Resources

Check out what we've been up to

Filters
Search
  • All
  • Blog
  • Case Studies
  • Data Sheets
  • Product Demos
  • Quick Reads
  • Resources
  • Uncategorised
  • Videos
  • Webinars
  • Whitepapers
All
  • All
  • Blog
  • Case Studies
  • Data Sheets
  • Product Demos
  • Quick Reads
  • Resources
  • Uncategorised
  • Videos
  • Webinars
  • Whitepapers
Vendor Risk Management
The Problem With Vendor Risk Management For FinServ
Vendor risk management spikes when evaluating the cybersecurity practices of open source authors. Learn how you can better manger their risk.
Read More →
Webinar - Walking Dead Past Python EOL
Walking Dead Past Python EOL
Stuck living with zombie applications running on Python 2, 3.7 or other past-EOL software? Learn the case for maintaining vs. upgrading, and how you can ...
Read More →
Eliminate Malware
How to Eliminate the Threat of Malware
Eliminating malware from the software supply chain means building dependencies from source code. Learn how to do it cost effectively.
Read More →
Buyers Guide: Securing Your Software Supply Chain
Unravel the complexities of supply chain security with our in-depth whitepaper, meticulously crafted to empower your software development journey.
Read More →
Buyers Guide: Securing Your Software Supply Chain Part 1: Import Tools
Unravel the complexities of supply chain security with our in-depth whitepaper, meticulously crafted to empower your software development journey.
Read More →
Buyers Guide: Securing Your Software Supply Chain Part 2: Build Tools
Unravel the complexities of supply chain security with our in-depth whitepaper, meticulously crafted to empower your software development journey.
Read More →
How Secure is your Python?
How Secure Should Your Python Supply Chain Be?
The security risk appetite for a project evolves over time. Learn how ActiveState's tiered approach reduces risk as requirements evolve. 
Read More →
Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk
Tech debt is an unavoidable consequence of modern application development, leading to security and performance concerns as older open-source codebases become more vulnerable and outdated. ...
Read More →
Webinar - Breaking Cybersecurity Bad Habits
Breaking Cybersecurity Bad Habits: A DevOps Perspective
With SEC and new US litigation risks, it’s time to kick cybersecurity bad habits. Get a DevOps leader’s perspective on using open source in an ...
Read More →
Vulnerabilities by Owner
It’s Zero Day! Do You Know Where Your Vulnerabilities Are?
Ransomware attacks are increasingly being launched from malware originating in open source ecosystems. Learn what you can do about it.
Read More →
Druva’s Journey to Seamless Secure Software Development with ActiveState
Druva enables cyber, data, and operational resilience with the Data Resiliency Cloud, a fully managed, 100% SaaS platform that protects customers’ data wherever it lives. ...
Read More →
Best Practices: Building Dependencies From Source Code Without The Pain
Building open source dependencies from source code is painful, but it's the only way to ensure security. Learn how to automate the process.
Read More →
Scroll to Top