Our Blog Posts

Featured Blog
Outsoured Software Supply Chain Biz Case

The Business Case For An Outsourced Software Supply Chain

Outsourcing your software supply chain can not only save you money, but also help you realize your security & productivity goals. Learn more.
Read More →
All Blog Posts
Search
ActiveState Announces Trusted Publisher Integration with PyPI
ActiveState is excited to help provide a new layer of security to Python package publishing through our integration with Trusted Publishing for PyPI. This integration ...
Read More →
Software Supply Chain Tech Debt
How To Outsource Software Supply Chain Maintenance
Open source software supply chain maintenance is the new tech debt. Learn how to minimize its costs through outsourcing.
Read More →
RedHat & Debian End Support For Python 2
Debian, CentOS & RHEL no longer support Python 2. Learn how ActiveState keeps your Python 2 app secure while automating migration to Python 3.
Read More →
Binary Scanner Risk
Why Binary Scanners Increase Cybersecurity Risk
Binary scanners provide security insight if source code is unavailable, but may result in more security risk than they resolve.
Read More →
Cybersecurity Burnout
How to Combat CyberSecurity Burnout
Cybersecurity burnout is increasing as incidents escalate. Learn how you can shift your focus from reactive to proactive with managed tools.
Read More →
SEC Cybersecurity Metrics
SEC Cybersecurity Disclosure And The Missing Metrics
SEC cybersecurity disclosures need to be based on AppSec, InfoSec and increasingly software supply chain metrics. Learn what they are.
Read More →
GitHub Fork Bomb
GitHub’s Malicious Repo Explosion & How to Avoid It
GitHub malware fork bombs poison the software supply chain at the point of source code generation. Learn how to avoid becoming a victim.
Read More →
Vendor Risk Management
The Problem With Vendor Risk Management For FinServ
Vendor risk management spikes when evaluating the cybersecurity practices of open source authors. Learn how you can better manger their risk.
Read More →
Eliminate Malware
How to Eliminate the Threat of Malware
Eliminating malware from the software supply chain means building dependencies from source code. Learn how to do it cost effectively.
Read More →
How Secure is your Python?
How Secure Should Your Python Supply Chain Be?
The security risk appetite for a project evolves over time. Learn how ActiveState's tiered approach reduces risk as requirements evolve. 
Read More →
Vulnerabilities by Owner
It’s Zero Day! Do You Know Where Your Vulnerabilities Are?
Ransomware attacks are increasingly being launched from malware originating in open source ecosystems. Learn what you can do about it.
Read More →
Best Practices: Building Dependencies From Source Code Without The Pain
Building open source dependencies from source code is painful, but it's the only way to ensure security. Learn how to automate the process.
Read More →

Stay up-to-date with our mailing list

Scroll to Top