Search Results

Learn about software supply chain security and Endor Labs

Search all our {count} unique resources
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Nx build platform compromised by supply chain attack – How attackers collude with AI code assistants
chrome_reader_mode
Article

Nx build platform compromised by supply chain attack – How attackers collude with AI code assistants

Nx supply chain attack: malicious npm versions of Nx exfiltrated SSH keys and tokens to GitHub—abusing AI code assistants. Learn how to detect and fix.

A Practical Guide to AI and Application Security
chrome_reader_mode
Article

A Practical Guide to AI and Application Security

As AI reshapes software development, security teams can be the catalyst for unlocking productivity without sacrificing safety.

How We Cracked SCA for C/C++ Codebases
chrome_reader_mode
Article

How We Cracked SCA for C/C++ Codebases

Endor Labs improves C/C++ SCA by combining cryptographic hashing, code embeddings, and a curated index for accurate dependency and vulnerability detection.

When CodeRabbit became PwnedRabbit: A cautionary tale for every GitHub App vendor (and their customers)
chrome_reader_mode
Article

When CodeRabbit became PwnedRabbit: A cautionary tale for every GitHub App vendor (and their customers)

Kudelski Security uncovered an RCE flaw in CodeRabbit exposing 1M+ repos. Here’s what happened, how it was fixed, and key lessons for secure AI apps.

Shadow AI in Your Codebase: A Hidden Supply Chain Risk
chrome_reader_mode
Article

Shadow AI in Your Codebase: A Hidden Supply Chain Risk

Unvetted AI models and services are entering your codebase. Do you have a plan to find and govern them?

Five9 Transforms Software Supply Chain Security with Endor Labs
chrome_reader_mode
Article

Five9 Transforms Software Supply Chain Security with Endor Labs

Five9 uses Endor Labs’ SCA to ensure they focus on just the risks that matter and can respond quickly to zero days.

Under the Hood: How I Vet Early-Stage Startups for Critical Security Programs
chrome_reader_mode
Article

Under the Hood: How I Vet Early-Stage Startups for Critical Security Programs

Greg Pettengill, a Principal Product Security Engineer at Five9, is an early adopter of startup technology. In this article he shares his methodology for picking vendors that can deliver on promises.

Detect End-of-Life (EOL) Software in Containers with Endor Labs
chrome_reader_mode
Article

Detect End-of-Life (EOL) Software in Containers with Endor Labs

Endor Labs now detects end-of-life (EOL) software in containers, helping AppSec teams eliminate risk early.

The Most Common Security Vulnerabilities in AI-Generated Code
chrome_reader_mode
Article

The Most Common Security Vulnerabilities in AI-Generated Code

Learn about the most common and emerging security risks of AI-generated code, from injection flaws to hallucinated dependencies.

The Last Mile of AI Productivity Is Code Review
chrome_reader_mode
Article

The Last Mile of AI Productivity Is Code Review

Developers are generating more code with AI coding assistants, but release velocity isn’t increasing. Here’s how to fix it.

How to Detect LLM Prompt Injection Risks
chrome_reader_mode
Article

How to Detect LLM Prompt Injection Risks

Learn how to detect prompt injection vulnerabilities in GenAI applications and prevent attackers from exploiting LLM-powered workflows.

Why Your AI Code Assistant Might Be Shipping CVEs
chrome_reader_mode
Article

Why Your AI Code Assistant Might Be Shipping CVEs

LLMs often recommend outdated or vulnerable open source packages—here’s why it happens, why it matters, and how AppSec and DevOps leaders can stay ahead.

Anti-Pattern Avoidance: A Simple Prompt Pattern for Safer AI-Generated Code
chrome_reader_mode
Article

Anti-Pattern Avoidance: A Simple Prompt Pattern for Safer AI-Generated Code

How CWE-specific prompts cut LLM code vulnerabilities by more than half.

Endor Labs now integrates with GitHub Copilot in VS Code
chrome_reader_mode
Article

Endor Labs now integrates with GitHub Copilot in VS Code

Secure AI-generated code at the source with a new integration for GitHub Copilot powered by the Endor Labs platform.

