Important Notice: Due to the AWS outage, you may experience some technical issues while using our services today

Automate security governance across any AI coding environment for total confidence and built-from-source protection. → Learn More

Read

Read

Filters
  • All
  • Blog
  • Case Study
  • Data Sheet
  • Quick Read
  • Whitepaper
All
  • All
  • Blog
  • Case Study
  • Data Sheet
  • Quick Read
  • Whitepaper
You Don’t Need Your Ducks in a Row to Get Your Ducks in a Row
Waiting until you're "organized" to secure your open source supply chain is costing you. Learn the practical framework that gets you moving—starting today.
Read More
The Axios Software Supply Chain Attack: What Happened and Why a Curated Catalog Would Have Stopped It Cold
Axios NPM Breach: Learn how to detect the infection, rotate keys, and secure your supply chain now.
Read More
SSDF and SLSA for FedRAMP and Regulated Environments: What Are Auditors Actually Looking For?
Learn how SSDF and SLSA help regulated organizations prove provenance, secure builds, and remediation for FedRAMP audits.
Read More
The AI Coding Problem No One Is Governing
Dependency cooldowns reduce blast radius — but they're not a sourcing strategy. Learn why software supply chain security requires provenance and governance, not just patience.
Read More
A Cooldown Is Not a Sourcing Strategy
Dependency cooldowns reduce blast radius — but they're not a sourcing strategy. Learn why software supply chain security requires provenance and governance, not just patience.
Read More
Beyond Scan & Pray: Why Curate & Govern Is the Only Model Built for AI-Speed Risk
Scan & Pray can't keep pace with AI-generated code. Learn why Curate & Govern is the security posture built for the speed and scale of ...
Read More
The Vulnerability Database Security Teams Depend On Just Hit a Structural Ceiling
NIST can no longer enrich all CVEs. If your security program depends on NVD data for prioritization, you now have a documented gap in your ...
Read More
Global Proprietary Trading Firm Hardens Python Supply Chain against Malicious Attacks with ActiveState
Python security for financial firms starts with eliminating public repository risk. See how a global trading firm moved to a private, source-built catalog with ActiveState ...
Read More
The “As Is” Clause Was Never the Problem
The "as is" open source clause was never the problem — enterprise assumptions were. Discover why AI-assisted development has made legacy open source governance untenable, ...
Read More
When “Secure by Default” Only Works in One Tool, You Don’t Have a Governance Model
AI coding assistants are making dependency decisions faster than your team can review them. A tool-level integration only governs the developers who use that tool. ...
Read More
15 Container Security Best Practices for Engineering Teams in 2026
Learn 15 container security best practices for engineering teams, including Kubernetes policies, secrets management, and runtime protection.
Read More
The Quiet Foundation of AI-Native Development
AI agents are resolving open source dependencies at machine speed, with no human in the loop. ActiveState gives your environment the provenance, remediation, and reproducibility ...
Read More
Scroll to Top