Read
Filters
- All
- Blog
- Case Study
- Data Sheet
- Quick Read
- Whitepaper
All
					- All
- Blog
- Case Study
- Data Sheet
- Quick Read
- Whitepaper
ActiveState’s Container Hardening Guide
					
																						
			October 30, 2025		
		 Blog		
		
		
			Learn and adopt the techniques today’s top engineering teams use to keep their images risk-free, secure, and compliant.		
					
					
														
									
								
													
						Read More
					
				
						Five Traits of Reliable Software Components
					
																						
			October 28, 2025		
		 Blog		
		
		
			Open source has become the backbone of modern software. From cloud infrastructure to AI frameworks, nearly every digital product depends on code written and maintained ...		
					
					
														
									
								
													
						Read More
					
				
						What’s the Difference Between a Hardened Container Image, Minimal Image, and Secure Image?
					
																						
			October 16, 2025		
		 Blog		
		
		
			“Secure Containers”, “Hardened Images”, “Low-to-No CVE Container Images”… If you or your team has recently been tasked with improving container security, this is just a ...		
					
					
														
									
								
													
						Read More
					
				
						Part 1: The Complete Guide to Container Security
					
																						
			October 10, 2025		
		 Resources		
		
		
			Learn and adopt the techniques today’s top engineering teams use to keep their images risk-free, secure, and compliant.		
					
					
														
									
								
													
						Read More
					
				
						Protect Your Team From Future NPM Attacks with ActiveState
					
																						
			October 8, 2025		
		 Blog		
		
		
			October is Cyber Security Awareness Month—a timely reminder that vigilance is not a one-week exercise, but a year-round necessity. Even weeks after the initial headlines ...		
					
					
														
									
								
													
						Read More
					
				
						ActiveState’s Checklist for Secure Containers
					
																						
			October 7, 2025		
		 Resources		
		
		
			Learn and adopt the techniques today’s top engineering teams use to keep their images risk-free, secure, and compliant.		
					
					
														
									
								
													
						Read More
					
				
						Introducing the ActiveState Trust Center
					
																						
			October 2, 2025		
		 Blog		
		
		
			With Gartner predicting that 45% of organizations will have experienced attacks on their software supply chains this year (2025)—a threefold increase from 2021—organizations need to ...		
					
					
														
									
								
													
						Read More
					
				
						The Power of Application Containers
					
																						
			September 30, 2025		
		 Blog		
		
		
			Application containers have become an essential building block in modern software development, helping teams move faster by removing the need to reinvent common infrastructure services. ...		
					
					
														
									
								
													
						Read More
					
				
						Level Up Your Container Security Skills with ActiveState Academy
					
																						
			September 23, 2025		
		 Blog		
		
		
			Amongst software development and security professionals, the term “shift-left” has become near ubiquitous within the industry. Countless articles and methodologies now push for the movement ...		
					
					
														
									
								
													
						Read More
					
				
						Keeping ActiveState Secure Containers Vulnerability Free
					
																						
			September 18, 2025		
		 Blog		
		
		
			While container usage has exploded, the status quo of container development remains risky. Public registries are full of outdated base images, dependency bloat, and unclear ...		
					
					
														
									
								
													
						Read More
					
				
						Unlocking Software Supply Chain Security: The Power of ReversingLabs Spectra Assure and ActiveState OSPM Integration
					
																						
			September 10, 2025		
		 Blog		
		
		
			The modern software supply chain is a double-edged sword. On one hand, open-source components and rapid development methodologies accelerate innovation and time to market. On ...		
					
					
														
									
								
													
						Read More
					
				
						How to Decide Which Python Vulnerabilities Deserve Your Attention First
					
																						
			September 9, 2025		
		 Blog		
		
		
			If you’ve ever run a vulnerability scan on a Python project, you know the feeling when hundreds of warnings appear, red flags fill the screen, ...		
					
					
														
									
								
													
						Read More
					
				
						 
				 
				