Securing AI Coding Assistants: A Total Cost Analysis
chrome_reader_mode
Article

Securing AI Coding Assistants: A Total Cost Analysis

A CISO’s guide to analyzing and containing the security costs of AI-generated code

Endor Labs Now Available on Google Cloud Marketplace
chrome_reader_mode
Article

Endor Labs Now Available on Google Cloud Marketplace

Endor Labs is now available on the Google Cloud Marketplace, enabling faster procurement and deployment of software supply chain security for GCP customers and partners.

How to Detect Infrastructure as Code (IaC) Misconfigurations with AI Security Code Review
chrome_reader_mode
Article

How to Detect Infrastructure as Code (IaC) Misconfigurations with AI Security Code Review

Learn how to detect misconfigurations in Infrastructure as Code (IaC) files, preventing privilege escalation and unsafe defaults before they reach production.

Endor Labs now integrates with Cursor AI Code Editor
chrome_reader_mode
Article

Endor Labs now integrates with Cursor AI Code Editor

Secure AI-generated code at the source with a new Cursor integration powered by the Endor Labs platform.

Secure-Insecure Diff: A Smarter Way to Prompt for Safer Code
chrome_reader_mode
Article

Secure-Insecure Diff: A Smarter Way to Prompt for Safer Code

How a multi-step prompt technique can reduce vulnerabilities in AI-generated code

How to Evaluate Endor Labs SCA for C/C++ Projects
chrome_reader_mode
Article

How to Evaluate Endor Labs SCA for C/C++ Projects

A step-by-step guide to testing Endor Labs SCA accuracy for C/C++ projects

CVE-2025-54313: eslint-config-prettier Compromise — High Severity but Windows-Only
chrome_reader_mode
Article

CVE-2025-54313: eslint-config-prettier Compromise — High Severity but Windows-Only

CVE-2025-54313 tracks a supply chain attack on eslint-config-prettier, where four malicious versions of a popular npm library targeted Windows machines with a remote-code execution payload. Learn how it happened and how to stay safe.

Everything You Need To Know About The FedRAMP RFC-0012
chrome_reader_mode
Article

Everything You Need To Know About The FedRAMP RFC-0012

The new FedRAMP RFC shifts the standard to require deep context into the reachability and exploitability of vulnerabilities. Here’s what you need to know.

Structuring Prompts for Secure Code Generation
chrome_reader_mode
Article

Structuring Prompts for Secure Code Generation

A practical guide to embedding security requirements into AI coding workflows

Endor Outpost: Deploy Endor Labs Behind Your Firewall
chrome_reader_mode
Article

Endor Outpost: Deploy Endor Labs Behind Your Firewall

Endor Outpost extends the full capabilities of the Endor Labs AppSec platform to Self-Hosted SCMs like Bitbucket Datacenter and GitLab Self-Managed.

Endor Labs & Oligo: Closing the Loop Between Secure Code and Secure Runtime
chrome_reader_mode
Article

Endor Labs & Oligo: Closing the Loop Between Secure Code and Secure Runtime

Endor Labs and Oligo keep pipelines fast and secure with unified reachability, real-time threat blocking, and safe, automatic fixes.

Struggling to Patch Spring-Web? Try This Instead
chrome_reader_mode
Article

Struggling to Patch Spring-Web? Try This Instead

Fixing Java deserialization vulnerabilities in Spring-Web is notoriously difficult, but Endor Labs offers an alternative with patches.

Under the Hood: People.ai's Proactive Approach to AI Security
chrome_reader_mode
Article

Under the Hood: People.ai's Proactive Approach to AI Security

Hear how a CISO at an AI-first company is thinking about securing AI, and how AI should improve security programs.

People.ai transforms security and compliance with Endor Labs
chrome_reader_mode
Article

People.ai transforms security and compliance with Endor Labs

People.ai uses Endor Labs for application security that provides an outstanding developer experience and makes it easier (and cheaper) to hit compliance targets.

