Search Results

Learn about software supply chain security and Endor Labs

Search all our {count} unique resources
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Jellyfish’s Data-Driven Security Program
chrome_reader_mode
Article

Jellyfish’s Data-Driven Security Program

Learn how Jellyfish’s security team uses a data-driven approach to risk management and the role SCA plays in their strategy.

Jellyfish Enables Data-Driven AppSec with Endor Labs
chrome_reader_mode
Article

Jellyfish Enables Data-Driven AppSec with Endor Labs

Jellyfish replaced Snyk with Endor Labs to improve their ability to identify, prioritize, address, and predict open source risk. Learn more!

What's a Security Pipeline? - On-Demand Webinar
chrome_reader_mode
Article

What's a Security Pipeline? - On-Demand Webinar

Learn about common patterns and tradeoffs for security pipelines in this introductory webinar.

Endor Labs Receives Strategic Investment from Citi Ventures
chrome_reader_mode
Article

Endor Labs Receives Strategic Investment from Citi Ventures

Endor Labs, a leader in software supply chain security, today announced a strategic investment from Citi Ventures.

We made the Inc. Best Workplaces List for 2024!
chrome_reader_mode
Article

We made the Inc. Best Workplaces List for 2024!

Endor Labs is named to Inc.’s annual Best Workplaces list for 2024.

New CocoaPods CVEs: Swift and Objective-C Supply Chains Are Fragile
chrome_reader_mode
Article

New CocoaPods CVEs: Swift and Objective-C Supply Chains Are Fragile

Three CocoaPods CVEs raise serious security concerns for consumers of Swift and Objective-C libraries used for macOS and iOS mobile development.

Questions to Ask Your Software Composition Analysis Vendor
chrome_reader_mode
Article

Questions to Ask Your Software Composition Analysis Vendor

When choosing an SCA tool, you’ll need to understand how the tool generates an inventory, correlates to risks, helps you prioritize results, and integrates into your toolchain.

Managing Open Source Vulnerabilities for PCI DSS Compliance - On-Demand Webinar
chrome_reader_mode
Article

Managing Open Source Vulnerabilities for PCI DSS Compliance - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn about changes to PCI DSS that impact OSS vulnerability management.

Backstage and Endor Labs: AppSec in a Dev’s Dream Workspace
chrome_reader_mode
Article

Backstage and Endor Labs: AppSec in a Dev’s Dream Workspace

The Endor Labs plugins for Backstage create an application security experience that doesn’t require developers to leave Backstage.

Container Scanning + SCA = Better Together
chrome_reader_mode
Article

Container Scanning + SCA = Better Together

We’re excited to announce that Endor Labs now extends our software supply chain platform to include container scanning.

Evaluating and Scoring OSS Packages
chrome_reader_mode
Article

Evaluating and Scoring OSS Packages

How can you tell if an OSS package is “good” or “bad”? A rigorous evaluation model, such as the Endor Score, can help developers make quick and informed decisions.

Endor Labs Named to Rising in Cyber by CISOs and Venture Capital Investors
chrome_reader_mode
Article

Endor Labs Named to Rising in Cyber by CISOs and Venture Capital Investors

Company Recognized for Creating Secure Supply Chains that Improve Application Development Productivity

Demystifying Transitive Dependency Vulnerabilities
chrome_reader_mode
Article

Demystifying Transitive Dependency Vulnerabilities

95% of vulnerabilities are found in transitive dependencies. Learn how they’re unique from direct dependencies and how to incorporate them into your risk management program.

Surprise! Your GitHub Actions Are Dependencies, Too
chrome_reader_mode
Article

Surprise! Your GitHub Actions Are Dependencies, Too

GitHub Actions are open source dependencies - secure them accordingly! Learn how to effectively manage the security risks associated with GitHub Actions with a proactive approach focusing on three key areas: visibility, hardening, and dependency management.

