Blog
All Blog Posts
ActiveState’s Container Hardening Guide
			Learn and adopt the techniques today’s top engineering teams use to keep their images risk-free, secure, and compliant.		
					
					
														
									
								
													
						Read More
					
				
						Five Traits of Reliable Software Components
			Open source has become the backbone of modern software. From cloud infrastructure to AI frameworks, nearly every digital product depends on code written and maintained ...		
					
					
														
									
								
													
						Read More
					
				
						What’s the Difference Between a Hardened Container Image, Minimal Image, and Secure Image?
			“Secure Containers”, “Hardened Images”, “Low-to-No CVE Container Images”… If you or your team has recently been tasked with improving container security, this is just a ...		
					
					
														
									
								
													
						Read More
					
				
						Protect Your Team From Future NPM Attacks with ActiveState
			October is Cyber Security Awareness Month—a timely reminder that vigilance is not a one-week exercise, but a year-round necessity. Even weeks after the initial headlines ...		
					
					
														
									
								
													
						Read More
					
				
						Introducing the ActiveState Trust Center
			With Gartner predicting that 45% of organizations will have experienced attacks on their software supply chains this year (2025)—a threefold increase from 2021—organizations need to ...		
					
					
														
									
								
													
						Read More
					
				
						The Power of Application Containers
			Application containers have become an essential building block in modern software development, helping teams move faster by removing the need to reinvent common infrastructure services. ...		
					
					
														
									
								
													
						Read More
					
				
						Level Up Your Container Security Skills with ActiveState Academy
			Amongst software development and security professionals, the term “shift-left” has become near ubiquitous within the industry. Countless articles and methodologies now push for the movement ...		
					
					
														
									
								
													
						Read More
					
				
						Keeping ActiveState Secure Containers Vulnerability Free
			While container usage has exploded, the status quo of container development remains risky. Public registries are full of outdated base images, dependency bloat, and unclear ...		
					
					
														
									
								
													
						Read More
					
				
						Unlocking Software Supply Chain Security: The Power of ReversingLabs Spectra Assure and ActiveState OSPM Integration
			The modern software supply chain is a double-edged sword. On one hand, open-source components and rapid development methodologies accelerate innovation and time to market. On ...		
					
					
														
									
								
													
						Read More
					
				
						How to Decide Which Python Vulnerabilities Deserve Your Attention First
			If you’ve ever run a vulnerability scan on a Python project, you know the feeling when hundreds of warnings appear, red flags fill the screen, ...		
					
					
														
									
								
													
						Read More
					
				
						Navigate the Upcoming Bitnami Changes with ActiveState
			For over a decade, Bitnami has been a cornerstone of the open-source landscape, known for delivering ready-to-use, production-grade container images and Helm charts for a ...		
					
					
														
									
								
													
						Read More
					
				
						The Power of Development Containers
			Over the past decade, containers have established themselves as the tool of choice for deploying cloud-native applications, primarily due to their portability, scalability, and consistency ...		
					
					
														
									
								
													
						Read More
					
				
						 
				 
				











