Important Notice: Due to the AWS outage, you may experience some technical issues while using our services today

ActiveState Academy is live 🚀 Free Container Security Certification – Start Now

Blog

All Blog Posts
Perl 5.40 Now Generally Available
Perl 5.40 addresses the key use case of maintaining legacy Perl since you can now write cleaner, optimized code with better readability.
Read More
The Need for a Dependency Security Discipline Within AppSec
DepSec as a specialized discipline within AppSec lets orgs reduce costs & improve outcomes when securing open source dependencies.
Read More
Chainguard vs ActiveState Hardened Containers
Learn how you can decrease Mean Time To Remediation (MTTR) by outsourcing the responsibility of securing your containers to a third party. 
Read More
How ActiveState Helps With Secure Software Development Framework (SSDF) Adoption
A Secure Software Development Framework (SSDF) can dramatically slow down code delivery unless you automate key requirements. Learn how.
Read More
The Future of Open Source: Addressing The Elephant In The Room
Without a realistic vision for open source security, 30 years of learned behaviour is hard to change. Learn why it takes a community.
Read More
Application Posture Management & Open Source Security
ASPM provides enterprise-wide insight into vulnerabilities, but do you really need another tool to solve the problem of having too many tools?
Read More
The Digital Supply Chain Is Vulnerable By Design
US CISA's Secure By Design software development principles prioritize security over features. Learn how to do it without losing market share.
Read More
The Business Case For An Outsourced Software Supply Chain
Outsourcing your software supply chain can not only save you money, but also help you realize your security & productivity goals. Learn more.
Read More
Software Supply Chain Security is a Dependency Management Problem
The pain of dependency management means vendors rarely update their apps leading to security issues. Learn how to automate dependency updates
Read More
How To Outsource Software Supply Chain Maintenance
Open source software supply chain maintenance is the new tech debt. Learn how to minimize its costs through outsourcing.
Read More
RedHat & Debian End Support For Python 2
Debian, CentOS & RHEL no longer support Python 2. Learn how ActiveState keeps your Python 2 app secure while automating migration to Python 3.
Read More
Why Binary Scanners Increase Cybersecurity Risk
Binary scanners provide security insight if source code is unavailable, but may result in more security risk than they resolve.
Read More
Scroll to Top