Streamline Investigation with Enriched Vulnerability Search
chrome_reader_mode
Article

Streamline Investigation with Enriched Vulnerability Search

Endor Labs Vulnerability Search helps you investigate CVEs with enriched metadata, call paths, and precise impact analysis—resolving conflicts across public feeds.

What is AppSec? A 2025 Guide for Security Practitioners
chrome_reader_mode
Article

What is AppSec? A 2025 Guide for Security Practitioners

Learn what Application Security (AppSec) is, why it matters, and how to build a modern, scalable AppSec program across the SDLC.

Cracking the Code: Solving the Challenges of C/C++ Software Composition Analysis
chrome_reader_mode
Article

Cracking the Code: Solving the Challenges of C/C++ Software Composition Analysis

This whitepaper details Endor Labs’ novel approach to indexing open source dependencies and detecting vulnerabilities in C and C++ codebases.

Mysten Labs Improves DevEx with Endor Labs
chrome_reader_mode
Article

Mysten Labs Improves DevEx with Endor Labs

Within weeks of deployment, Endor Labs helped Mysten Labs transform its application security strategy.

Under the Hood: Mysten Labs’ Strategies for Building the Most Secure Blockchain
chrome_reader_mode
Article

Under the Hood: Mysten Labs’ Strategies for Building the Most Secure Blockchain

How Mysten Labs builds secure and low-friction systems for blockchain by focusing on code ownership, usability, and AppSec strategy.

Zebra Technologies Cuts SCA Noise by 97% with Endor Labs
chrome_reader_mode
Article

Zebra Technologies Cuts SCA Noise by 97% with Endor Labs

With fewer alerts and more accuracy, Zebra Technologies now spends more time building and less time chasing false positives.

Next-Gen SCA for C/C++: Closing the Detection Gap
chrome_reader_mode
Article

Next-Gen SCA for C/C++: Closing the Detection Gap

A new method for identifying OSS dependencies and vulnerabilities in C/C++ with greater accuracy and precision than legacy tools.

Critical SQL Injection Vulnerability in LlamaIndex (CVE-2025-1793) – Advisory and Analysis
chrome_reader_mode
Article

Critical SQL Injection Vulnerability in LlamaIndex (CVE-2025-1793) – Advisory and Analysis

The critical SQL injection vulnerability in LlamaIndex shows how LLMs can be a backdoor into your vector store

AppSec’s Exploitation Era: What Verizon, Mandiant, and Datadog Are Telling Us
chrome_reader_mode
Article

AppSec’s Exploitation Era: What Verizon, Mandiant, and Datadog Are Telling Us

A breakdown of DBIR, M-Trends, and DevSecOps reports and what they reveal about the future of AppSec in the age of AI.

Benchmarking Opengrep Performance Improvements
chrome_reader_mode
Article

Benchmarking Opengrep Performance Improvements

Opengrep's improvements to rule load times resulted in 3.15x faster average scan times than Semgrep

The UK Software Security Code of Practice through a Software Supply Chain Lens
chrome_reader_mode
Article

The UK Software Security Code of Practice through a Software Supply Chain Lens

How the UK Software Security Code of Practice reshapes supply chain security—and how Endor Labs helps vendors meet its core requirements.

CVE-2025-47949 Reveals Flaw in samlify That Opens Door to SAML Single Sign-On Bypass
chrome_reader_mode
Article

CVE-2025-47949 Reveals Flaw in samlify That Opens Door to SAML Single Sign-On Bypass

Information on the likelihood and impact of CVE-2025-47949

Endor Labs Policies: Developer-Friendly Security Automation
chrome_reader_mode
Article

Endor Labs Policies: Developer-Friendly Security Automation

This whitepaper talks about how Endor Labs uses context-aware security policies, like finding, action, exception, and remediation policies, to reduce noise, improve remediation speed, and help developers focus on real risks.

