Several bloggers have already reported on the Open Source Security Study released by Fortify’s Security Research Group (and Larry Suto), but we are yet to see anyone take an in-depht look at the study itself. This is our attempt to take a closer look at the study titled “How Are Open Source Development Communities Embracing Security Best Practices?”. The study which was released as an 11-page report, is free to download from the company’s website.

We’ll analyze some of the statements and conclusions made in the report, and also look at a couple of the “Open Source Development Communities” that the study surveyed.

Related Post:  A Practical Guide to GPL Compliance

What led Fortify to embark on this study? According to Fortify, the study was inspired by:

  • An April 2008 survey by CIO.com showed that more than half of the respondents (53 percent) are using open source applications in their organization today, and an additional 10 percent plan to do so in the next year. For nearly half (44 percent), open source applications are considered equal to closed-source solutions during the acquisition process.
  • The European Commission’s Competition Commissioner, Neelie Kroes, recently stated that open standards, and open source, are preferable to traditional closed source software

So, favorable comments from two influential people about Open Source solutions inspired Fortify to undertake this study of 11 open source communities which were chosen because:

they are implemented in Java (the most common programming language for enterprise development, represent a wide range of application functionality, and are used extensively to build and deploy enterprise applications.

And the chosen (open source) applications are:

Related Post:  FSF Files Suit Against Cisco For GPL Violations

Read the rest of the article here.

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer runs network ads?  Yep, no more ads from the usual suspects that track you across the Internet.  But since  I still need to pay to keep the site running, feel free to make a small donation by PayPal.

Subscribe for updates. Trust me, no spam!

Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

Leave a Reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter
Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.

Anastasia Marchenkova

An invitation from Anastasia Marchenkova

Hya, after stints as a quantum researcher at Georgia Tech Quantum Optics & Quantum Telecom Lab, and the University of Maryland Joint Quantum Institute, I’m now working on superconducting qubit quantum processors at Bleximo. I’ll be speaking during Algorithm Conference in Austin, Texas, July 16 – 18, 2020. Meet me there and let’s chat about progress and hype in quantum computing.