Security of open source in a post-Heartbleed world

Danny Palmer
clock

'We don't have the opportunity to change our minds now, we're using open source, that decision is made,' said Marc Lueck on panel discussion about security

The open source horse has bolted and organisations must scrutinise their network security to ensure the use of such software doesn't put data at risk. That was the consensus of IT leaders speaki...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Harnessing the 'irrational exhuberance' around AI - CNCF's Priyanka Sharma

Business Software

CNCF chief on meeting the sky high expecations of genAI

clock 20 March 2024 • 4 min read
Lazarus uploading malware to open-source PyPl software repository

Threats and Risks

Supply chain attack leaves developers in Asia at particular risk

clock 12 March 2024 • 3 min read
The language of software licencing needs an upgrade, says Percona's Peter Zaitsev

Open Source

Third-way models are proliferating

clock 05 March 2024 • 3 min read

More on Threats and Risks

UK sanctions China-based hackers

UK sanctions China-based hackers

Attackers were targeting voters and politicians

clock 28 March 2024 • 3 min read
Russian cyber spies target German politicians in sophisticated phishing attack

Russian cyber spies target German politicians in sophisticated phishing attack

Germany's cyber agency BSI warned that state-backed hackers aimed to establish long-term access to German political networks

clock 25 March 2024 • 3 min read
Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

US researchers find baked-in flaw

Graeme Burton
clock 22 March 2024 • 2 min read