CVE-2025-4641 is Critical, But Likely Unreachable
chrome_reader_mode
Article

CVE-2025-4641 is Critical, But Likely Unreachable

Critical CVE-2025-4641 in WebDriverManager likely poses low real-world risk, but it should still be on radar. Here’s what you need to know, plus quick steps to check versions, upgrade, and secure CI pipelines.

Mastering Security Automation: Exception and Remediation Policies
chrome_reader_mode
Article

Mastering Security Automation: Exception and Remediation Policies

Learn how Endor Labs cuts through security noise, stops unnecessary build breaks, and keeps developers focused on real risks—making security policy automation truly developer-friendly.

5 Tips for Managing Bazel Dependencies (Without Losing Friends)
chrome_reader_mode
Article

5 Tips for Managing Bazel Dependencies (Without Losing Friends)

Upgrading dependencies in a Bazel monorepo? Learn 5 tips to avoid breakages, reduce risk, and keep your team (and builds) running smoothly.

Why Security Policies Frustrate Developers (and How We Can Fix Them)
chrome_reader_mode
Article

Why Security Policies Frustrate Developers (and How We Can Fix Them)

Most security policies create more problems than they solve, overwhelming developers with noise and unnecessary build breaks. Here's what a better approach looks like.

Open Source Gets Political: What The easyjson Debate Misses (and what to do about it)
chrome_reader_mode
Article

Open Source Gets Political: What The easyjson Debate Misses (and what to do about it)

A look at the easyjson controversy, open source provenance, and how Go's built-in protections help teams manage risk without overreacting.

Why We Raised a $93M Series B (In This Market)
chrome_reader_mode
Article

Why We Raised a $93M Series B (In This Market)

Endor Labs raised a $93M Series B to accelerate its mission of securing the AI-driven software era. Learn why top investors preempted the round—and how Endor is redefining AppSec for modern development.

Secure AI-Generated Code at the Source
chrome_reader_mode
Article

Secure AI-Generated Code at the Source

This solution brief shows how application security teams can fix risks from AI-generated code earlier in development and become the catalyst for secure, scalable adoption of AI coding tools like GitHub Copilot and Cursor in their organizations.

AI Security Code Review: A Multi-Agent Approach for Detecting Security Design Flaws at Scale
chrome_reader_mode
Article

AI Security Code Review: A Multi-Agent Approach for Detecting Security Design Flaws at Scale

This whitepaper introduces how AI Security Code Review works, what it detects, how it integrates into your workflows, and why it represents the next generation of code scanning technology — built for the complexity and speed of AI-native software development.

Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era
chrome_reader_mode
Article

Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era

Endor Labs MCP Server powers real security fixes for vibe coding and AI-generated code—reduce noise and help AI tools fix risks for you.

Introducing AI Security Code Review
chrome_reader_mode
Article

Introducing AI Security Code Review

Endor Labs helps application security teams identify the few code changes that impact their security architecture across thousands of pull requests.

Meet the application security platform built for the AI era
chrome_reader_mode
Article

Meet the application security platform built for the AI era

The era of vibe coding is here. Learn how Endor Labs is helping AppSec teams secure and fix AI-generated code with a new agentic AI platform.

Critical RCE Vulnerability in Apache Parquet (CVE-2025-30065) – Advisory and Analysis
chrome_reader_mode
Article

Critical RCE Vulnerability in Apache Parquet (CVE-2025-30065) – Advisory and Analysis

Endor Labs advisory: Critical CVE-2025-30065 in Apache Parquet lets attackers run code via schema parsing. Patch now by upgrading to version 1.15.1.

Reducing Noise and Fixing What Matters
chrome_reader_mode
Article

Reducing Noise and Fixing What Matters

Learn how Endor Labs improves AppSec accuracy with better SCA and SAST, so you can decide if ASPM is the right fit for your organization.

OWASP OSS Risk 2: Compromise of Legitimate Package
chrome_reader_mode
Article

OWASP OSS Risk 2: Compromise of Legitimate Package

OWASP OSS Risk 2: Explore the compromise of legitimate open-source packages, with an in-depth case study of the tj-actions/changed-files GitHub Action supply chain attack.

