Learn

Learn about software supply chain security and Endor Labs.

Featured resources

AI Security Code Review: A Multi-Agent Approach for Detecting Security Design Flaws at Scale
Ebook/Report

AI Security Code Review: A Multi-Agent Approach for Detecting Security Design Flaws at Scale

Apr 23, 2025
Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era
Blog

Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era

Apr 23, 2025
Introducing AI Security Code Review
Blog

Introducing AI Security Code Review

Apr 23, 2025
Meet the application security platform built for the AI era
Blog

Meet the application security platform built for the AI era

Apr 23, 2025
Topic
Medium
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
News
Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox
Blog

Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox

Mar 22, 2023
News
Endor Labs Announces 100% Channel Commitment, Launches Global Hyperdrive Program to Arm Resellers and Solution Providers with Unprecedented Software Supply Chain Security
Blog

Announcing the Endor Labs Hyperdrive Program for Resellers and Solution Providers

Mar 16, 2023
News
Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software
Blog

Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software

Mar 6, 2023
SCA
Security
Open Source
OWASP Top 10 Risks for Open Source
Ebook/Report

OWASP Top 10 Risks for Open Source

Mar 1, 2023
Security
Compliance & SBOM
How to quickly measure SBOM accuracy for Maven projects (for free)
Blog

How to Quickly Measure SBOM Accuracy for Maven Projects (for Free)

Feb 28, 2023
Compliance & SBOM
News
Security
Endor Labs is SOC2 Certified!
Blog

Endor Labs is SOC2 Certified!

Feb 9, 2023
SCA
Open Source
Introduction to Open Source Security
Video

Introduction to Open Source Security - Webinar

Feb 3, 2023
SCA
Open Source
Comparing SBOMs Generated at Different Lifecycle Stages
Video

Comparing SBOMs Generated at Different Lifecycle Stages - Webinar

Feb 3, 2023
Security
Compliance & SBOM
SBOM vs. SBOM: Comparing SBOMs from different tools and lifecycle stages
Blog

SBOM vs. SBOM: Comparing SBOMs from Different Tools and Lifecycle Stages

Feb 2, 2023
Developer Productivity
Security
What breaking changes teach us about security
Blog

What Breaking Changes Teach Us about Security

Jan 31, 2023
Compliance & SBOM
Open Source Licensing Simplified: A Comparative Overview of Popular Licenses
Blog

Open Source Licensing Simplified: A Comparative Overview of Popular Licenses

Jan 24, 2023
Security
Compliance & SBOM
What is VEX and why should I care?
Blog

What is VEX and Why Should I Care?

Jan 18, 2023
Security
Open Source
Whatfuscator, malicious open source packages, and other beasts
Blog

Whatfuscator, Malicious Open Source Packages, and Other Beasts

Jan 9, 2023
Security
Exploring Risk: Understanding Software Supply Chain Attacks
Blog

Exploring Risk: Understanding Software Supply Chain Attacks

Jan 5, 2023
News
Endor Labs and Intuitive partner to help enterprises leverage open source software most securely and effectively
Blog

Endor Labs and Intuitive Partner to Help Enterprises Leverage OSS

Jan 2, 2023
SCA
Security
What is reachability-based dependency analysis?
Blog

What is Reachability-Based Dependency Analysis?

Dec 21, 2022
SCA
Security
Open Source
State of Dependency Management 2022
Ebook/Report

State of Dependency Management 2022

Dec 8, 2022
SCA
Open Source
Why We Need Static Analysis When Prioritizing Vulnerabilities
Video

Why We Need Static Analysis When Prioritizing Vulnerabilities - Webinar

Dec 6, 2022
Security
What are Maven dependency scopes and their related security risks?
Blog

What are Maven Dependency Scopes and Their Related Security Risks?

Nov 29, 2022
Security
Compliance & SBOM
Open Source
The Government's Role in Maintaining Open-Source Security
Blog

The Government's Role in Maintaining Open Source Security

Nov 21, 2022
SCA
Security
Introduction to Program Analysis
Blog

Introduction to Program Analysis

Nov 17, 2022
no-results
Sorry, no results matching your search.

Want to stay in the loop?

Sign up for our newsletter.