Open Source Software: the Intersection of IP and Security
|
|
|
- Primrose Gregory
- 10 years ago
- Views:
Transcription
1 Open Source Software: the Intersection of IP and Security Greg Kelton, Managing Director EMEA, Palamida Inc.
2 1995 F22 software (avionics only) ~1.7M LOC
3 2009 F22 software (avionics only) ~1.7M LOC It takes dozens of microprocessors running 100 million lines of code to get a premium car out of the driveway (IEEE Spectrum February 2009 Image: General Motors)
4 New Ways of Composing Services Cloud Computing a style of computing in which massively scalable IT-related capabilities are provided as a service using Internet technologies to multiple external customers. Definition: Gartner Group
5 Smarter Devices
6 The point is
7 More Software and Better
8 In Less Time
9 And with Smaller Budgets
10 Today s Reality A software development organization cannot be competitive without widespread use of open source
11 Gartner OSS Predictions By 2016, OSS will be included in mission-critical software portfolios within 99% of Global 2000 enterprises, up from 75% in By 2014, 50% of Global 2000 organizations will experience technology, cost and security challenges through lack of open-source governance. By 2015, OSS will be used and adopted to help enable over 60% of platform-as-a-service (PaaS) services. By 2014, 30% of applications running on proprietary versions of Unix will be migrated to OSS-based Linux on x86. By 2014, those organizations with effective, open-source community participation will consistently deliver high returns from their opensource investments. By 2013, up to 50% of Global 2000 non-it enterprises will contribute to at least one OSS project. By 2016, 50% of leading non-it organizations will use OSS as a business strategy to gain competitive advantage. Predicts 2011: Open-Source Software, the Power Behind the Throne 23 November 2010 ID:G
12 Typical Software Project Metrics 2.9 GB 87,863 Files 8,535,345 LOC Copyright holders ~350 Binaries/Archives/JARS 1207 What is This Software Project Trying To Tell You?
13 There is probably a lot of content that you don t know about Audit Example Size Documented OS components Undocumented OS components 15.9GB 59.1M LOC Total # 838 % LOC from Open Source 60-65%
14 With license terms that may be problematic 30% Audit Breakdown by License 25% 20% 15% 10% TOTAL % 5% 0% Source: 2010 Year to Date Audit Engagements Performed by Palamida Professional Services
15 Open Source is not somehow different Plaintiffs would be happy to settle this matter with Best Buy and Phoebe Micro if they either (i) ceased all distribution of BusyBox or (ii) committed to distribute BusyBox in compliance with the free and open source license terms under which Plaintiffs offer BusyBox to the world. Plaintiffs have patiently worked with Best Buy and Phoebe Micro to bring their products into compliance with the license, but unfortunately have now concluded that those efforts are destined to fail because neither Best Buy nor Phoebe Micro has the capacity and desire to meet either of Plaintiffs' demands for settlement. As such, Plaintiffs are forced to protect their interests in BusyBox by now respectfully moving for a preliminary injunction, pursuant to Rule 65, enjoining and restraining defendants Best Buy and Phoebe Micro from any further copying, distribution, or use of their copyrighted software BusyBox. PLAINTIFFS' MEMORANDUM OF LAW IN SUPPORT OF THEIR MOTION FOR PRELIMINARY INJUNCTION AGAINST DEFENDANTS BEST BUY, CO., INC. AND PHOEBE MICRO, INC. SOFTWARE FREEDOM CONSERVANCY, INC. and ERIK ANDERSEN, Filed 1/31/11
16 Software IP is a potent competitive weapon Love, Larry: Here Is the Oracle Statement and Final Complaint Versus Google by Kara Swisher Posted on August 12, 2010 at 6:46 PM PT This afternoon, the database software giant said it was suing Google (GOOG), alleging patent and copyright infringement of Java-related intellectual property in the development of Android mobile operating system software.