Blast Radius of the tj-actions/changed-files Supply Chain Attack
chrome_reader_mode
Article

Blast Radius of the tj-actions/changed-files Supply Chain Attack

Analysis of the tj-actions/changed-files GitHub Actions compromise, assessing the impact and damage from the attack.

What You Need to Know About UK Cyber Essentials Certification
chrome_reader_mode
Article

What You Need to Know About UK Cyber Essentials Certification

Cyber Essentials helps UK businesses guard against internet-based attacks and prove their security measures are truly effective.

GitHub Action tj-actions/changed-files supply chain attack: what you need to know
chrome_reader_mode
Article

GitHub Action tj-actions/changed-files supply chain attack: what you need to know

GitHub Action tj-actions/changed-files was compromised, exposing CI/CD secrets. Learn how this attack impacts repositories and what steps to take now.

Application Security Posture Management (ASPM) Explained
chrome_reader_mode
Article

Application Security Posture Management (ASPM) Explained

Learn when application security posture management (ASPM) solutions work, their limitations, and alternatives for cutting through security alert noise.

How Endor Patches Are Built and Tested
chrome_reader_mode
Article

How Endor Patches Are Built and Tested

Endor Patches are backported open-source security fixes. Learn how we build and test Endor Patches for compatibility and security.

The AppSec Maturity Staircase: Climbing Faster, Not Harder with Endor Labs
chrome_reader_mode
Article

The AppSec Maturity Staircase: Climbing Faster, Not Harder with Endor Labs

Each stage of the application security maturity staircase evolves your program—and Endor Labs is your escalator to the top.

How to Get Developers to Accept Security PRs Faster
chrome_reader_mode
Article

How to Get Developers to Accept Security PRs Faster

Improve your mean time to remediation (MTTR) with smarter automatic pull requests that use upgrade impact analysis to reduce alert fatigue for developers.

DeepSeek R1: What Security Teams Need to Know
chrome_reader_mode
Article

DeepSeek R1: What Security Teams Need to Know

Learn how to evaluate security risk factors for DeepSeek R1, and about important considerations for working with open source AI models.

How to Discover Open Source AI Models in Your Code
chrome_reader_mode
Article

How to Discover Open Source AI Models in Your Code

Use Endor Labs to discover, evaluate, and enforce policies governing the usage of open source AI models from Hugging Face in your applications.

Remote Code Execution Vulnerabilities in Apache Struts
chrome_reader_mode
Article

Remote Code Execution Vulnerabilities in Apache Struts

CVE-2024-53677 and CVE-2023-50164 are vulnerabilities in Apache Struts that could pave the way for remote code execution, or RCE. Learn how to figure out if you’re affected, and if so what to do about it

Everything You Need to Know About Opengrep
chrome_reader_mode
Article

Everything You Need to Know About Opengrep

Opengrep is a fork of Semgrep's open source static code analysis engine. Learn about the benefits and how you can contribute.

Uncover Trends and Show AppSec Value with the Endor Labs Dashboard
chrome_reader_mode
Article

Uncover Trends and Show AppSec Value with the Endor Labs Dashboard

Vulnerability metrics can help you uncover remediation and SLA trends, and demonstrate the value of AppSec investments to your leadership.

Identifying and Tracking FedRAMP False Positives
chrome_reader_mode
Article

Identifying and Tracking FedRAMP False Positives

False positives can make FedRAMP ConMon costly. Learn why it’s hard to accurately identify false positives and some tactics for making this process less challenging.

How Endor Labs Prioritizes Open Source Security Patches
chrome_reader_mode
Article

How Endor Labs Prioritizes Open Source Security Patches

Learn how Endor Labs targets the critical dependencies that are responsible for most of the open source vulnerabilities in the software supply chain.

Why Reachability Analysis for JavaScript Is Hard (and How We Fixed It)
chrome_reader_mode
Article

Why Reachability Analysis for JavaScript Is Hard (and How We Fixed It)

JavaScript reachability is tricky for SCA tools because of how JavaScript approaches dependency resolution, dependency imports, and functions.

