Important Notice: Due to the AWS outage, you may experience some technical issues while using our services today

Introducing ActiveState Curated Catalogs. Total Control for Security. Zero Friction for Developers. Vetted components from 79M+ built-from-source packages → Learn More

Blog

All Blog Posts
Image of a man at a computer, used on the blog post about container hardening
Container Hardening Is Only Step One: How to Secure the Full Software Lifecycle
Container hardening reduces risk at build time, but not after deployment. Learn how to secure the full software lifecycle.
Read More
Open Source Is Under Attack. Here’s How to Manage the Risk Without Abandoning the Benefit
In March 2026, a threat actor known as TeamPCP executed one of the most consequential open source supply chain attacks on record. Starting with a ...
Read More
Image of a computer with code on it, used as a featured image for the article titled "Zero-Day Vulnerabilities: What Are They and How Can You Minimize Exploits Across the Software Lifecycle?"
Zero-Day Vulnerabilities: What Are They and How Can You Minimize Exploits Across the Software Lifecycle?
Learn how to detect and remediate zero-day vulnerabilities across the software lifecycle and reduce exposure before disclosure.
Read More
ActiveState vs. Chainguard®: Choosing the Right Open Source Security Strategy for 2026
The modern software development lifecycle is no longer operating at human scale. AI code assistants have fundamentally shifted the open source security challenge from a ...
Read More
Beyond Claude® Code Security: Closing the Remediation Gap in Your Supply Chain
Key Takeaways The Remediation Gap: While 96% of enterprise apps run on open source, the real risk isn’t the software itself, it’s the unmanaged components. ...
Read More
Stop Reacting to Vulnerabilities: Introducing the ActiveState Curated Catalog
Stop Reacting to Vulnerabilities: Introducing the ActiveState Curated Catalog
For years, security and engineering leaders have been forced to choose between two extremes: allow developers “wild west” access to public registries to maintain speed, ...
Read More
Improving Security Posture with Curated Catalogs
What curated catalogs are, why they’re critical to AI-driven development, and how to evaluate them In 2026, the software supply chain has reached machine scale, ...
Read More
2026 Webinar: Closing the Container Security Gap
Key Insights from 2026 State of Vulnerability Management Report & Remediation Report  | Container Edition A Dark Reading webinar with ActiveState Container adoption has become ...
Read More
Predictions For Open Source in 2026: AI Innovation, Maintainer Burnout, and the Compliance Crunch
The open source ecosystem stands at an inflection point. For decades, development teams have benefited from the collaborative power of open source software, accelerating time ...
Read More
What Is a Software Supply Chain? A Definitive Guide (From Basics to Best Practices)
Modern software isn’t “written”, it’s assembled. Your application code is only one piece. The rest comes from open-source applications, languages, and packages. Build tools, CI/CD ...
Read More
ActiveState’s Open Source Security Best Practices for 2026: A Practical Guide for DevSecOps Teams Title Image
ActiveState’s Open Source Security Best Practices for 2026: A Practical Guide for DevSecOps Teams
Open source is the backbone of modern software and that’s exactly why attackers pay attention to it. Synopsys’ 2024 OSSRA findings reported that 74% of ...
Read More
The State of Vulnerability Management & Remediation Report 2026 – Available Now!
More Containers, More Problems Containers have become foundational to modern software development. They power CI/CD pipelines, enable cloud-native architectures, and accelerate deployment cycles. But as ...
Read More
Scroll to Top