Endor Labs Partners with GuidePoint Security to Secure The Software Supply Chain
chrome_reader_mode
Article

Endor Labs Partners with GuidePoint Security to Secure The Software Supply Chain

Protect Mobile Apps with Kotlin and Swift SCA
chrome_reader_mode
Article

Protect Mobile Apps with Kotlin and Swift SCA

Learn about the mobile application threat landscape and how you can protect mobile apps from security and legal risk associated with open source software with Endor Labs Open Source.

OSS Vulnerabilities and the Digital Operational Resilience Act (DORA)
chrome_reader_mode
Article

OSS Vulnerabilities and the Digital Operational Resilience Act (DORA)

Learn how your organization can achieve DORA compliance for managing open source software vulnerabilities with reachability-based SCA, SBOMs, and more.

Intro to Endor Labs - On-Demand Webinar
chrome_reader_mode
Article

Intro to Endor Labs - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn how to Endor Labs supports a Software Supply Chain Security program.

 OWASP OSS Risk 1: Known Vulnerabilities
chrome_reader_mode
Article

OWASP OSS Risk 1: Known Vulnerabilities

Known vulnerabilities are a well-understood software risk…but managing and prioritizing them is anything but simple. Learn about key considerations when building a program to detect and remediate CVEs.

Low-Code/No Code Artifact Signing
chrome_reader_mode
Article

Low-Code/No Code Artifact Signing

A low-code/no code artifact signing solution makes it easy to implement an enterprise solution for verifying authenticity of software artifacts and tracing their origins.

An Auditor’s Perspective on Addressing OSS Vulnerabilities for PCI DSS v4
chrome_reader_mode
Article

An Auditor’s Perspective on Addressing OSS Vulnerabilities for PCI DSS v4

Learn how your organization can achieve PCI DSS v4 compliance for managing open source software vulnerabilities with reachability-based SCA and more.

Guide to Implementing Software Supply Chain Security
chrome_reader_mode
Article

Guide to Implementing Software Supply Chain Security

In this free guide, experts answer key questions like "what is it?", "why is it important?", "and how do I secure it?" so you can make informed decisions and thoughtfully design your organization's SSCS program.

Your Git Repo is a Supply Chain Risk
chrome_reader_mode
Article

Your Git Repo is a Supply Chain Risk

Source code repository misconfigurations can expose your organization to supply chain attacks. Repository Security Posture Management (RSPM) can offer a reliable system to enforce best practices.

Improve Kubernetes Security with Signed Artifacts and Admission Controllers
chrome_reader_mode
Article

Improve Kubernetes Security with Signed Artifacts and Admission Controllers

Control which images get deployed in Kubernetes by configuring an admission controller to admit only those which have been signed by Endor Labs.

AppSec Goes to Devnexus: Lessons from a Thriving, Modern Java Community
chrome_reader_mode
Article

AppSec Goes to Devnexus: Lessons from a Thriving, Modern Java Community

What happens when an AppSec professional attends a Java conference? Great conversations on productivity, tool pain, AI/ML, and vulnerability management.

Artifact Signing 101 - On-Demand Webinar
chrome_reader_mode
Article

Artifact Signing 101 - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn using strong cryptographic artifact signatures to enable strong admission control, provenance, and traceability that support effective security, quality, and compliance programs.

XZ Backdoor: How to Prepare for the Next One
chrome_reader_mode
Article

XZ Backdoor: How to Prepare for the Next One

While it’s improbable to prevent all exposure to supply chain risks, organizations can absolutely focus on a strategy to reduce the probability of successful attacks and reduce the time it takes them to respond to such threats.

XZ is A Wake Up Call For Software Security: Here's Why
chrome_reader_mode
Article

XZ is A Wake Up Call For Software Security: Here's Why

The xz backdoor shines a light on everything we're doing wrong in software supply chain security. Get an overview of the incident, what we can learn from it, and what we can do about it.

SSDF Compliance and Attestation
chrome_reader_mode
Article

SSDF Compliance and Attestation

Learn ways to comply with SSDF requirements for secure environments, trusted source code supply chains, code and artifact provenance, and vulnerabilities.

You Have a Shadow Pipeline Problem
chrome_reader_mode
Article

You Have a Shadow Pipeline Problem

Learn how to establish automated CI/CD controls to reveal what’s running in your pipelines and which configs don’t align with risk and compliance requirements.

