News

The lowdown on what open-source operating systems are and why they matter.
Hidden dependencies and social engineering attacks can contribute to the insecure use of open-source software in 2025.
The Open Source Security Foundation unveiled a mailing list on Monday to help contributors and end users alert each other about open-source project vulnerabilities being exploited by hackers ...
Research in the report highlights that nearly three-quarters of commercial codebases assessed for risk contain open source components impacted by high-risk vulnerabilities, Which Synopsys said ...
Government interest in open-source software security is on the rise and reflects the scale upon which this code is utilized across all sectors, including critical infrastructure. The widespread usage ...
One year after the Log4j disaster, open source community efforts and new developer toolchains are addressing the challenges of software supply chain security.
However, what remains true is that the majority of the most successful security companies have not been based on open source technologies -- there are no parallels in the security world to ...
Open-source security has matured but funding remains a key concern.
These must-have open-source tools help CISOs and their teams scan for vulnerabilities, analyze protocols, run forensics, and support threat intelligence and encryption.
The Open Source Evolution Open source involves organizations using open and freely available code and it has become increasingly popular today, with recent data from the Synopsys Open Source Security ...
In this edition of 5 open source things to watch, we take a look at security products that will guard against threats without robbing your kitty.
As security problems in the enterprise outstripped the capabilities of commercial solutions, a number of talented security researchers stepped into the breach via the open source model.