Introducing the AI coding agent security benchmark
Learn More
Product
Platform
Platform Overview
Developer Tools
Languages & Integrations
Use cases
Code
AI SAST
AI Security Code Review
Secrets Detection
Open Source
Reachability-based SCA
Upgrade Impact Analysis
Malicious Package Detection
AI Model Governance
SBOM & Compliance
Security Patches
Container
Container Security
Artifact Signing
Learn
Resources
Blog
Events
Customer Stories
Ebooks & Reports
Solution Brief
Videos
LeanAppSec
Documentation
Tools
Code Prompt Library
New
TEI Calculator
Risk Explorer
Featured resources
State of Dependency Management 2025
Code Prompt Library
Artifact Signing
SCA for Bazel
SCA for Python and AI Apps
Research
Agent Benchmark
Threat Research
Company
About
About Us
Careers
Partners
News
Customer Stories
Achievements
SOC 2
$93M Series B
Gartner Cool Vendor
CRN Stellar Startup
Intellyx Digital Innovation Award
See How It Works in Action
Book a Demo
LeanAppSec
Pricing
Docs
Login
Book a Demo
Book Demo
Introducing the AI coding agent security benchmark
Learn More
Product
Platform
Platform Overview
Developer Tools
Languages & Integrations
Use cases
Code
AI SAST
AI Security Code Review
Secrets Detection
Open Source
Reachability-based SCA
Upgrade Impact Analysis
Malicious Package Detection
AI Model Governance
SBOM & Compliance
Security Patches
Container
Container Security
Artifact Signing
Learn
Resources
Blog
Events
Customer Stories
Ebooks & Reports
Solution Brief
Videos
LeanAppSec
Documentation
Tools
Code Prompt Library
New
TEI Calculator
Risk Explorer
Featured resources
State of Dependency Management 2025
Code Prompt Library
Artifact Signing
SCA for Bazel
SCA for Python and AI Apps
Research
Agent Benchmark
Threat Research
Company
About
About Us
Careers
Partners
News
Customer Stories
Achievements
SOC 2
$93M Series B
Gartner Cool Vendor
CRN Stellar Startup
Intellyx Digital Innovation Award
See How It Works in Action
Book a Demo
LeanAppSec
Pricing
Docs
Login
Book a Demo
Book Demo
Learn
Learn about software supply chain security and Endor Labs.
Featured resources
Ebook/Report
Beyond Mythos: A CISO's Guide to Building an Effective Software Security Program for the AI Era
Apr 29, 2026
Blog
Claude Opus 4.7 Sets New Records in the Endor Labs Agent Security League
Apr 17, 2026
Blog
Surge in submissions forces NIST to change how it handles CVEs. Here's what it means for vulnerability management.
Apr 17, 2026
Ebook/Report
Agent Security League: Evaluating the Security of AI-Coded Software
Apr 15, 2026
Show filters
Topic
AI/ML
CI/CD
Compliance & SBOM
Developer Productivity
DevSecOps Tools
First Party Code
Malware
News
Open Source
Opinion
SCA
Security
Tech
Medium
Blog
Customer Story
Ebook/Report
Solution Brief
Video
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
News
Blog
Tom Gleason Joins Endor Labs as VP of Customer Solutions
Feb 20, 2024
CI/CD
Compliance & SBOM
Security
Blog
Introducing CI/CD Security with Endor Labs
Feb 14, 2024
Security
Open Source
SCA
Video
How to Improve SCA in GitHub Advanced Security - Tutorial
Feb 5, 2024
Security
Open Source
SCA
Compliance & SBOM
Video
How to Ingest and Manage SBOMs - Tutorial
Jan 30, 2024
Compliance & SBOM
Tech
Customer Story
VMware Achieves SBOM Compliance for Over 100 Services with Endor Labs
Jan 29, 2024
Security
AI/ML
Blog
AI-Supported Environment Debugging for Endor Labs
Jan 25, 2024
Security
Open Source
SCA
Compliance & SBOM
Video
How to Generate SBOM and VEX - Tutorial
Jan 23, 2024
Security
AI/ML
Open Source
Video
How to Use AI for Open Source Selection - Tutorial
Jan 9, 2024
Security
SCA
News
Blog
Introducing a Better Way to SCA for Monorepos and Bazel
Jan 8, 2024
SCA
Security
Opinion
Blog
5 Types of Reachability Analysis (and Which is Right for You)
Jan 2, 2024
Security
Tech
Blog
What’s in a Name? A Look at the Software Identification Ecosystem
Dec 20, 2023
Security
Blog
What You Need to Know About Apache Struts and CVE-2023-50164
Dec 18, 2023
Security
SCA
Blog
Introducing JavaScript Reachability and Phantom Dependency Detection
Dec 12, 2023
Security
SCA
Tech
Customer Story
MileIQ Securely Reimagines a Decade Old Product with Endor Labs
Dec 11, 2023
Security
Compliance & SBOM
Blog
How CycloneDX VEX Makes Your SBOM Useful
Dec 8, 2023
First Party Code
Security
Video
How to Scan and Prioritize Valid Secrets - Tutorial
Dec 6, 2023
Security
Compliance & SBOM
Blog
SBOM Requirements for Medical Devices
Dec 5, 2023
Security
Compliance & SBOM
Blog
CISA and NCSC's Take on Secure AI Development
Nov 30, 2023
Security
Open Source
Blog
Open Source Security 101: How to Evaluate Your Open Source Security Posture
Nov 16, 2023
News
Blog
Endor Labs is a CRN 2023 Stellar Startup!
Nov 13, 2023
SCA
Open Source
Video
How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial
Nov 9, 2023
Previous
1
...
Next
13 / 17
Want to stay in the loop?
Sign up for our newsletter.