Remediating Vulnerabilities vs. Maintaining Current Dependencies
chrome_reader_mode
Article

Remediating Vulnerabilities vs. Maintaining Current Dependencies

Learn about the pros and cons of maintaining current dependencies, backed by a TU Delft study on 262 Java projects on Github

Prioritizing SCA Findings with Reachability Analysis - On-Demand Webinar
chrome_reader_mode
Article

Prioritizing SCA Findings with Reachability Analysis - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn how reachability analysis works.

Signing Your Artifacts For Security, Quality, and Compliance
chrome_reader_mode
Article

Signing Your Artifacts For Security, Quality, and Compliance

Code Signing and other Artifact Signing enable application provenance to enhance admission control, incident response, and other essential capabilities.

Detect Malicious Packages Among Your Open Source Dependencies
chrome_reader_mode
Article

Detect Malicious Packages Among Your Open Source Dependencies

Learn about emerging malicious code trends, including typosquatting and dependency confusion attacks, and two techniques for detecting malware in your applications.

Tom Gleason Joins Endor Labs as VP of Customer Solutions
chrome_reader_mode
Article

Tom Gleason Joins Endor Labs as VP of Customer Solutions

Tom Gleason is a security enthusiast with a knack for building and leading technically-focused customer teams. Formerly at Snyk, Akamai, and Palo Alto Networks, Tom joins Endor Labs to lead Customer Solutions.

Introducing CI/CD Security with Endor Labs
chrome_reader_mode
Article

Introducing CI/CD Security with Endor Labs

Endor Labs CI/CD helps organizations secure their pipelines through pipeline discovery, repository security posture management, and build integrity verification (artifact signing).

How to Improve SCA in GitHub Advanced Security - Tutorial
chrome_reader_mode
Article

How to Improve SCA in GitHub Advanced Security - Tutorial

In this short video we demonstrate how to use Endor Labs and GitHub Advanced Security to manage and prioritize open source risk.

How to Ingest and Manage SBOMs - Tutorial
chrome_reader_mode
Article

How to Ingest and Manage SBOMs - Tutorial

In this short video we demonstrate how to ingest 1st and 3rd party software bills of material, manage them centrally, and detect new vulnerabilities in a timely manner.

VMware Achieves SBOM Compliance for Over 100 Services with Endor Labs
chrome_reader_mode
Article

VMware Achieves SBOM Compliance for Over 100 Services with Endor Labs

Learn how the VMWare compliance team built a a scalable process to collect and attest to SBOMs using Endor Labs.

AI-Supported Environment Debugging for Endor Labs
chrome_reader_mode
Article

AI-Supported Environment Debugging for Endor Labs

Testing and installing new security tools is painful. Using generative AI, DroidGPT by Endor Labs makes it easy to troubleshoot and even prevent compatibility errors when installing the platform.

How to Generate SBOM and VEX - Tutorial
chrome_reader_mode
Article

How to Generate SBOM and VEX - Tutorial

In this short video we demonstrate how to use Endor Labs to produce SBOM and VEX documents.

How to Use AI for Open Source Selection - Tutorial
chrome_reader_mode
Article

How to Use AI for Open Source Selection - Tutorial

In this short video we demonstrate how to use DroidGPT to research open source packages in a conversational manner.

Introducing a Better Way to SCA for Monorepos and Bazel
chrome_reader_mode
Article

Introducing a Better Way to SCA for Monorepos and Bazel

Endor Labs’ reachability-based SCA now supports Bazel so you can get fully accurate results without any of the messy workarounds usually required for monorepos.

5 Types of Reachability Analysis (and Which is Right for You)
chrome_reader_mode
Article

5 Types of Reachability Analysis (and Which is Right for You)

Explore the five key categories of reachability and their practical applications in AppSec and development. Learn the differences between SCA and container scanning, and understand how various tools like Function-Level Reachability, Package Baselining, and Internet Reachability play crucial roles in identifying and prioritizing security risks.

