Resources

Check out what we've been up to

Filters
Search
  • All
  • Blog
  • Case Studies
  • Data Sheets
  • Product Demos
  • Quick Reads
  • Resources
  • Uncategorised
  • Videos
  • Webinars
  • Whitepapers
All
  • All
  • Blog
  • Case Studies
  • Data Sheets
  • Product Demos
  • Quick Reads
  • Resources
  • Uncategorised
  • Videos
  • Webinars
  • Whitepapers
Disinformation Is An Open Source Problem
The Oxford dictionary defines disinformation as “false information which is intended to mislead.” That simple definition seems to understate the problem, given the fact that ...
Read More →
Open Source Security Stack
Traditional open source security stacks focus on traditional security challenges, and may be lacking when it comes to addressing emerging threats such as those posed ...
Read More →
Software Supply Chain Security Buyers Guide
Software Supply Chain Security Buyers Guide
The software supply chain is both wide and deep, as is the tidal wave of solutions offered by the market. Learn how to best approach ...
Read More →
Achieving the Impossible: 3 Steps to Minimize Risk & Reap the Benefits of Secured Open Source
Learn the 3 tenets of securely integrating open source into your development process, so that you can make open source security seamless.
Read More →
Supply Chain Security Report Card
How secure is your software supply chain? This report card helps your organization see where it may be failing to import open source resources securely.
Read More →
Python for DevOps
Top 10 Python Packages for DevOps
Learn how to use key Python libraries to automate common DevOps uses cases. Provides a prebuilt Python environment and sample code.
Read More →
Build an AI Text Detector
How to Build an AI Text Detector Using Python
AI-generated text is proliferating. This Python tutorial lets you create a simple script to help detect AI-generated text.
Read More →
How to Secure Your Machine Learning Environments - Quick Read Featured Image
How to Secure Machine Learning Environments
What is Cloudera and Cloudera Machine Learning? Cloudera specializes in data management by offering a comprehensive platform for big data and analytics that includes various ...
Read More →
Chain of Custody in the Software Supply Chain
How to Implement a Chain of Custody for Your Software Supply Chain
Implementing chain of custody at scale for your software supply chain is a non-trivial task. Learn how ActiveState can help.
Read More →
Product Demo: Building Secure ML Runtimes for Cloudera Machine Learning
Cloudera Machine Learning, Securely Extended With the ActiveState Platform, you can easily generate ML Runtimes to securely extend your Cloudera Machine Learning (CML) environment with ...
Read More →
The Growing Threat of AI Externalities
AI-generated data is poisoning AI application training data, while AI-generated code is making every app less secure. Learn what you can do.
Read More →
Securing AI from Open Source Supply Chain Attacks
Pre-compiled binaries (Python wheels) have become an increasingly common supply chain attack vector. Learn how you can secure Python environments for AI projects, even in ...
Read More →
Scroll to Top