Our Blog Posts

Featured Blog

Disinformation Is An Open Source Problem

The Oxford dictionary defines disinformation as “false information which is intended to mislead.” That simple definition seems to understate the problem, given the fact that ...
Read More →
All Blog Posts
Search
Python for DevOps
Top 10 Python Packages for DevOps
Learn how to use key Python libraries to automate common DevOps uses cases. Provides a prebuilt Python environment and sample code.
Read More →
Build an AI Text Detector
How to Build an AI Text Detector Using Python
AI-generated text is proliferating. This Python tutorial lets you create a simple script to help detect AI-generated text.
Read More →
Chain of Custody in the Software Supply Chain
How to Implement a Chain of Custody for Your Software Supply Chain
Implementing chain of custody at scale for your software supply chain is a non-trivial task. Learn how ActiveState can help.
Read More →
The Growing Threat of AI Externalities
AI-generated data is poisoning AI application training data, while AI-generated code is making every app less secure. Learn what you can do.
Read More →
Open Source Observability Reduces Vulnerability Risk
Learn how to eliminate silos and identify vulnerabilities across the extended enterprise and down to the lowest transitive dependency.
Read More →
SBOMs for Medical Devices – Everything You Need to Know
Medical Device Manufacturers must provide SBOMs by Oct 2023 per FDA requirements. Learn about SBOM best practices for healthcare.
Read More →
How to Ensure Supply Chain Security for AI Applications
Machine Learning is at the heart of the boom in AI Applications, revolutionizing various domains. How can we stay secure while moving fast?
Read More →
Top 10 AI-Generated Code Tools
Which AI code generation tool is best? Compare the pros and cons of standalone chatbot code generators versus IDE-integrated assistants.
Read More →
Reducing Mean Time To Remediation for Open Source Vulnerabilities
Learn which Machine Learning model is best for your use case: opaque Black Box models or transparent White Box models.
Read More →
Managing Software Security Vulnerabilities With a Security Dashboard
Learn which Machine Learning model is best for your use case: opaque Black Box models or transparent White Box models.
Read More →
How the SLSA Framework Prevents Software Supply Chain Attacks
Learn which Machine Learning model is best for your use case: opaque Black Box models or transparent White Box models.
Read More →
White Box vs. Black Box Algorithms in Machine Learning
Learn which Machine Learning model is best for your use case: opaque Black Box models or transparent White Box models.
Read More →

Stay up-to-date with our mailing list

Scroll to Top