What’s in a Name? A Look at the Software Identification Ecosystem
chrome_reader_mode
Article

What’s in a Name? A Look at the Software Identification Ecosystem

Learn best practices for a proper software identification ecosystem that supports asset inventory, version control, vulnerability management, incident response, and more.

What You Need to Know About Apache Struts and CVE-2023-50164
chrome_reader_mode
Article

What You Need to Know About Apache Struts and CVE-2023-50164

Discover the critical details of CVE-2023-50164, a severe vulnerability in Apache Struts.

Introducing JavaScript Reachability and Phantom Dependency Detection
chrome_reader_mode
Article

Introducing JavaScript Reachability and Phantom Dependency Detection

Endor Labs’ JavaScript SCA capabilities cut down noise with a program analysis approach that outperforms manifest scanning SCA tools like Snyk, Veracode, and BlackDuck.

MileIQ Securely Reimagines a Decade Old Product with Endor Labs
chrome_reader_mode
Article

MileIQ Securely Reimagines a Decade Old Product with Endor Labs

Lean MileIQ, the #1 mileage tracking app, selected Endor Labs to help their security and engineering teams focus on the software supply chain risks that actually matter.

How CycloneDX VEX Makes Your SBOM Useful
chrome_reader_mode
Article

How CycloneDX VEX Makes Your SBOM Useful

Explore the challenges of modern vulnerability management and the efficiency of the Vulnerability Exploitability eXchange (VEX) in our latest blog post. Learn how VEX helps identify and communicate the true exploitability of vulnerabilities, streamlining cybersecurity efforts in the face of overwhelming scanner findings.

How to Scan and Prioritize Valid Secrets - Tutorial
chrome_reader_mode
Article

How to Scan and Prioritize Valid Secrets - Tutorial

In this short video we demonstrate how to use Endor Labs to discover if your organization has leaked valid secrets and provide developers with instructions for resolving the leak.

SBOM Requirements for Medical Devices
chrome_reader_mode
Article

SBOM Requirements for Medical Devices

Learn about the 2023 FDA rule for medical devices, including requirements for SBOMs, a mitigation plan, and secure software development practices.

CISA and NCSC's Take on Secure AI Development
chrome_reader_mode
Article

CISA and NCSC's Take on Secure AI Development

A breakdown of the "Guidelines for Secure AI System Development document from CISA and NCSC.

Open Source Security 101: How to Evaluate Your Open Source Security Posture
chrome_reader_mode
Article

Open Source Security 101: How to Evaluate Your Open Source Security Posture

Organizations need to evolve their approach to using open source securely. Find four fundamental considerations to consider when it comes to securely using OSS.

Endor Labs is a CRN 2023 Stellar Startup!
chrome_reader_mode
Article

Endor Labs is a CRN 2023 Stellar Startup!

CRN®, a brand of The Channel Company, has named Endor Labs to its 2023 Stellar Startups list in the Security category. Learn more about the list and us here.

Static SCA vs. Dynamic SCA: Which is Better (and Why it’s Neither)
chrome_reader_mode
Article

Static SCA vs. Dynamic SCA: Which is Better (and Why it’s Neither)

Software composition analysis (SCA) tools take a static or dynamic approach. Learn the pros and cons of each option and see how the results differ.

How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial
chrome_reader_mode
Article

How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities - Tutorial

In this short video we demonstrate how to use Endor Labs for reachability-based SCA and noise reduction.

Open Source Security for Python and AI Apps
chrome_reader_mode
Article

Open Source Security for Python and AI Apps

Gain visibility into your hidden Python dependencies and prioritize reachable, exploitable risks.

How To Evaluate Secret Detection Tools
chrome_reader_mode
Article

How To Evaluate Secret Detection Tools

An overview of 3 requirements for a secret detection program, and how to do it with Endor Labs.

Why SCA Tools Can't Agree if Something is a CVE
chrome_reader_mode
Article

Why SCA Tools Can't Agree if Something is a CVE

One scanner says this is a CVE, and the other says it's not. Which is right?

