Search Results

Learn about software supply chain security and Endor Labs

Search all our {count} unique resources
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Loading the Results...
Why Different SCA Tools Produce Different Results
chrome_reader_mode
Article

Why Different SCA Tools Produce Different Results

Like anything in computer science and programming, there’s more than one way to solve a problem or get a result. SCA (software composition analysis) is no different.

Strengthening Security in .NET Development with packages.lock.json
chrome_reader_mode
Article

Strengthening Security in .NET Development with packages.lock.json

Learn how packages.lock.json can help maintain a secure .NET development and why it should be part of your development workflow.

Highlights from State of Dependency Management 2022 - Webinar
chrome_reader_mode
Article

Highlights from State of Dependency Management 2022 - Webinar

In this on-demand webinar we discuss the key research findings from our 2022 report "State of Dependency Management."

How Security and Engineering Can Scale Open Source Security - Webinar
chrome_reader_mode
Article

How Security and Engineering Can Scale Open Source Security - Webinar

In this on-demand video we discuss open source dependency management and considerations for implementing AppSec programs to protect OSS.

Endor Labs is SOC 2 Type II Certified!
chrome_reader_mode
Article

Endor Labs is SOC 2 Type II Certified!

Proving once again open source governance doesn’t have to SOC, yes I made that joke again and I’m not sorry. We’re excited to announce we have received a clean audit result on our SOC2 Type II certification.

Reviewing Malware with LLMs: OpenAI vs. Vertex AI
chrome_reader_mode
Article

Reviewing Malware with LLMs: OpenAI vs. Vertex AI

At Endor Labs, we continue evaluating the use of large language models (LLMs) for all kinds of use-cases related to application security. And we continue to be amazed about high-quality responses … until we’re amused about the next laughably wrong answer.

Endor Labs Wins Intellyx Digital Innovation Award
chrome_reader_mode
Article

Endor Labs Wins Intellyx Digital Innovation Award

We've been named a winner of the 2023 Intellyx Digital Innovator Award, recognizing technology providers driving enterprise digital transformation. Learn more.

Endor Labs Recognized As a 2023 Bay Area Best Place to Work
chrome_reader_mode
Article

Endor Labs Recognized As a 2023 Bay Area Best Place to Work

I mean, who wouldn't want to work with a bunch of Ewoks?

Make Developers' Lives Easier with Endor Labs & GitHub Advanced Security
chrome_reader_mode
Article

Make Developers' Lives Easier with Endor Labs & GitHub Advanced Security

Developers are bombarded with information every day. Constant context switching and information overload are among the biggest barriers to productivity. There are simply too many demands for their attention. One day the sales team will understand. Right?

LLM-assisted Malware Review: AI and Humans Join Forces to Combat Malware
chrome_reader_mode
Article

LLM-assisted Malware Review: AI and Humans Join Forces to Combat Malware

Experiments with GPT-3.5 suggest that LLM-based malware reviews can complement, but not yet substitute human reviews. 1800 binary classifications performed with GPT-3.5 included false-positives and false-negatives.

Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox
chrome_reader_mode
Article

Endor Labs Selected as Finalist for RSA Conference 2023 Innovation Sandbox

Endor Labs recognized for innovation in helping enterprises manage open source risk.

Announcing the Endor Labs Hyperdrive Program for Resellers and Solution Providers
chrome_reader_mode
Article

Announcing the Endor Labs Hyperdrive Program for Resellers and Solution Providers

The Hyperdrive partner program enables organizations of all sizes to embrace open source software with confidence.

Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software
chrome_reader_mode
Article

Endor Labs partners with Zinfinity to help enterprise safely adopt Open Source Software

We’re excited to announce our latest partnership with Zinfinity as a strategic partner. Zinfinity is a global provider of technology solutions and services with a focus on Cyber Security, Cloud and Digital Infrastructure.

