Nov. 2022 |
Endor Labs for Engineering Teams |
wLYn07Lgmao |
Nov. 2022 |
Endor Labs for Security Teams |
fGbr4YNPZkM |
Nov. 2022 |
Code Custody Hearing: Engineering vs Security |
lSvFguuoP68 |
Dec. 2022 |
Going beyond Metadata: Why we need static analysis when prioritizing vulnerabilities |
UTQLAkfcAII |
Dec. 2022 |
State of Dependency Management 2022 |
dlJwYYFt3HY |
Dec. 2022 |
The Risk Explorer - a visual way to learn about open source supply chain attacks |
Lz2SkO1jDgY |
Jan. 2023 |
The 3 layers of software at the enterprise |
6E2hlYSIABM |
Jan. 2023 |
DevEx, Platform, Security - Who owns OSS selection? |
yMePOmIAp0M |
Jan. 2023 |
Bipul Sinha, CEO, Rubrik - Endor Labs |
zusGKXfzTlY |
Jan. 2023 |
David Tsao, CISO, Instacart - Endor Labs |
TBakhTUyI_c |
Jan. 2023 |
Colin Anderson, CISO, Ceridian - Endor Labs |
_nKWY0pIu-o |
Jan. 2023 |
Rachit Lohani, CTO, Paylocity - Endor Labs |
Y7K6rmkf64E |
Jun. 2023 |
Introduction to Open Source Security |
vrAZcPPiuro |
Jun. 2023 |
How Security & Engineering scale OSS while remaining friends |
moOvixCzrXA |
Nov. 2023 |
Top 10 Open Source Software (OSS) Risks |
oM7qp4Zneus |
Nov. 2023 |
How to Prioritize AppSec Risks: People, Process, Metrics |
5TgVmZFTsYk |
Nov. 2023 |
How to Prioritize Reachable Open Source Software (OSS) Vulnerabilities |
gGJM2YJ1Mec |
Nov. 2023 |
How to Prioritize AppSec Risks: CVSS, EPSS, and Too Much Data |
gxZ1Twa35Po |
Nov. 2023 |
AppSec Without Leaving GitHub |
YPyCRvx7w5E |
Nov. 2023 |
The Impact of U.S. Government Mandates on AppSec |
dbgaQKa89X0 |
Dec. 2023 |
Improve App Security Through Collaboration Between Engineering and Security |
_4G9AGBiK5Q |
Dec. 2023 |
How to Scan and Prioritize Valid Secrets |
GZOljcpHpGk |
Dec. 2023 |
Reachability Analysis 101 |
AcF5B5Pxoyo |
Dec. 2023 |
Remediate This! TensorFlow 2.8.0 |
cVwEQtRFguI |
Dec. 2023 |
How to Start an Application Security Program |
daxdtb8IUxk |
Dec. 2023 |
The State of Dependency Management 2023 |
LzDYSs0-SOQ |
Jan. 2024 |
The Basics of Dependency Management and SCA (and Why Your SCA is Wrong) |
HBNgpzv2tUE |
Jan. 2024 |
How to Use AI for Open Source Selection |
C7aVTrk4WXA |
Jan. 2024 |
How to Run an SCA Test Locally on your Machine |
w6i8Lfk_atw |
Jan. 2024 |
How to Generate SBOM and VEX |
eqohrvtmD5I |
Jan. 2024 |
Using AI Safety vs Innovation |
gtYv-k_mXPY |
Jan. 2024 |
How to Ingest and Manage SBOMs |
8NPyP4Nq99Q |
Feb. 2024 |
LLM Basics for Security Professionals |
nB3o653dVCY |
Feb. 2024 |
How to Improve SCA in GitHub Advanced Security |
H_BJ3yFFP68 |
Feb. 2024 |
Reachability Analysis for Python, Go, C# |
wN2ebtVBCIQ |
Feb. 2024 |
Using LLMs as a Security Tool |
4JROK6nneAs |
Feb. 2024 |
AppSec Engineers' Role in Software Development |
fbv_suL_ZA8 |
Feb. 2024 |
How to Detect Malicious Code in OSS Your Dependencies |
yt3wF0xTnuw |
Feb. 2024 |
Ways to Use AI in Security Programs |
iRjXC0BJwSI |
Mar. 2024 |
Use and Misuse Cases for LLMs |
q86chlZkqTg |
Mar. 2024 |
Prioritizing SCA Findings with Reachability Analysis |
4F9XtVmQ11s |
Mar. 2024 |
Are Project Tests Enough for Automated Dependency Updates |
9xO9-irS2WQ |
Apr. 2024 |
Artifact Signing 101 |
QfOiCxs5jbw |
Apr. 2024 |
How to Verify Signed Artifacts with a Kubernetes Admission Controller |
ORmdt4g3xLI |
May. 2024 |
Intro to Endor Labs |
ONOocXyG7eM |
Jun. 2024 |
Managing Open Source Vulnerabilities for PCI DSS V 4.0 Compliance |
b9CTf__iois |
Jul. 2024 |
What is a Security Pipeline? |
HmfJQN1UbZ8 |
Jul. 2024 |
What is an OSPO? |
ZysJgATciIk |
Aug. 2024 |
How to Fix Vulnerabilities Without Breaking Changes |
KhcKUoWGR5k |
Aug. 2024 |
How to Combine App and Container Scans |
AHiGHyEYO3I |
Aug. 2024 |
Give Devs the Confidence to Fix: Making Remediation Less Painful |
yWmm06Gw0kA |
Aug. 2024 |
How to Target the Vulnerabilities that Matter |
jnspSZ9oak4 |
Sep. 2024 |
Relativity Blocks Risks with Endor Labs |
x3iahbkbffU |
Sep. 2024 |
Mastering OSS Security Validating Vulnerabilities with Code Level Reachability Analysis |
jUHODWC0Bfo |
Sep. 2024 |
2024 Dependency Management Report |
vO4hARvX9v8 |
Sep. 2024 |
How to Detect License and Copyright Risks |
tA52s9RPvZ4 |
Oct. 2024 |
How to Fix the Vulnerabilities that Matter |
5IihFZGDxiI |