5 Federal Software Supply Chain Requirements You Should Be Aware Of
chrome_reader_mode
Article

5 Federal Software Supply Chain Requirements You Should Be Aware Of

If you’ve been watching the software supply chain security space evolve, you likely know that a lot of the momentum and effort is coming out of the U.S. Federal government. This may seem surprising at first, but it shouldn’t be, when you account for the fact that the Federal government is one of the single largest procurers of technology and software in the world. 

You Found Vulnerabilities in Your Dependencies, Now What?
chrome_reader_mode
Article

You Found Vulnerabilities in Your Dependencies, Now What?

Third-party open source dependencies offer convenience but also pose a significant security risk. Learn how tools like Endor Labs can detect & address vulnerabilities here.

Dependency Resolution in Python: Beware The Phantom Dependency
chrome_reader_mode
Article

Dependency Resolution in Python: Beware The Phantom Dependency

Phantom dependencies are dependencies used by your code that are not declared in the manifest. If you miss them, they can sneak reachable risks into your application, lead to false positives, or inaccurate SBOMs. All very spooky. This article breaks down how phantom dependencies happen, and how to catch them.

Chris Hughes Joins Endor Labs as Chief Security Advisor
chrome_reader_mode
Article

Chris Hughes Joins Endor Labs as Chief Security Advisor

Chris Hughes brings nearly 20 years of IT and cybersecurity experience to his role as Chief Security Advisor. Learn what made him choose Endor Labs.

Understanding Python Manifest Files
chrome_reader_mode
Article

Understanding Python Manifest Files

In this blog, we delve into the various Python manifest files used to declare dependencies and how they collaborate seamlessly.

Why Your SCA is Always Wrong
chrome_reader_mode
Article

Why Your SCA is Always Wrong

A breakdown of why your SCA results are always so full of false positives (and sometimes false negatives), and why treating source code as a first class citizen can lead us to the solution.

Endor Labs Named 2023 SINET16 Innovator Award Winner
chrome_reader_mode
Article

Endor Labs Named 2023 SINET16 Innovator Award Winner

SINET, an organization with the mission to accelerate Cybersecurity innovation through public-private partnerships, announced today that Endor Labs is one of the winners of its annual SINET16 Innovator Award. Endor Labs and 15 other emerging companies are identified as the most innovative and compelling technologies in their fields to address Cybersecurity threats and vulnerabilities.

Combining EPSS and Reachability Analysis to Optimize Vulnerability Management
chrome_reader_mode
Article

Combining EPSS and Reachability Analysis to Optimize Vulnerability Management

Exploit Prediction Scoring Systems (EPSS) is a data set that helps you understand the likelihood that a CVE will be exploited. Learn what the EPSS includes and how to use it to prioritize vulnerability remediation.

Introducing Reachability-Based SCA for Python, Go, and C#
chrome_reader_mode
Article

Introducing Reachability-Based SCA for Python, Go, and C#

Announcing new language support for Endor Labs Open Source

Reachability Analysis for Python, Go, C# - Webinar
chrome_reader_mode
Article

Reachability Analysis for Python, Go, C# - Webinar

In this on-demand webinar, get an in-depth reachability analysis for Python, Go, and C#. Watch now.

The Open Source Security Index Top 5
chrome_reader_mode
Article

The Open Source Security Index Top 5

What’s the best of the best when it comes to open source security tools?We’ve previously talked about the OpenSSF Scorecard, which gives developers a high-level snapshot of the security of any given open source project. But in this post, we’ll talk about a related project, the Open Source Security Index (OSSI), which does something slightly different and complementary.

Faster SCA with Endor Labs and npm Workspaces
chrome_reader_mode
Article

Faster SCA with Endor Labs and npm Workspaces

As projects grow larger and more complex, developers face challenges in maintaining a clean and efficient development workflow. Fortunately, npm workspaces offer an essential solution to streamline JavaScript development. In this blog post, we will explore the concept of npm/yarn workspaces, its importance, and how Endor Labs works with them.

Endor Labs & Github Advanced Security: AppSec Without The Productivity Tax
chrome_reader_mode
Article

Endor Labs & Github Advanced Security: AppSec Without The Productivity Tax

Endor Labs integrates with GitHub Advanced Security to enable developers to easily view and remediate SCA alerts without ever needing to leave GitHub.

