Resources

Check out what we've been up to

Filters
Search
  • All
  • Blog
  • Case Studies
  • Data Sheets
  • Events
  • Product Demos
  • Quick Reads
  • Resources
  • Uncategorised
  • Videos
  • Webinars
  • Whitepapers
All
  • All
  • Blog
  • Case Studies
  • Data Sheets
  • Events
  • Product Demos
  • Quick Reads
  • Resources
  • Uncategorised
  • Videos
  • Webinars
  • Whitepapers
Webinar - Walking Dead Past Python EOL
Walking Dead Past Python EOL
Stuck living with zombie applications running on Python 2, 3.7 or other past-EOL software? Learn the case for maintaining vs. upgrading, and how you can ...
Read More →
Eliminate Malware
How to Eliminate the Threat of Malware
Eliminating malware from the software supply chain means building dependencies from source code. Learn how to do it cost effectively.
Read More →
Buyers Guide: Securing Your Software Supply Chain
Unravel the complexities of supply chain security with our in-depth whitepaper, meticulously crafted to empower your software development journey.
Read More →
Buyers Guide: Securing Your Software Supply Chain Part 1: Import Tools
Unravel the complexities of supply chain security with our in-depth whitepaper, meticulously crafted to empower your software development journey.
Read More →
Buyers Guide: Securing Your Software Supply Chain Part 2: Build Tools
Unravel the complexities of supply chain security with our in-depth whitepaper, meticulously crafted to empower your software development journey.
Read More →
How Secure is your Python?
How Secure Should Your Python Supply Chain Be?
The security risk appetite for a project evolves over time. Learn how ActiveState's tiered approach reduces risk as requirements evolve. 
Read More →
Webinar - Breaking Cybersecurity Bad Habits
Breaking Cybersecurity Bad Habits: A DevOps Perspective
With SEC and new US litigation risks, it’s time to kick cybersecurity bad habits. Get a DevOps leader’s perspective on using open source in an ...
Read More →
Vulnerabilities by Owner
It’s Zero Day! Do You Know Where Your Vulnerabilities Are?
Ransomware attacks are increasingly being launched from malware originating in open source ecosystems. Learn what you can do about it.
Read More →
Druva’s Journey to Seamless Secure Software Development with ActiveState
Druva enables cyber, data, and operational resilience with the Data Resiliency Cloud, a fully managed, 100% SaaS platform that protects customers’ data wherever it lives. ...
Read More →
Best Practices: Building Dependencies From Source Code Without The Pain
Building open source dependencies from source code is painful, but it's the only way to ensure security. Learn how to automate the process.
Read More →
Best Practices: How To Update Your Codebase Without Breaking The Build
Most organizations never update their codebase for fear of breaking the build. Here's how to manage the risk and minimize the cost.
Read More →
Best Practices: How to Secure Your Codebase
The best way to avoid remediating vulnerabilities is to start with a non-vulnerable codebase. Learn the best practices to starting secure.
Read More →
Scroll to Top