OWASP Top 10 Risks for Open Source
chrome_reader_mode
Article

OWASP Top 10 Risks for Open Source

Emerging trends impacting open source dependency management

How to Quickly Measure SBOM Accuracy for Maven Projects (for Free)
chrome_reader_mode
Article

How to Quickly Measure SBOM Accuracy for Maven Projects (for Free)

SBOM-Lab is an open source tool that lets you quickly compare SBOM generation methods for Maven projects and find the right one for you.

Endor Labs is SOC2 Certified!
chrome_reader_mode
Article

Endor Labs is SOC2 Certified!

Open Source security doesn't have to SOC (sorry, I had to). We're excited to announce we have received a clean audit result on our SOC2 Type 1 certification.

Introduction to Open Source Security - Webinar
chrome_reader_mode
Article

Introduction to Open Source Security - Webinar

In this on-demand webinar we help you understand the basics of dependency management and how they can be vulnerable to security risks.

Comparing SBOMs Generated at Different Lifecycle Stages - Webinar
chrome_reader_mode
Article

Comparing SBOMs Generated at Different Lifecycle Stages - Webinar

In this on-demand webinar, we share research on the variation in SBOMs depending on tool and when the documents are generated.

SBOM vs. SBOM: Comparing SBOMs from Different Tools and Lifecycle Stages
chrome_reader_mode
Article

SBOM vs. SBOM: Comparing SBOMs from Different Tools and Lifecycle Stages

Software vendors active in certain verticals will soon be required to provide customers with SBOMs for their products. But how and when should an SBOM for a given piece of software be produced?

What Breaking Changes Teach Us about Security
chrome_reader_mode
Article

What Breaking Changes Teach Us about Security

GitHub rolled out a release that had some breaking changes to Git. Here's what we learned from it.

Open Source Licensing Simplified: A Comparative Overview of Popular Licenses
chrome_reader_mode
Article

Open Source Licensing Simplified: A Comparative Overview of Popular Licenses

Explore the different types of open source licenses and how they impact the use, modification, and distribution of open source software. From GPL to Apache, MIT and more, learn the key differences between permissive and restrictive licenses and how to choose the right one for your project.

What is VEX and Why Should I Care?
chrome_reader_mode
Article

What is VEX and Why Should I Care?

An SBOM without VEX is like peanut butter without jelly. SBOM is a top buzzword in cybersecurity, but it's important to understand why VEX (Vulnerability Exploitability eXchange) is such a critical companion document.

Whatfuscator, Malicious Open Source Packages, and Other Beasts
chrome_reader_mode
Article

Whatfuscator, Malicious Open Source Packages, and Other Beasts

Join Henrik to learn how his journey into Go programming turned into a path of malicious OSS packages.

Exploring Risk: Understanding Software Supply Chain Attacks
chrome_reader_mode
Article

Exploring Risk: Understanding Software Supply Chain Attacks

Naming and understanding the attack vectors at the disposal of our adversaries.

Endor Labs and Intuitive Partner to Help Enterprises Leverage OSS
chrome_reader_mode
Article

Endor Labs and Intuitive Partner to Help Enterprises Leverage OSS

Endor Labs and Intuitive.Cloud announce strategic partnership and investment with the goal of taking on OSS sprawl.

What is Reachability-Based Dependency Analysis?
chrome_reader_mode
Article

What is Reachability-Based Dependency Analysis?

Reachability analysis increases reliability of SCA results, allowing teams to quickly prioritize just the risks that matter.

State of Dependency Management 2022
chrome_reader_mode
Article

State of Dependency Management 2022

In their inaugural report, the Station 9 research team explores the complexities of open source dependencies and the top security considerations for open source adoption at the enterprise.

Why We Need Static Analysis When Prioritizing Vulnerabilities - Webinar
chrome_reader_mode
Article

Why We Need Static Analysis When Prioritizing Vulnerabilities - Webinar

In this on-demand webinar, we explain the role of static analysis of open source dependencies in an application security program.

What are Maven Dependency Scopes and Their Related Security Risks?
chrome_reader_mode
Article

What are Maven Dependency Scopes and Their Related Security Risks?