Key Questions for Your SBOM Program
chrome_reader_mode
Article

Key Questions for Your SBOM Program

All the questions (and some of the answers) you need before kicking off your SBOM program.

Endor Labs Raises $70M in Series A Funding to Reform Application Security
chrome_reader_mode
Article

Endor Labs Raises $70M in Series A Funding to Reform Application Security

Endor Labs raises a total of $70M to achieve application security without the developer productivity tax. Here's what we're doing, and where we're going.

How Should I Prioritize Software Vulnerabilities?
chrome_reader_mode
Article

How Should I Prioritize Software Vulnerabilities?

CVSS, KEV, SVCC, EPSS, and reachability analysis are 5 method used to prioritize open source vulnerabilities for remediation. Do you need all 5? Which is the best? It turns out a combination of factors (and a tool that can bring it all together) is the best solution.

Divide and Hide: How Malicious Code Lived on PyPI for 3 months
chrome_reader_mode
Article

Divide and Hide: How Malicious Code Lived on PyPI for 3 months

The Station 9 research team discovered malicious code that was divided and distributed across different packages, remaining obfuscated for months while getting nearly 2000 downloads.

State of Dependency Management 2023
chrome_reader_mode
Article

State of Dependency Management 2023

Emerging trends impacting open source dependency management

Endor Labs’ ‘State of Dependency Management 2023’ Report Offers Insight on Explosive Popularity of AI and LLMs—and How They Impact Application Security
chrome_reader_mode
Article

Endor Labs’ ‘State of Dependency Management 2023’ Report Offers Insight on Explosive Popularity of AI and LLMs—and How They Impact Application Security

The State of Dependency Management 2023 reports on the latest research on dependency management and how AI is impacting the application security landscape.

Endor Labs Recognized as a Cool Vendor in the 2023 Gartner® Cool Vendors™ in Platform Engineering for Scaling Application Security Practices
chrome_reader_mode
Article

Endor Labs Recognized as a Cool Vendor in the 2023 Gartner® Cool Vendors™ in Platform Engineering for Scaling Application Security Practices

Endor Labs is committed to providing cutting-edge solutions that address the challenges faced by platform engineering and DevSecOps teams in meeting application security needs.

Visualizing the Impact of Call Graphs on Open Source Security
chrome_reader_mode
Article

Visualizing the Impact of Call Graphs on Open Source Security

A call graph is a visualization of invocation of vulnerable open source methods by a given client. Learn how to use call graphs to understand relevancy and impact of vulnerabilities.

Why Different SCA Tools Produce Different Results
chrome_reader_mode
Article

Why Different SCA Tools Produce Different Results

Like anything in computer science and programming, there’s more than one way to solve a problem or get a result. SCA (software composition analysis) is no different.

Strengthening Security in .NET Development with packages.lock.json
chrome_reader_mode
Article

Strengthening Security in .NET Development with packages.lock.json

Learn how packages.lock.json can help maintain a secure .NET development and why it should be part of your development workflow.

How Security and Engineering Can Scale Open Source Security - Webinar
chrome_reader_mode
Article

How Security and Engineering Can Scale Open Source Security - Webinar

In this on-demand video we discuss open source dependency management and considerations for implementing AppSec programs to protect OSS.

Highlights from State of Dependency Management 2022 - Webinar
chrome_reader_mode
Article

Highlights from State of Dependency Management 2022 - Webinar

In this on-demand webinar we discuss the key research findings from our 2022 report "State of Dependency Management."

Endor Labs is SOC 2 Type II Certified!
chrome_reader_mode
Article

Endor Labs is SOC 2 Type II Certified!

Proving once again open source governance doesn’t have to SOC, yes I made that joke again and I’m not sorry. We’re excited to announce we have received a clean audit result on our SOC2 Type II certification.

