Our Blog Posts

Featured Blog

Disinformation Is An Open Source Problem

The Oxford dictionary defines disinformation as “false information which is intended to mislead.” That simple definition seems to understate the problem, given the fact that ...
Read More →
All Blog Posts
Search
python 2 in supply chain
The Python 2 Threat in Your Supply Chain Is Real
Python 2 in development and test environments pose an undue risk in the face of escalating supply chain attacks.
Read More →
Java Log4j Vulnerability
ActiveState’s Official Statement on the Java Log4j Vulnerability
After careful auditing, it has been established that ActiveState is not impacted by the critical Apache Log4j vulnerability, CVE-2021-44228.
Read More →
pypi security supply chain
PyPI security pitfalls and steps towards a secure Python ecosystem
PyPI is improving Python supply chain security, but gaps still exist. Learn the tools and techniques to avoid Python's security pitfalls.
Read More →
IoT Security
Managing IoT Security Threats and Vulnerabilities Better
Securing IoT devices means securing their network, supply chain, and automating vulnerability remediation. Here's how.
Read More →
Working with vulnerable python packages blog cover
How to work with vulnerable Python packages, and stay secure
Vulnerabilities are a fact of Python developer life. Read this post to learn how to automate vulnerability remediation quickly and easily.
Read More →
CircleCI Optimization
How to make your CircleCI runs faster, and more secure
Learn how to make your CircleCI runs faster and more secure by using a prebuilt runtime environment.
Read More →
synthetic data python
Top 10 Python Packages for Creating Synthetic Data
Data is expensive, but synthetic data can be just as good for a fraction of the cost. Learn how to generate synthetic data.
Read More →
Which Python Dependency Manager Should You Choose?
Which Python Dependency Manager Should I Choose?
Dependency management is hard. Environment management is harder. Learn how to do both, easier.
Read More →
How to Avoid Becoming the Next SolarWinds
Software supply chain attacks have been happening for years, but have only recently achieved mainstream notoriety with the SolarWinds attack in December 2020. The reason ...
Read More →
Top 5 CyberSecurity Events
Top 5 Software Security Events For Business Leaders
With cyberattacks like ransomware and supply chain attacks like SolarWinds dominating the news cycle, security, more than ever, is everyone’s business. But cybersecurity is a ...
Read More →
amazon rainforests analysis using Python
Human Impact on Amazon Rainforests: A Geospatial Analysis Using Python
Learn how to use Python to examine human impact on the Amazon rainforest.
Read More →
supply chain security european union
European union’s supply chain security guidelines for software suppliers
The European Union Agency for CyberSecurity (ENISA) is an agency of the European Union (EU) that helps the EU address cybersecurity through policy and trusted ...
Read More →

Stay up-to-date with our mailing list

Scroll to Top