Subscribe by Email

Your email:

Connect With Us!

Current Articles | RSS Feed RSS Feed

Best practices needed to ensure open source security

  
  
  

As open source software continues to gain prominence, organizations around the world are beginning to realize that they need a new approach to security. The more popular and important open source software becomes, the more it will be targeted, and the greater the likelihood that any vulnerabilities will be exploited by cybercriminals.

Heartbleed raises more open source security challenges for federal government

  
  
  

The discovery of the Heartbleed OpenSSL security vulnerability in April seems like old news at this point, but its impact continues to reverberate. Countless firms have been affected by this revelation, and few have fully put the open source flaw behind them.

Homeland Security turning to open source software to improve security

  
  
  

The Homeland Security Agency is primarily dedicated to protecting the United States from external threats. While these efforts have typically centered on the physical realm, now the DHS is turning its attention to the digital realm. As ZDNet contributor Steve J. Vaughan-Nichols recently highlighted, the DHS now offers a service specifically designed to help organizations examine open source software code for potential security threats.

Open source adds life to older software

  
  
  

The benefits of open source software are, by this point, impossible to deny. These solutions have the potential to offer superior security, flexibility and cost-efficiency to businesses in a wide range of capacities. The growing popularity and use of open source makes these offerings increasingly applicable for firms of all sizes.

Webinar recap: Top tactics to reduce your open source security risk

  
  
  

The current state of open source software (OSS) security may surprise you – with over 13 billion OSS component requests annually, a surprising 60% of organizations do not track security vulnerabilities in their code. This is a big reason why open source vulnerabilities such as Heartbleed and the recent PHP flaw affecting WordPress and Drupal sites are catching organizations unaware.

Open source, enterprise software increasingly synergistic

  
  
  

As open source software continues to gain traction and adherents, many have predicted that such solutions will virtually replace enterprise software. However, as Information Age contributor Ben Rossi recently pointed out, this is not how the technologies in question are playing out. Instead, open source and enterprise software are increasingly working together synergistically to deliver superior results.

Webinar recap: Five ways to create more secure code

  
  
  

We recently held a webinar discussing software risks and organizational impacts that arise from security flaws in code (you can watch the recording here). Hackingdata breaches, and functional failures are just the tip of the iceberg when it comes to security vulnerabilities and it’s telling that the average application out there has 22.4 security risks.

Upcoming webinar: Top tactics to reduce your open source security risk

  
  
  

Open source is embedded in over 50% of enterprise applications and development environments today yet very few developers are aware of the inherent security risks. What steps should you take to maximize the benefits of open source software while substantially reducing risk?

Upcoming webinar: Static Analysis' Role in Automotive Functional Safety

  
  
  

With more than one billion vehicles on the road and nearly 22 million vehicles recalled in 2013 alone, development teams are increasingly being held accountable to deliver safe, secure software. Unfortunately, automotive functional safety and ISO 26262 certification can be a difficult and lengthy landscape for development teams to navigate. To help with increasing scrutiny and more complex systems, verification and validation by analysis is veering away from dynamic methods towards static analysis tools. In fact, ISO 26262 recommends static code analysis for ASILs B to D.

Upcoming webinar: Five ways to create more secure code

  
  
  

Security breaches can happen – that’s why it’s more important than ever to understand why secure code matters.

All Posts

Enterprise OSS Blog Policy

If you read a post on The Enterprise OSS Blog, please leave a comment. Let us know what you think, even if it's just a few words. Comments do not require approval, but they are moderated.OpenLogic reserves the right to remove any comments it deems inappropriate.

 

Contact Us

Browse by Tag