Reviewing Malware with LLMs: OpenAI vs. Vertex AI
chrome_reader_mode
Article

Reviewing Malware with LLMs: OpenAI vs. Vertex AI

At Endor Labs, we continue evaluating the use of large language models (LLMs) for all kinds of use-cases related to application security. And we continue to be amazed about high-quality responses … until we’re amused about the next laughably wrong answer.

Endor Labs Wins Intellyx Digital Innovation Award
chrome_reader_mode
Article

Endor Labs Wins Intellyx Digital Innovation Award

We've been named a winner of the 2023 Intellyx Digital Innovator Award, recognizing technology providers driving enterprise digital transformation. Learn more.

Endor Labs Recognized As a 2023 Bay Area Best Place to Work
chrome_reader_mode
Article

Endor Labs Recognized As a 2023 Bay Area Best Place to Work

I mean, who wouldn't want to work with a bunch of Ewoks?

Make Developers' Lives Easier with Endor Labs & GitHub Advanced Security
chrome_reader_mode
Article

Make Developers' Lives Easier with Endor Labs & GitHub Advanced Security

Developers are bombarded with information every day. Constant context switching and information overload are among the biggest barriers to productivity. There are simply too many demands for their attention. One day the sales team will understand. Right?

LLM-assisted Malware Review: AI and Humans Join Forces to Combat Malware
chrome_reader_mode
Article

LLM-assisted Malware Review: AI and Humans Join Forces to Combat Malware

Experiments with GPT-3.5 suggest that LLM-based malware reviews can complement, but not yet substitute human reviews. 1800 binary classifications performed with GPT-3.5 included false-positives and false-negatives.

Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox
chrome_reader_mode
Article

Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox

Endor Labs recognized for innovation in helping enterprises manage open source risk.

Announcing the Endor Labs Hyperdrive Program for Resellers and Solution Providers
chrome_reader_mode
Article

Announcing the Endor Labs Hyperdrive Program for Resellers and Solution Providers

The Hyperdrive partner program enables organizations of all sizes to embrace open source software with confidence.

Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software
chrome_reader_mode
Article

Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software

We’re excited to announce our latest partnership with Zinfinity as a strategic partner. Zinfinity is a global provider of technology solutions and services with a focus on Cyber Security, Cloud and Digital Infrastructure.

OWASP Top 10 Risks for Open Source
chrome_reader_mode
Article

OWASP Top 10 Risks for Open Source

Emerging trends impacting open source dependency management

How to Quickly Measure SBOM Accuracy for Maven Projects (for Free)
chrome_reader_mode
Article

How to Quickly Measure SBOM Accuracy for Maven Projects (for Free)

SBOM-Lab is an open source tool that lets you quickly compare SBOM generation methods for Maven projects and find the right one for you.

Endor Labs is SOC2 Certified!
chrome_reader_mode
Article

Endor Labs is SOC2 Certified!

Open Source security doesn't have to SOC (sorry, I had to). We're excited to announce we have received a clean audit result on our SOC2 Type 1 certification.

Comparing SBOMs Generated at Different Lifecycle Stages - Webinar
chrome_reader_mode
Article

Comparing SBOMs Generated at Different Lifecycle Stages - Webinar

In this on-demand webinar, we share research on the variation in SBOMs depending on tool and when the documents are generated.

Introduction to Open Source Security - Webinar
chrome_reader_mode
Article

Introduction to Open Source Security - Webinar

In this on-demand webinar we help you understand the basics of dependency management and how they can be vulnerable to security risks.

SBOM vs. SBOM: Comparing SBOMs from Different Tools and Lifecycle Stages
chrome_reader_mode
Article

SBOM vs. SBOM: Comparing SBOMs from Different Tools and Lifecycle Stages

Software vendors active in certain verticals will soon be required to provide customers with SBOMs for their products. But how and when should an SBOM for a given piece of software be produced?

What Breaking Changes Teach Us about Security
chrome_reader_mode
Article

What Breaking Changes Teach Us about Security

GitHub rolled out a release that had some breaking changes to Git. Here's what we learned from it.

no-results
Sorry, no results matching your search.

Get a Free Trial

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.
Try the Endor Labs Software Supply Chain Security platform for 30 days.