endor Labs Named 2023 SINET16 Innovator Award Winner
Blog

Endor Labs Named 2023 SINET16 Innovator Award Winner

Sep 7, 2023
Security
SCA
Combining the Exploit Prediction Scoring System (EPSS) with reachability analysis to optimize your vulnerability management program
Blog

Combining EPSS and Reachability Analysis to Optimize Vulnerability Management

Sep 6, 2023

Want to stay in the loop?

Sign up for our newsletter.