Open Source

Five common enterprise questions about OpenStack security

Five common enterprise questions about OpenStack security

Travis McPeak lists the top five OpenStack questions often asked by users and technologists and provides responses to each

Container Security: The Code You Don't Know About

Container Security: The Code You Don't Know About

Mike Pittenger discusses what he believes is the most dangerous code in your application, whether standalone or containerised

ICYMI: Lizard DDoS; Botnet growth; Qatari breach; Open source flaws; Ransomware surge

ICYMI: Lizard DDoS; Botnet growth; Qatari breach; Open source flaws; Ransomware surge

By

The latest In Case You Missed It (ICYMI) looks at Lizard Squad DDoS, Botnet growth, Qatar bank breached by facists, Hidden Open Source flaws, Ransomware surge.

The wave of a wand won't patch the security bug found in ImageMagick

By

A security bug in ImageMagick, the free open source image processing software, is allowing cyber-criminals to attack vulnerable servers from afar.

Vendors hiding open-source security flaws in commercial software

Vendors hiding open-source security flaws in commercial software

By

The use of open source components in commercial software is more common than even vendors are aware of and it's leaving customers open to unpatched flaws.

White House requires agencies to share custom code with open-source community

White House requires agencies to share custom code with open-source community

By

The White House is to make federal agencies release their custom code to the open-source community

Open source security: know your code

Open source security: know your code

Adopting open source software isn't a question of "if" anymore, but of "when?" suggests Mike Pittenger.

OpenSSH flaw opens the door to brute force attackers

OpenSSH flaw opens the door to brute force attackers

By

A flaw in OpenSSH could let attackers bypass limits imposed on password login attempts, to launch brute force attacks and steal credentials.

Free automated open encryption certification launches in September

By

Describing itself as the first free and automated certificate authority, Let's Encrypt, launches on 14 September.

Will OpenDaylight 'Lithium' release be safe or bipolar?

Will OpenDaylight 'Lithium' release be safe or bipolar?

OpenDaylight's troubles highlight the problems with security in the open source world ahead of Lithium release.

Is commercial open source more secure than proprietary alternatives?

Is commercial open source more secure than proprietary alternatives?

Many IT security professionals are chossing commercial open source solutions for security reasons rather than economy by says Olivier Thierry.

Heartbleed (remediation) has improved open source cybersecurity

Heartbleed (remediation) has improved open source cybersecurity

The future of computing infrastructure, mobile applications, and personal data protection has been altered by Heartbleed says Joram Borenstein.

Open Heartbleed surgery - securing against further vulnerabilities

Open Heartbleed surgery - securing against further vulnerabilities

David Sandin looks at the implications of using open-source code libraries in vendors' security solution, and the assumptions that lay behind the Heartbleed bug.

Heartbleed slows down the internet

Heartbleed slows down the internet

By

As Hearbleed slows down the internet, experts say that two-factor authentication may the way forward to protect our web sessions.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US