Resources

Check out what we've been up to

Filters
Search
  • All
  • Blog
  • Case Studies
  • Data Sheets
  • Product Demos
  • Quick Reads
  • Resources
  • Uncategorised
  • Videos
  • Webinars
  • Whitepapers
All
  • All
  • Blog
  • Case Studies
  • Data Sheets
  • Product Demos
  • Quick Reads
  • Resources
  • Uncategorised
  • Videos
  • Webinars
  • Whitepapers
How Secure is your Python?
How Secure Should Your Python Supply Chain Be?
The security risk appetite for a project evolves over time. Learn how ActiveState's tiered approach reduces risk as requirements evolve. 
Read More →
Webinar - Breaking Cybersecurity Bad Habits
Breaking Cybersecurity Bad Habits: A DevOps Perspective
With SEC and new US litigation risks, it’s time to kick cybersecurity bad habits. Get a DevOps leader’s perspective on using open source in an ...
Read More →
Vulnerabilities by Owner
It’s Zero Day! Do You Know Where Your Vulnerabilities Are?
Ransomware attacks are increasingly being launched from malware originating in open source ecosystems. Learn what you can do about it.
Read More →
Druva’s Journey to Seamless Secure Software Development with ActiveState
Druva enables cyber, data, and operational resilience with the Data Resiliency Cloud, a fully managed, 100% SaaS platform that protects customers’ data wherever it lives. ...
Read More →
Dependency Build Automation
Best Practices: Building Dependencies From Source Code Without The Pain
Building open source dependencies from source code is painful, but it's the only way to ensure security. Learn how to automate the process.
Read More →
Codebase Updates
Best Practices: How To Update Your Codebase Without Breaking The Build
Most organizations never update their codebase for fear of breaking the build. Here's how to manage the risk and minimize the cost.
Read More →
Buyers Guide: Securing Your Software Supply Chain Part 2: Build Tools
Unravel the complexities of supply chain security with our in-depth whitepaper, meticulously crafted to empower your software development journey.
Read More →
How to Secure Your Codebase
Best Practices: How to Secure Your Codebase
The best way to avoid remediating vulnerabilities is to start with a non-vulnerable codebase. Learn the best practices to starting secure.
Read More →
Cybersecurity Resolutions for 2024
2024 New Year’s Cybersecurity Resolutions
The US government has begun prosecuting software vendors with lax cybersecurity controls. Learn how to conquer your bad security habits.
Read More →
Mercury Financial Harnessed the Power of ActiveState for Unrestricted Upgrades for Python 2 Beyond End of Life
Mercury Financial is an innovative Texas-based FinTech company that’s been revolutionizing the credit card and consumer lending industries since its inception in 2013. With a ...
Read More →
From Zero Days to Heroic Plays – 2023 a Year in Review
As we reflect on the software landscape of 2023, the overarching theme that defined the year was the growing emphasis on securing the software supply ...
Read More →
Webinar - Make Open Source Suck Less in 2024
Remove the Pains of Package & Environment Management
Learn why open source package and environment management tools fail at reproducibility, security and dependency management, and how you can get out of “dependency hell” ...
Read More →
Scroll to Top