Endor Patches Whitepaper
chrome_reader_mode
Article

Endor Patches Whitepaper

When upgrading is too risky, complex, or time consuming due to regressions, breaking changes, or new bugs, you can use Endor Patches to stay safe now while still meeting your SLA requirements.

Grip Security Reduces Noise by 99%
chrome_reader_mode
Article

Grip Security Reduces Noise by 99%

Grip Security replaced their traditional SCA tool with Endor Labs to improve their ability to build trust with customers without taxing developers.

Grip Security Builds Customer Trust with AppSec
chrome_reader_mode
Article

Grip Security Builds Customer Trust with AppSec

Grip Security values strong application security because it helps them build trust with their customers. Learn how a security company approaches AppSec.

The Uncomfortable Truth of Vulnerable and Outdated Software Components
chrome_reader_mode
Article

The Uncomfortable Truth of Vulnerable and Outdated Software Components

Learn where common industry sayings such as “stay up to date” come from and how you can help Endor Labs help you overcome those challenges.

Reduce FedRAMP Compliance Costs
chrome_reader_mode
Article

Reduce FedRAMP Compliance Costs

Endor Labs reduces false positives and prioritizes real vulnerabilities, helping your team meet FedRAMP requirements with less stress and lower costs.

Why OVAL Feeds Outperform NVD for Linux Vulnerability Management
chrome_reader_mode
Article

Why OVAL Feeds Outperform NVD for Linux Vulnerability Management

Learn why OVAL feeds, curated by Linux distributions, offer more precise vulnerability data than the NVD, reducing container scanning false positives and wasted efforts.

Achieving FedRAMP’s Container Scanning Requirements
chrome_reader_mode
Article

Achieving FedRAMP’s Container Scanning Requirements

Breaking Changes, Breaking Trust
chrome_reader_mode
Article

Breaking Changes, Breaking Trust

Breaking Changes, Breaking Trust

Reducing FedRAMP Compliance Costs with Endor Labs
chrome_reader_mode
Article

Reducing FedRAMP Compliance Costs with Endor Labs

Vulnerability Management for FedRAMP compliance is expensive; your SCA tool should help you make it cheaper and easier.

Microsoft Defender for Cloud Natively Integrates with Endor Labs
chrome_reader_mode
Article

Microsoft Defender for Cloud Natively Integrates with Endor Labs

Integrate Microsoft Defender for Cloud with Endor Labs for reachability analysis and attack path visibility — available natively within the Defender for Cloud console. Prioritize what to fix without switching tools.

Hugging Face Model Score Curation at Endor Labs
chrome_reader_mode
Article

Hugging Face Model Score Curation at Endor Labs

Understand how models are factored and scored at Endor Labs, new exploration tab for HuggingFace models

Endor Labs Announces Integrated SAST Offerings
chrome_reader_mode
Article

Endor Labs Announces Integrated SAST Offerings

Endor Labs now integrates Static Application Security Testing (SAST) into your application security testing stack.

Understanding the Cyber Resilience Act
chrome_reader_mode
Article

Understanding the Cyber Resilience Act

The Cyber Resilience Act (CRA) sets mandatory security requirements for hardware and software. This blog covers key compliance objectives, challenges with OSS vulnerabilities, and best practices for maintaining security throughout the product life cycle.

Start Clean With AI: Select Safer LLM Models with Endor Labs
chrome_reader_mode
Article

Start Clean With AI: Select Safer LLM Models with Endor Labs

You can now use Endor Labs to evaluate AI models on HuggingFace for security, popularity, quality, and activity.

The U.S. Government Prioritizes Open Source Governance and Security
chrome_reader_mode
Article

The U.S. Government Prioritizes Open Source Governance and Security

The U.S. Federal government's FY 2026 Cybersecurity Priorities focus on securing open source software, improving governance, and supporting OSS sustainability to strengthen the software supply chain.

