Categories
compliance Open Source open source licensing

Four New Licenses Approved by the Open Source Initiative

As the steward of the Open Source Definition, the Open Source Initiative has been designating licenses as “open source” for over 20 years. These licenses are the foundation of the open-source software ecosystem, ensuring that everyone can use, improve, and share software. When a license is approved, it is because the OSI believes that the […]

Categories
compliance cyber attack cybersecurity Open Source

Information Security Training Should Be Top Priority

The pressures of being a CISO are capacious and extend well past concerns of incident response time. There are pressures of maintaining budgets, reporting improved performance to stock-holders, and during a time when the breadth and number of cyberattacks are increasing, the challenges to find qualified prospects to fill a considerable number of unfilled positions. […]

Categories
compliance News Open Source

What Googles Supreme Court Win against Oracle means to the future of Open-Source Compliance

The Supreme Court has ruled in Google’s favor, stating that the use of 12,000 lines of code from Oracle’s Java SE program was permitted as “fair use.” In its ruling, the Supreme Court states Google’s copying “only those lines of code that were needed to allow programmers to put their accrued talents to work in […]

Categories
compliance developer Open Source

Developers that Copy and Paste Code Put Companies at Risk for Lawsuits

Go to developer forums, Youtube channels and blog posts, and you’ll find endless conversations about copying and pasting code. The discussion revolves around whether this practice is a lazy form of code development or whether it will cause problems with achieving the desired outcome. They discuss if it will take longer to fix the bugs […]

Categories
cyber attack cybersecurity Open Source

Developers Be Aware of Open Source Attacks

Open source is systematically being attacked on the infrastructure used to distribute code. In a few years, we’ve experienced attacks on pre-existing vulnerabilities occurring months after a disclosure down to a few days.   Attackers now directly hijack the publisher’s credentials and distribute malicious components.This worrisome trend requires enterprises to have in-depth knowledge of what open […]

Categories
cyber attack

IT Contractor Sentenced to 2 Years in Prison for Retaliatory Cyber Attack

Deepanshu Kher, an IT contractor who was caught hacking into a Carlsbad companies server was sentenced to two years in prison. He was found guilty of deleting over 1200 of its 1500 Microsoft 0365 user accounts.  He was retaliating for being fired from the IT consulting firm that was assisting an unidentified company with its […]

Categories
developer Open Source

Happy Developers are Productive Developers

A Development Manager has many hats. Their responsibilities include overseeing the team’s development of systems, software, and deployments. They are in charge of training, hiring, budgets, and enforcing deadlines. Perhaps, their most important role is to improve their developer’s productivity. Developers are the foundation of a company’s software success. A happy developer will be more […]

Categories
cybersecurity

Cyber Attacks Can Kill Your SMB

Cybersecurity should not only concern large organizations; the size of a company does not matter in today’s cyberspace. No matter their size, companies are at risk of cyberattacks. Many SMBs are unaware that they are at risk of cyberattacks since they do not have the necessary resources to keep up with the latest information on […]

Categories
Open Source

Open-Source Licenses Sparks Debate

The open-source community disagrees on how “free” open source licenses should be used. Open-source vendors are frustrated because some open source license terms are keeping them from profiting, while developers are frustrated because their software is being used by unethical people with dishonest intentions. Developers and vendors are now dealing with a host of new […]

Categories
News

Extortionists Breach Qualys Using Accellion Exploit

Enterprise cloud security firm Qualys is the latest victim of a data breach after zero-day vulnerabilities in its Accellion File Transfer Appliance server were used to steal sensitive business documents. The cybercriminals behind the hacks shared screenshots of files belonging to the company’s customers on a publicly accessible data leak website operated by the CLOP […]