Resources

Check out what we've been up to

Filters
Search
  • All
  • Blog
  • Case Studies
  • Data Sheets
  • Product Demos
  • Quick Reads
  • Resources
  • Uncategorised
  • Videos
  • Webinars
  • Whitepapers
All
  • All
  • Blog
  • Case Studies
  • Data Sheets
  • Product Demos
  • Quick Reads
  • Resources
  • Uncategorised
  • Videos
  • Webinars
  • Whitepapers
Vendor Risk Management
The Problem With Vendor Risk Management For FinServ
Vendor risk management spikes when evaluating the cybersecurity practices of open source authors. Learn how you can better manger their risk.
Read More →
Webinar - Walking Dead Past Python EOL
Walking Dead Past Python EOL
With Red Hat dropping Python 2 support, more organizations will be stuck maintaining zombie legacy apps. Stop racing against EOL dates and letting bad practices ...
Read More →
Eliminate Malware
How to Eliminate the Threat of Malware
Eliminating malware from the software supply chain means building dependencies from source code. Learn how to do it cost effectively.
Read More →
Buyers Guide: Securing Your Software Supply Chain
Unravel the complexities of supply chain security with our in-depth whitepaper, meticulously crafted to empower your software development journey.
Read More →
How Secure is your Python?
How Secure Should Your Python Supply Chain Be?
The security risk appetite for a project evolves over time. Learn how ActiveState's tiered approach reduces risk as requirements evolve. 
Read More →
Webinar - Breaking Cybersecurity Bad Habits
Breaking Cybersecurity Bad Habits: A DevOps Perspective
With SEC and new US litigation risks, it’s time to kick cybersecurity bad habits. Get a DevOps leader’s perspective on using open source in an ...
Read More →
Vulnerabilities by Owner
It’s Zero Day! Do You Know Where Your Vulnerabilities Are?
Ransomware attacks are increasingly being launched from malware originating in open source ecosystems. Learn what you can do about it.
Read More →
Druva’s Journey to Seamless Secure Software Development with ActiveState
Druva enables cyber, data, and operational resilience with the Data Resiliency Cloud, a fully managed, 100% SaaS platform that protects customers’ data wherever it lives. ...
Read More →
Dependency Build Automation
Best Practices: Building Dependencies From Source Code Without The Pain
Building open source dependencies from source code is painful, but it's the only way to ensure security. Learn how to automate the process.
Read More →
Codebase Updates
Best Practices: How To Update Your Codebase Without Breaking The Build
Most organizations never update their codebase for fear of breaking the build. Here's how to manage the risk and minimize the cost.
Read More →
Buyers Guide: Securing Your Software Supply Chain Part 2: Build Tools
Unravel the complexities of supply chain security with our in-depth whitepaper, meticulously crafted to empower your software development journey.
Read More →
How to Secure Your Codebase
Best Practices: How to Secure Your Codebase
The best way to avoid remediating vulnerabilities is to start with a non-vulnerable codebase. Learn the best practices to starting secure.
Read More →
Scroll to Top