Resources

Check out what we've been up to

Filters
Search
  • All
  • Blog
  • Case Studies
  • Data Sheets
  • Product Demos
  • Quick Reads
  • Resources
  • Uncategorised
  • Videos
  • Webinars
  • Whitepapers
All
  • All
  • Blog
  • Case Studies
  • Data Sheets
  • Product Demos
  • Quick Reads
  • Resources
  • Uncategorised
  • Videos
  • Webinars
  • Whitepapers
Anaconda Alternatives
ActiveState: The Anaconda Alternative for an Easier, More Secure Python
Python comes in many flavors, offering Pythonistas more than one way to accomplish their tasks. But for developers, the key criteria for making a choice ...
Read More →
ActiveState Announces Trusted Publisher Integration with PyPI
ActiveState is excited to help provide a new layer of security to Python package publishing through our integration with Trusted Publishing for PyPI. This integration ...
Read More →
Software Supply Chain Tech Debt
How To Outsource Software Supply Chain Maintenance
Open source software supply chain maintenance is the new tech debt. Learn how to minimize its costs through outsourcing.
Read More →
Webinar - Securing Python and Open Source Ecosystems
Securing Python and Open Source Ecosystems
Dustin Ingram, Fellow at the Python Software Foundation (PSF), joins us to discuss trust and security for PyPI and other repositories in light of recent ...
Read More →
RedHat & Debian End Support For Python 2
Debian, CentOS & RHEL no longer support Python 2. Learn how ActiveState keeps your Python 2 app secure while automating migration to Python 3.
Read More →
Webinar - Future-Proofing Your Codebase With the Help of Auto-Refactoring
Future-Proofing Your Codebase With the Help of Auto-Refactoring
Stuck on legacy codebases but scared of updates breaking your app? Learn how auto-refactoring can help you leap to the latest Python and dependency versions ...
Read More →
Binary Scanner Risk
Why Binary Scanners Increase Cybersecurity Risk
Binary scanners provide security insight if source code is unavailable, but may result in more security risk than they resolve.
Read More →
Cybersecurity Burnout
How to Combat CyberSecurity Burnout
Cybersecurity burnout is increasing as incidents escalate. Learn how you can shift your focus from reactive to proactive with managed tools.
Read More →
SEC Cybersecurity Metrics
SEC Cybersecurity Disclosure And The Missing Metrics
SEC cybersecurity disclosures need to be based on AppSec, InfoSec and increasingly software supply chain metrics. Learn what they are.
Read More →
GitHub Fork Bomb
GitHub’s Malicious Repo Explosion & How to Avoid It
GitHub malware fork bombs poison the software supply chain at the point of source code generation. Learn how to avoid becoming a victim.
Read More →
Vendor Risk Management
The Problem With Vendor Risk Management For FinServ
Vendor risk management spikes when evaluating the cybersecurity practices of open source authors. Learn how you can better manger their risk.
Read More →
Webinar - Walking Dead Past Python EOL
Walking Dead Past Python EOL
Stuck living with zombie applications running on Python 2, 3.7 or other past-EOL software? Learn the case for maintaining vs. upgrading, and how you can ...
Read More →
Scroll to Top