Learn

Learn about software supply chain security and Endor Labs.

Featured resources

Ebook/Report

A Practitioner’s Guide to Responding to the TeamPCP Supply Chain Attacks

Mar 27, 2026
AURI: Security Intelligence for Agentic Software Development
Solution Brief

AURI: Security Intelligence for Agentic Software Development

Mar 19, 2026
How the EU Cyber Resilience Act (CRA) rewrites the rules of software liability
Blog

How the EU Cyber Resilience Act (CRA) rewrites the rules of software liability

Mar 13, 2026
Introducing AURI: Security Intelligence for AI Coding Agents and Developers
Blog

Introducing AURI: Security Intelligence for AI Coding Agents and Developers

Mar 3, 2026
Topic
Medium
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
News
Endor Labs is a CRN 2023 Stellar Startup!
Blog

Endor Labs is a CRN 2023 Stellar Startup!

Nov 13, 2023
SCA
Open Source
How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities
Video

How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial

Nov 9, 2023
SCA
AI/ML
Open Source
Open Source Security for Python and AI Apps
Solution Brief

Open Source Security for Python and AI Apps

Nov 6, 2023
Security
First Party Code
How To Evaluate Secret Detection Tools
Blog

How To Evaluate Secret Detection Tools

Oct 31, 2023
Security
SCA
Why SCA tools can't agree if something is a CVE
Blog

Why SCA Tools Can't Agree if Something is a CVE

Oct 20, 2023
Security
Compliance & SBOM
5 Federal Software Supply Chain Requirements You Should Be Aware Of
Blog

5 Federal Software Supply Chain Requirements You Should Be Aware Of

Oct 16, 2023
Security
SCA
You found vulnerabilities in your dependencies, now what?
Blog

You Found Vulnerabilities in Your Dependencies, Now What?

Oct 6, 2023
SCA
Dependency Resolution in Python: Beware The Phantom Dependency
Blog

Dependency Resolution in Python: Beware The Phantom Dependency

Sep 28, 2023
News
Chris Hughes Joins Endor Labs as Chief Security Advisor
Blog

Chris Hughes Joins Endor Labs as Chief Security Advisor

Sep 26, 2023
Developer Productivity
SCA
Understanding Python Manifest Files: Part 1
Blog

Understanding Python Manifest Files

Sep 20, 2023
SCA
Why Your SCA is Always Wrong
Blog

Why Your SCA is Always Wrong

Sep 12, 2023
Security
Endor Labs Named 2023 SINET16 Innovator Award Winner
Blog

Endor Labs Named 2023 SINET16 Innovator Award Winner

Sep 7, 2023
Security
SCA
Combining the Exploit Prediction Scoring System (EPSS) with reachability analysis to optimize your vulnerability management program
Blog

Combining EPSS and Reachability Analysis to Optimize Vulnerability Management

Sep 6, 2023
SCA
Open Source
Reachability Analysis for Python, Go, C#
Video

Reachability Analysis for Python, Go, C# - Webinar

Sep 5, 2023
Security
SCA
News
Introducing SCA reachability analysis for Python, Go, and C#
Blog

Introducing Reachability-Based SCA for Python, Go, and C#

Sep 5, 2023
Security
Open Source
The Open Source Security Index Top 5
Blog

The Open Source Security Index Top 5

Aug 29, 2023
Security
SCA
Faster SCA with Endor Labs and npm workspaces
Blog

Faster SCA with Endor Labs and npm Workspaces

Aug 28, 2023
Security
Compliance & SBOM
Key questions for your SBOM program
Blog

Key Questions for Your SBOM Program

Aug 7, 2023
Security
SCA
Endor Labs & Github Advanced Security: AppSec Without The Productivity Tax
Blog

Endor Labs & Github Advanced Security: AppSec Without The Productivity Tax

Aug 7, 2023
News
SCA
Endor Labs raises $70M in series A funding to reform application security
Blog

Endor Labs Raises $70M in Series A Funding to Reform Application Security

Aug 3, 2023
Security
SCA
How should I prioritize software vulnerabilities?
Blog

How Should I Prioritize Software Vulnerabilities?

Jul 28, 2023

Want to stay in the loop?

Sign up for our newsletter.