Our Blog Posts

Featured Blog

Disinformation Is An Open Source Problem

The Oxford dictionary defines disinformation as “false information which is intended to mislead.” That simple definition seems to understate the problem, given the fact that ...
Read More →
All Blog Posts
Search
Top 10 AI-Generated Code Tools
Which AI code generation tool is best? Compare the pros and cons of standalone chatbot code generators versus IDE-integrated assistants.
Read More →
Reducing Mean Time To Remediation for Open Source Vulnerabilities
Learn which Machine Learning model is best for your use case: opaque Black Box models or transparent White Box models.
Read More →
Managing Software Security Vulnerabilities With a Security Dashboard
Learn which Machine Learning model is best for your use case: opaque Black Box models or transparent White Box models.
Read More →
How the SLSA Framework Prevents Software Supply Chain Attacks
Learn which Machine Learning model is best for your use case: opaque Black Box models or transparent White Box models.
Read More →
White Box vs. Black Box Algorithms in Machine Learning
Learn which Machine Learning model is best for your use case: opaque Black Box models or transparent White Box models.
Read More →
How to Build an Identity Graph with Graph Databases
Learn how to use Python to build & query an Identity Graph. Identity graphs let you understand how to better personalize & target customers.
Read More →
How to Use Python for Face Verification
Learn how to build a face verification program using Python. Includes a prebuilt runtime environment so you start coding right away.
Read More →
Learning Python Made Easy – With the ActiveState Platform
See how to use the ActiveState Platform to get started learning Python programming faster and easier than using pip.
Read More →
Us Government Fails It’s Own Software Supply Chain Security Test
US government devs are now exempt from key supply chain security requirements like attestations. This has serious ramifications. Learn why.
Read More →
State of the Software Supply Chain Security: Market Glance
The IDC Software Supply Chain Market Glance highlights a number of vendors that can help you contain emerging supply chain threats.
Read More →
Why Traditional AppSec Tools Fail at Software Supply Chain Security
AppSec Tools focus on the tip of the Software Supply Chain threat iceberg. Learn about new tools required to counter supply chain threats.
Read More →
ActiveState Software Attestations Early Access Wrap Up
ActiveState's Software Attestation Early Access Program provides a hands-on introduction on how to work with Attestations. See how.
Read More →

Stay up-to-date with our mailing list

Scroll to Top