Read
Filters
- All
- Blog
- Case Study
- Data Sheet
- Quick Read
- Whitepaper
All
- All
- Blog
- Case Study
- Data Sheet
- Quick Read
- Whitepaper
What the RSAC™ 2026 Conference Told ActiveState About the State of Security — And Where We Go From Here
March 31, 2026
Blog
Every year, RSAC brings the security industry together — and every year, the conversations on the floor reveal where the real pressure points are. In ...
Read More
Container Hardening Is Only Step One: How to Secure the Full Software Lifecycle
March 26, 2026
Blog
Container hardening reduces risk at build time, but not after deployment. Learn how to secure the full software lifecycle.
Read More
Open Source Is Under Attack. Here’s How to Manage the Risk Without Abandoning the Benefit
March 25, 2026
Blog
In March 2026, a threat actor known as TeamPCP executed one of the most consequential open source supply chain attacks on record. Starting with a ...
Read More
Zero-Day Vulnerabilities: What Are They and How Can You Minimize Exploits Across the Software Lifecycle?
March 24, 2026
Blog
Learn how to detect and remediate zero-day vulnerabilities across the software lifecycle and reduce exposure before disclosure.
Read More
ActiveState vs. Chainguard®: Choosing the Right Open Source Security Strategy for 2026
March 23, 2026
Blog
The modern software development lifecycle is no longer operating at human scale. AI code assistants have fundamentally shifted the open source security challenge from a ...
Read More
Beyond Claude® Code Security: Closing the Remediation Gap in Your Supply Chain
March 19, 2026
Blog
Key Takeaways The Remediation Gap: While 96% of enterprise apps run on open source, the real risk isn’t the software itself, it’s the unmanaged components. ...
Read More
Stop Reacting to Vulnerabilities: Introducing the ActiveState Curated Catalog
March 17, 2026
Blog
For years, security and engineering leaders have been forced to choose between two extremes: allow developers “wild west” access to public registries to maintain speed, ...
Read More
Curated OSS Catalog Evaluation Checklist
March 3, 2026
Quick Read
A 2026 checklist for evaluating curated open source catalogs across security vetting, SBOM, supply chain transparency, and compliance.
Read More
Improving Security Posture with Curated Catalogs
March 3, 2026
Blog
What curated catalogs are, why they’re critical to AI-driven development, and how to evaluate them In 2026, the software supply chain has reached machine scale, ...
Read More
2026 Webinar: Closing the Container Security Gap
February 10, 2026
Blog
Key Insights from 2026 State of Vulnerability Management Report & Remediation Report | Container Edition A Dark Reading webinar with ActiveState Container adoption has become ...
Read More
Predictions For Open Source in 2026: AI Innovation, Maintainer Burnout, and the Compliance Crunch
January 22, 2026
Blog
The open source ecosystem stands at an inflection point. For decades, development teams have benefited from the collaborative power of open source software, accelerating time ...
Read More
What Is a Software Supply Chain? A Definitive Guide (From Basics to Best Practices)
January 13, 2026
Blog
Modern software isn’t “written”, it’s assembled. Your application code is only one piece. The rest comes from open-source applications, languages, and packages. Build tools, CI/CD ...
Read More










