Our Blog Posts

Featured Blog
Outsoured Software Supply Chain Biz Case

The Business Case For An Outsourced Software Supply Chain

Outsourcing your software supply chain can not only save you money, but also help you realize your security & productivity goals. Learn more.
Read More →
All Blog Posts
Search
Software Supply Chain Buyer’s Guide: Securing the Import Process
Organizations are increasingly concerned with the security of their software supply chain, but have trouble navigating the ever-expanding labyrinth of open source and proprietary software ...
Read More →
Software Composition Analysis (SCA) Tools Compared
A Software Composition Analysis (SCA) tool provides organizations with three key ways to understand the open source software used within their application: Because open source ...
Read More →
Software Bill Of Materials (SBOMs) Compared
Software Bill Of Materials (SBOMs) are becoming increasingly important, and even a critical requirement if you’re aUS government vendor  or a  medical device manufacturer. This ...
Read More →
Disinformation Is An Open Source Problem
The Oxford dictionary defines disinformation as “false information which is intended to mislead.” That simple definition seems to understate the problem, given the fact that ...
Read More →
Open Source Security Stack
Traditional open source security stacks focus on traditional security challenges, and may be lacking when it comes to addressing emerging threats such as those posed ...
Read More →
Software Supply Chain Security Buyers Guide
Software Supply Chain Security Buyers Guide
The software supply chain is both wide and deep, as is the tidal wave of solutions offered by the market. Learn how to best approach ...
Read More →
Python for DevOps
Top 10 Python Packages for DevOps
Learn how to use key Python libraries to automate common DevOps uses cases. Provides a prebuilt Python environment and sample code.
Read More →
Build an AI Text Detector
How to Build an AI Text Detector Using Python
AI-generated text is proliferating. This Python tutorial lets you create a simple script to help detect AI-generated text.
Read More →
Chain of Custody in the Software Supply Chain
How to Implement a Chain of Custody for Your Software Supply Chain
Implementing chain of custody at scale for your software supply chain is a non-trivial task. Learn how ActiveState can help.
Read More →
The Growing Threat of AI Externalities
AI-generated data is poisoning AI application training data, while AI-generated code is making every app less secure. Learn what you can do.
Read More →
Open Source Observability Reduces Vulnerability Risk
Learn how to eliminate silos and identify vulnerabilities across the extended enterprise and down to the lowest transitive dependency.
Read More →
SBOMs for Medical Devices – Everything You Need to Know
Medical Device Manufacturers must provide SBOMs by Oct 2023 per FDA requirements. Learn about SBOM best practices for healthcare.
Read More →

Stay up-to-date with our mailing list

Scroll to Top