Read
Filters
- All
- Blog
- Case Study
- Data Sheet
- Quick Read
- Whitepaper
All
- All
- Blog
- Case Study
- Data Sheet
- Quick Read
- Whitepaper
You Don’t Need Your Ducks in a Row to Get Your Ducks in a Row
May 19, 2026
Blog
Waiting until you're "organized" to secure your open source supply chain is costing you. Learn the practical framework that gets you moving—starting today.
Read More
The Axios Software Supply Chain Attack: What Happened and Why a Curated Catalog Would Have Stopped It Cold
May 14, 2026
Blog
Axios NPM Breach: Learn how to detect the infection, rotate keys, and secure your supply chain now.
Read More
SSDF and SLSA for FedRAMP and Regulated Environments: What Are Auditors Actually Looking For?
May 13, 2026
Blog
Learn how SSDF and SLSA help regulated organizations prove provenance, secure builds, and remediation for FedRAMP audits.
Read More
The AI Coding Problem No One Is Governing
May 12, 2026
Blog
Dependency cooldowns reduce blast radius — but they're not a sourcing strategy. Learn why software supply chain security requires provenance and governance, not just patience.
Read More
A Cooldown Is Not a Sourcing Strategy
May 11, 2026
Blog
Dependency cooldowns reduce blast radius — but they're not a sourcing strategy. Learn why software supply chain security requires provenance and governance, not just patience.
Read More
Beyond Scan & Pray: Why Curate & Govern Is the Only Model Built for AI-Speed Risk
May 8, 2026
Blog
Scan & Pray can't keep pace with AI-generated code. Learn why Curate & Govern is the security posture built for the speed and scale of ...
Read More
The Vulnerability Database Security Teams Depend On Just Hit a Structural Ceiling
May 6, 2026
Blog
NIST can no longer enrich all CVEs. If your security program depends on NVD data for prioritization, you now have a documented gap in your ...
Read More
Global Proprietary Trading Firm Hardens Python Supply Chain against Malicious Attacks with ActiveState
May 5, 2026
Case Study
Python security for financial firms starts with eliminating public repository risk. See how a global trading firm moved to a private, source-built catalog with ActiveState ...
Read More
The “As Is” Clause Was Never the Problem
May 5, 2026
Blog
The "as is" open source clause was never the problem — enterprise assumptions were. Discover why AI-assisted development has made legacy open source governance untenable, ...
Read More
When “Secure by Default” Only Works in One Tool, You Don’t Have a Governance Model
April 30, 2026
Blog
AI coding assistants are making dependency decisions faster than your team can review them. A tool-level integration only governs the developers who use that tool. ...
Read More
15 Container Security Best Practices for Engineering Teams in 2026
April 27, 2026
Blog
Learn 15 container security best practices for engineering teams, including Kubernetes policies, secrets management, and runtime protection.
Read More
The Quiet Foundation of AI-Native Development
April 24, 2026
Blog
AI agents are resolving open source dependencies at machine speed, with no human in the loop. ActiveState gives your environment the provenance, remediation, and reproducibility ...
Read More











