Blog
All Blog Posts
How to Secure Your Software Builds with SLSA
Learn how you can take your existing systems and convert them to SLSA-ready implementations in order to help secure your supply chain.
Read More
US Government: Secure Software Supply Chain Best Practices
Learn how to comply with US government secure supply chain & software development requirements, including software attestations and SBOMs.
Read More
Python Tops Java As World’s Most Popular Programming Language
Python has replaced Java as the most popular programming language in the world. Learn what it means for Java developers.
Read More
How to Get Started with Data Visualization in Python
Learn how to get started with Python data visualization in Jupyter Notebooks using Pandas, matplotlib and seaborn.
Read More
Everything Developers Need to Know About Attestations
The US Government requires software vendors to provide self-attestation. Learn what attestations are and how to navigate these restrictions.
Read More
Why The US Government Is Mandating Software Bill Of Materials (SBOM)
The US Government has restricted sales of software to those that can provide an SBOM. Learn how to auto-generate SBOMs for your software.
Read More
PyTorch Foundation: Everything You Need To Know
PyTorch has found a new home with the Linux Foundation. Learn what it means going forward for your machine learning projects.
Read More
How to Take Zoom Attendance With Python
Learn how to calculate Zoom meeting registrants vs actual attendees using Python so you can always start your Zoom meetings on time.
Read More
Python Artifact Repositories
Learn how to enable Dev and DevOps teams with secure, easily updatable Python wheels distributed via the ActiveState Artifact Repository.
Read More
Python Packages Execute Malicious Code Automatically
Pip install and pip download can compromise your system with malware. Learn how you can counter this software supply chain threat.
Read More
What Are Supply Chain Levels for Software Artifacts (SLSA)?
SLSA improves software supply chain security by providing a framework for sourcing and building software more securely. Learn how.
Read More
Securing the Ruby Software Supply Chain
Securing your Ruby software supply chain from end to end means implementing import, build and usage controls. Learn how.
Read More