Our Blog Posts

Featured Blog

Disinformation Is An Open Source Problem

The Oxford dictionary defines disinformation as “false information which is intended to mislead.” That simple definition seems to understate the problem, given the fact that ...
Read More →
All Blog Posts
Search
DepSec Automation
DepSec: How DevOps Can Secure Open Source at Scale
Automating dependency security is key to allowing DevOps to manage the observability, compliance and remediation of open source at scale.
Read More →
How US Government ISVs Can Meet CISA Attestation Requirements
ActiveState can help bridge the gap between your current capabilities & CISA Attestation requirements via a single easy-to-integrate platform
Read More →
Perl 5.40
Perl 5.40 Now Generally Available
Perl 5.40 addresses the key use case of maintaining legacy Perl since you can now write cleaner, optimized code with better readability.
Read More →
The Emergence of DepSec
The Need for a Dependency Security Discipline Within AppSec
DepSec as a specialized discipline within AppSec lets orgs reduce costs & improve outcomes when securing open source dependencies.
Read More →
Python 2 Renewed
New Release of Python 2 Now Available
Python 2.7.8.18 delivers security fixes for numerous vulnerabilities, and rolls up all previous fixes since Python went EOL 4.5 years ago.
Read More →
Container Supply Chain Outsouring
Chainguard vs ActiveState Hardened Containers
Learn how you can decrease Mean Time To Remediation (MTTR) by outsourcing the responsibility of securing your containers to a third party. 
Read More →
Key to Simplifying SSDF
How ActiveState Helps With Secure Software Development Framework (SSDF) Adoption
A Secure Software Development Framework (SSDF) can dramatically slow down code delivery unless you automate key requirements. Learn how.
Read More →
Anaconda Alternatives for Citizen Developers
Anaconda Python’s Data Science Blockers for Citizen Developers
Citizen developers like data scientists are not coding experts. Anaconda Python can help but enterprise devs are unlikely to use it. What now?
Read More →
Open source elephant in the room
The Future of Open Source: Addressing The Elephant In The Room
Without a realistic vision for open source security, 30 years of learned behaviour is hard to change. Learn why it takes a community.
Read More →
ASPM And Vulnerabilities
Application Posture Management & Open Source Security
ASPM provides enterprise-wide insight into vulnerabilities, but do you really need another tool to solve the problem of having too many tools?
Read More →
Vulnerable By Design
The Digital Supply Chain Is Vulnerable By Design
US CISA's Secure By Design software development principles prioritize security over features. Learn how to do it without losing market share.
Read More →
Outsoured Software Supply Chain Biz Case
The Business Case For An Outsourced Software Supply Chain
Outsourcing your software supply chain can not only save you money, but also help you realize your security & productivity goals. Learn more.
Read More →

Stay up-to-date with our mailing list

Scroll to Top