Blog
All Blog Posts
How to Implement a Chain of Custody for Your Software Supply Chain
Implementing chain of custody at scale for your software supply chain is a non-trivial task. Learn how ActiveState can help.
Read More
The Growing Threat of AI Externalities
AI-generated data is poisoning AI application training data, while AI-generated code is making every app less secure. Learn what you can do.
Read More
Open Source Observability Reduces Vulnerability Risk
Learn how to eliminate silos and identify vulnerabilities across the extended enterprise and down to the lowest transitive dependency.
Read More
SBOMs for Medical Devices – Everything You Need to Know
Medical Device Manufacturers must provide SBOMs by Oct 2023 per FDA requirements. Learn about SBOM best practices for healthcare.
Read More
How to Ensure Supply Chain Security for AI Applications
Machine Learning is at the heart of the boom in AI Applications, revolutionizing various domains. How can we stay secure while moving fast?
Read More
Top 10 AI-Generated Code Tools
Which AI code generation tool is best? Compare the pros and cons of standalone chatbot code generators versus IDE-integrated assistants.
Read More
Reducing Mean Time To Remediation for Open Source Vulnerabilities
Learn which Machine Learning model is best for your use case: opaque Black Box models or transparent White Box models.
Read More
Managing Software Security Vulnerabilities With a Security Dashboard
Learn which Machine Learning model is best for your use case: opaque Black Box models or transparent White Box models.
Read More
How the SLSA Framework Prevents Software Supply Chain Attacks
Learn which Machine Learning model is best for your use case: opaque Black Box models or transparent White Box models.
Read More
White Box vs. Black Box Algorithms in Machine Learning
Learn which Machine Learning model is best for your use case: opaque Black Box models or transparent White Box models.
Read More
How to Build an Identity Graph with Graph Databases
Learn how to use Python to build & query an Identity Graph. Identity graphs let you understand how to better personalize & target customers.
Read More
How to Use Python for Face Verification
Learn how to build a face verification program using Python. Includes a prebuilt runtime environment so you start coding right away.
Read More











