Learn

Learn about software supply chain security and Endor Labs.

Featured resources

AI Security Code Review: A Multi-Agent Approach for Detecting Security Design Flaws at Scale
Ebook/Report

AI Security Code Review: A Multi-Agent Approach for Detecting Security Design Flaws at Scale

Apr 23, 2025
Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era
Blog

Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era

Apr 23, 2025
Introducing AI Security Code Review
Blog

Introducing AI Security Code Review

Apr 23, 2025
Meet the application security platform built for the AI era
Blog

Meet the application security platform built for the AI era

Apr 23, 2025
Topic
Medium
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CI/CD
Open Source
Security
Blast Radius of the tj-actions/changed-files Supply Chain Attack
Blog

Blast Radius of the tj-actions/changed-files Supply Chain Attack

Mar 19, 2025
Open Source
Security
Compliance & SBOM
What You Need to Know About UK Cyber Essentials Certification
Blog

What You Need to Know About UK Cyber Essentials Certification

Mar 18, 2025
CI/CD
Open Source
Security
GitHub Action tj-actions/changed-files supply chain attack: what you need to know
Blog

GitHub Action tj-actions/changed-files supply chain attack: what you need to know

Mar 15, 2025
Security
Application Security Posture Management (ASPM) Explained
Blog

Application Security Posture Management (ASPM) Explained

Mar 11, 2025
Open Source
Security
SCA
How Endor Patches Are Built and Tested
Blog

How Endor Patches Are Built and Tested

Feb 18, 2025
Security
Developer Productivity
The AppSec Maturity Staircase: Climbing Faster, Not Harder with Endor Labs
Blog

The AppSec Maturity Staircase: Climbing Faster, Not Harder with Endor Labs

Feb 11, 2025
SCA
Security
Developer Productivity
How to Get Developers to Accept Security PRs Faster
Blog

How to Get Developers to Accept Security PRs Faster

Feb 4, 2025
AI/ML
Open Source
Security
deepseek-r1-what-security-teams-need-to-know
Blog

DeepSeek R1: What Security Teams Need to Know

Jan 29, 2025
AI/ML
SCA
Open Source
How to Discover Open Source AI Models in Your Code
Blog

How to Discover Open Source AI Models in Your Code

Jan 28, 2025
SCA
Open Source
Security
Remote Code Execution Vulnerabilities in Apache Struts
Blog

Remote Code Execution Vulnerabilities in Apache Struts

Jan 24, 2025
Open Source
First Party Code
Everything You Need to Know About Opengrep
Blog

Everything You Need to Know About Opengrep

Jan 23, 2025
SCA
Security
Blog

Uncover Trends and Show AppSec Value with the Endor Labs Dashboard

Jan 21, 2025
Compliance & SBOM
SCA
Security
Blog

Identifying and Tracking FedRAMP False Positives

Jan 14, 2025
Developer Productivity
Open Source
SCA
Security
Blog

How Endor Labs Prioritizes Open Source Security Patches

Jan 7, 2025
Open Source
SCA
Security
Why Reachability Analysis for JavaScript Is Hard (and How We Fixed It)
Blog

Why Reachability Analysis for JavaScript Is Hard (and How We Fixed It)

Dec 17, 2024
Security
Developer Productivity
Compliance & SBOM
Open Source
SCA
Endor Patches whitepaper
Ebook/Report

Endor Patches Whitepaper

Dec 16, 2024
Developer Productivity
Open Source
SCA
Grip Security Reduces Noise by 99%
Customer Story

Grip Security Reduces Noise by 99%

Dec 11, 2024
Developer Productivity
Open Source
Security
SCA
Grip Security Builds Customer Trust with AppSec
Blog

Grip Security Builds Customer Trust with AppSec

Dec 11, 2024
SCA
Developer Productivity
Open Source
The Uncomfortable Truth of Vulnerable and Outdated Software Components
Blog

The Uncomfortable Truth of Vulnerable and Outdated Software Components

Dec 9, 2024
SCA
Open Source
Compliance & SBOM
Reduce FedRAMP Compliance Costs
Solution Brief

Reduce FedRAMP Compliance Costs

Dec 4, 2024
SCA
Security
Blog

Why OVAL Feeds Outperform NVD for Linux Vulnerability Management

Dec 3, 2024
no-results
Sorry, no results matching your search.

Want to stay in the loop?

Sign up for our newsletter.