This article explores Maven dependency scopes: What are they, what are they used for, and how do they impact security risks?

The Government's Role in Maintaining Open Source Security
chrome_reader_mode
Article

The Government's Role in Maintaining Open Source Security

This blog summarizes highlights from Tragedy of the Digital Commons, by Strauss Center scholar and lecturer Chinmayi Sharma, where she shares the OSS state of affairs and her thoughts on improving security.

Introduction to Program Analysis
chrome_reader_mode
Article

Introduction to Program Analysis

Program analysis is the process of checking whether or not a piece of software fulfills certain properties. This article explores the basics of program analysis, so we could then dive deeper into the world of call graphs.

More Than 30 Industry-Leading CISOs Personally Invest in Endor Labs
chrome_reader_mode
Article

More Than 30 Industry-Leading CISOs Personally Invest in Endor Labs

After a comprehensive diligence process on startups in the supply chain and open source security space, over 30 CISOs have chosen to personally back Endor Labs.

From Cloud Security to Code Security: Why We've Raised $25M to Take on OSS Dependency Sprawl
chrome_reader_mode
Article

From Cloud Security to Code Security: Why We've Raised $25M to Take on OSS Dependency Sprawl

Endor Labs raises $25M seed round.

Endor Labs Launches with $25M Seed Financing to Tackle Massive Sprawl of Open Source Software (OSS)
chrome_reader_mode
Article

Endor Labs Launches with $25M Seed Financing to Tackle Massive Sprawl of Open Source Software (OSS)

Solution from category-defining entrepreneurs and world-renowned experts helps developers spend less time dealing with security issues, more time accelerating their development through safe code reuse.

SBOMs are Just a Means to an End
chrome_reader_mode
Article

SBOMs are Just a Means to an End

Do you know what goes into the software your company consumes? If your answer was sticky tape and glue, you clearly work in technology. Congratulations, this article is for you.

Introducing the OpenSSF Scorecard API
chrome_reader_mode
Article

Introducing the OpenSSF Scorecard API

The Scorecard API makes it easier to automate and enforce your dependency policies. Naveen is one of the key contributors to the Scorecard projects, in this article, he walks through how it works!

How to Get the Most out of GitHub API Rate Limits
chrome_reader_mode
Article

How to Get the Most out of GitHub API Rate Limits

Thinking about using Github's REST API within your system, or already doing so? If you have not already encountered this concept, one important thing to keep in mind while developing is Github's concept of rate limiting.

Why I Joined Endor Labs to Build our India Team
chrome_reader_mode
Article

Why I Joined Endor Labs to Build our India Team

Sriram Subramanian recently left his position as VP of Engineering at Citrix to lead the India R&D center at Endor Labs. We asked him what made him take the leap and what's his vision for the India team.

How Zero Trust Principles Can Accelerate Enterprise Adoption of OSS
chrome_reader_mode
Article

How Zero Trust Principles Can Accelerate Enterprise Adoption of OSS

Learn how Zero Trust principles help OSS adoption

What Security Teams Need to Know about Software Development
chrome_reader_mode
Article

What Security Teams Need to Know about Software Development

Learn how to begin threat models and make more informed risk management decisions regarding their software development practices.

CSRB Log4j Report - The Response is as Dangerous as the Vulnerability
chrome_reader_mode
Article

CSRB Log4j Report - The Response is as Dangerous as the Vulnerability

The recent report from the CSRB gives a step by step account of Log4j, from discovery to remediation, and uncovers a painful insight - sometimes the response is just as dangerous as the vulnerability.

Polyrepo vs. Monorepo - How Does it Impact Dependency Management?
chrome_reader_mode
Article

Polyrepo vs. Monorepo - How Does it Impact Dependency Management?

In this article, we explore the impact of using a monorepo vs a polyrepo architecture on dependency management.

no-results
Sorry, no results matching your search.

Book a Demo

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.