CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Open Source
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Open Source

Programmer writing code on laptop showing open source software security
Cyber SecurityNews

Bipartisan Open Source Software Security Bill Proposed in Response to Log4j Issues

October 5, 2022
The fallout from the Log4j vulnerability has prompted bipartisan action to beef up open source software security. Proposed act would task CISA with developing a risk framework to evaluate open source code used by the federal government, and could be passed on to critical infrastructure businesses.
Read More
Logo of Twitter on smartphone screen with dollar bills and Elon Musk showing plan to open source Twitter's algorithm
Cyber SecurityNews

Elon Musk Plans To Take Twitter’s Algorithm Open Source; Could It Create Security Issues?

May 10, 2022
Some security experts worry that open source Twitter code would thus not be tremendously helpful in revealing how the system selects content, but would create avenues of attack for threat actors that could now scrutinize its internal workings.
Read More
Hands of open source developer in act of hacktivism
Cyber SecurityNews

In Act of Hacktivism, Open Source Project Maintainer Uses Code to Wipe Russian and Belarusian Computers

March 25, 2022
An open source project maintainer decided to protest the war in Ukraine by targeting computers with an IP address in Russia or Belarus with a malicious update in a controversial act of hacktivism.
Read More
Programmer working on laptop showing open source developer corrupting NPM libraries
Cyber SecurityNews

Open Source Developer Intentionally Corrupts NPM Libraries; Suspected Hack Turns Out to be Mischief

January 13, 2022
Thousands of companies using popular NPM libraries have just learned that the hidden price of free software is that the open source developer may withdraw their consent at any time.
Read More
Developer pointing finger at screen with code showing need for open source for trust and security
Cyber SecurityInsights

How Open Source Can Help Build a New Era of Trust and Security

September 23, 2020
To meet the ever-increasing challenge of cybercrime and rebuild user trust, tech companies will need to be built with a new standard that embraces a transparent and open source approach.
Read More
Two businesspersons shaking hands in office showing how to secure open source components so as to make your CSO happy
Cyber SecurityInsights

How to Make Your CSO Happy with Your Open Source Components

August 28, 2019
Open source software components are useful for software development yet vulnerable to attacks due to its openness. What are some of the best security practices in managing them?
Read More

Latest

Hand on laptop keyboard showing data breach of Australia financial service provider

Data Breach of Financial Service Provider Latitude Jumps From 328,000 to 14 Million Records Stolen

Prancing horse on Ferrari logo showing data breach impacting customer data

Ferrari Disclosed a Data Breach Impacting Customer Data but Refused to Pay Ransom

Hacker using laptop showing penetration test and attack surface

The Anatomy of a Comprehensive Penetration Test

Smartphone with Twitter logo and Elon Musk on background showing source code leak

Partial Twitter Source Code Leak on GitHub Uploaded Shortly After First Round of Layoffs

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results