Understanding the Basics of Large Language Models (LLMs)
chrome_reader_mode
Article

Understanding the Basics of Large Language Models (LLMs)

Understand what LLMs are, how foundational LLMs are built, the opportunities they offer and the risks they pose.

Container Layer Analysis: Clarity in Remediation
chrome_reader_mode
Article

Container Layer Analysis: Clarity in Remediation

Container layer analysis tells you which layer contains a vulnerability so you can prioritize remediation efforts more effectively and meet SLAs like FedRAMP.

Endor Labs Achieves 92% Reduction in SCA Alerts
chrome_reader_mode
Article

Endor Labs Achieves 92% Reduction in SCA Alerts

Endor Labs reduces open-source vulnerability noise by 92%, boosting productivity and improving collaboration between development and security teams.

Karl Mattson Joins Endor Labs as Chief Information Security Officer
chrome_reader_mode
Article

Karl Mattson Joins Endor Labs as Chief Information Security Officer

We're thrilled to have Karl Mattson as Endor Labs first Chief Information Security Officer (CISO)!

Highlights from Our 2024 Dependency Management Webinar
chrome_reader_mode
Article

Highlights from Our 2024 Dependency Management Webinar

Get key insights from the 2024 Dependency Management webinar with Darren Meyer and Henrik Plate. We discuss how to prioritize vulnerabilities, navigate breaking changes, and leverage public vulnerability databases effectively.

Relativity Blocks Risks with Endor Labs
chrome_reader_mode
Article

Relativity Blocks Risks with Endor Labs

Relativity changed their security program from a blocker to an enabler by integrating security into developer workflows and empowering developers to prevent risks before they ship to production.

Blocking with Confidence: Relativity's Dev Experience Journey
chrome_reader_mode
Article

Blocking with Confidence: Relativity's Dev Experience Journey

Relativity changed their security program from a blocker to an enabler by integrating security into developer workflows and empowering developers to prevent risks before they ship to production.

48 most popular open source tools for Python applications, scored
chrome_reader_mode
Article

48 most popular open source tools for Python applications, scored

Discover the top open-source tools for Python applications, ranked by Endor Scores based on security, activity, popularity, and code quality.

FedRAMP Requirements for Vulnerability Management and Dependency Upgrades
chrome_reader_mode
Article

FedRAMP Requirements for Vulnerability Management and Dependency Upgrades

This blog covers key steps to simplify FedRAMP vulnerability management, helping you reduce risks and meet compliance timelines. It also provides practical tips to empower developers and streamline fixes for a smoother FedRAMP process.

Fix Vulnerabilities Faster with Auto Patching and Endor Patches
chrome_reader_mode
Article

Fix Vulnerabilities Faster with Auto Patching and Endor Patches

Automatically patch open source libraries with Endor Patches during the build process, ensuring software is continuously protected against vulnerabilities without manual intervention.

Dependency Management Report
chrome_reader_mode
Article

Dependency Management Report

Announcing the 2024 Dependency Management Report
chrome_reader_mode
Article

Announcing the 2024 Dependency Management Report

Our third-annual Dependency Management Report explores how emerging trends in open source security should guide SDLC security strategy in 2024.

Starburst Gets 98.3% Noise Reduction with Endor Labs
chrome_reader_mode
Article

Starburst Gets 98.3% Noise Reduction with Endor Labs

Starburst, an open data lakehouse, replaced Rezillion with Endor Labs for SCA. They improved their ability to identify and prioritize open source while complementing the developer experience.

Building a DevSecOps Practice at Starburst
chrome_reader_mode
Article

Building a DevSecOps Practice at Starburst

Wondering how to build or revamp a DevSecOps program? Get some immediately useful tips that you can apply to your startup or mature enterprise…or anywhere in between.

What is CI/CD Security and What Tools Do You Need to Do it?
chrome_reader_mode
Article

What is CI/CD Security and What Tools Do You Need to Do it?

Learn what CI/CD security is, why it’s important, and discover the key tools Endor Labs offers to help you secure your CI/CD pipelines.

no-results
Sorry, no results matching your search.

Book a Demo

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.