17 And Open Source Is Not Immune to Vulnerabilities Apache Tomcat 1 jquery GNU C Library libpng LibTIFF OpenSSL Zlib Libcurl Libxml2 OpenSSH Vulnerabilities in Popular Open Source Projects Source: National Vulnerability Database
18 Oh No, Kernel.org was Hacked by Susan Linton -Aug. 31, 2011 A notice appeared on today informing visitors that the servers housing the Linux kernel source code had been hacked earlier this month. The breach was discovered yesterday and maintainers believe the source code itself is unaffected. Source: ostatic.com
19 August 2011 Devastating Apache bug leaves servers exposed Devs race to fix weakness disclosed in 2007 Attack code dubbed Apache Killer that exploits the vulnerability in the way Apache handles HTTP-based range requests was published Fridayon the Full-disclosure mailing list. By sending servers running versions 1.3 and 2 of Apache multiple GET requests containing overlapping byte ranges, an attacker can consume all memory on a target system. August 14, 2011
20 Mango OSS Components Quartz Enterprise Job Scheduler Apache Commons Logging Apache Jakarta Taglibs Spring Framework JfreeChart Apache Jakarta Commons Freemarker Jcommon Utility Classes Apache-db-derby Apache Log4J JavaMail API MySQL SAX: Simple API for XML J2EE Java2 SDK Activation AQP Alliance DWR Direct Web Remoting pngencoder git-mm JDBC driver Apache Xerces NVD Reported Vulnerabilities: 0 DWR OSS Components Apache Spring Framework Apache Struts Hibernate Scriptaculous Beehive WebWork Backport Util Concurrent Google Injection Framework NVD Reported Vulnerabilities: 4 Scriptaculous Components PrototypeJS NVD Reported Vulnerabilities: 1
21 Risk is Risk And you can t mitigate risk you don t know you have
22
23 What to Do Tomorrow Set up an OSRB or equivalent Establish your policy for use of externally sourced software Don t stop at IP, include security Audit any software acquired via M&A Evaluate compliance alternatives, and get started
24 Open Source Review Board Comprised of Legal, Development and Security Review and Approve Policy for externally sourced software Establish the scope of information required and retained (the request form) Case-by-case use decisions Review and approve the policy for compliance with obligations Reports to CFO, GC, VP engineering or others periodically on compliance status
25 Policy What is the name and version of this software component? Where is it used? What is the license? Is this component in a software product that ships to customers? Does this component contain known vulnerabilities? Have we modified this component? When was the last time we checked this software for version and vulnerability? Does this component contain encryption? Have we added this component to the notices file?
26 Mergers and Acquisitions (and outsourced development) Make code audit a contract item Don t rely on reps regarding code content typically 3-5x more found than disclosed Use outside firms to maintain an arms-length relationship Factor in remediation costs Don t integrate the code with yours until you are confident of origin
27 What Acquiring Firms Are Concerned About Today GPL and other Viral Licenses (esp v3.0) Affero GPL Commercial Content and Libraries Restrictions on commercial use or field of use (e.g. no Military use) Cryptography Code with Unknown Licenses % of undisclosed content
28 Evaluate Compliance Alternatives, and Get Started In-house process External Professional Services periodic reports In-house system Owned by development Used by development, legal and security System of record for policy and content The first pass is the most time-consuming consider a outside audit to populate the internal system
29 Evaluate Compliance Alternatives, and Get Started
30 Open Source Software: the Intersection of IP and Security Greg Kelton, Managing Director EMEA, Palamida Inc.
Open Source and the New Software Supply Chain. Mark Tolliver, CEO Palamida Inc.
Open Source and the New Software Supply Chain Mark Tolliver, CEO Palamida Inc. Could You Sign This? Typical Software Project Metrics 2.9 GB 87,863 Files 8,535,345 LOC Copyright holders ~350 Archives 178
Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments
Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments Andrew J. Hall Fenwick & West LLP April 16, 2013 Linux Foundation Collaboration Summit Presentation Topics Introduction
An Open Source Software Primer for Lawyers
An Open Source Software Primer for Lawyers July 17, 2014 Presentation to the ABA Open Source Committee, Section of Science & Technology Law Joanne Montague [email protected] Davis Wright Tremaine
RoverPal - A Mobile Payment Application
White Paper RoverPal - A Mobile Payment Application Introduction Online shopping has been a favorable experience with most of us. Still, we come across instances where we are out on shopping and we run
UBS Training Course Catalog
2014 COURSE CATALOG SECURITY COURSES Advanced Ethical Hacking Secure Android Development Secure ios Development C/C++ Programming Security Complete Windows Security Cryptography Overview Designing Secure
Getting Started with Open Source Compliance
Getting Started with Open Source Compliance August 9, 2006 www.hro.com Denver Boulder Colorado Springs London Los Angeles Munich Salt Lake City San Francisco Copyright 2006 Holme, Roberts & Owen LLP Where
Presentation. Open Source is NOT Free. For ISACA. By Dave Yip / Gamatech Ltd. Agenda
Presentation Open Source is NOT Free For ISACA By Dave Yip / Gamatech Ltd Agenda Gamatech Introduction to Open Source Open Source and Enterprises Open Source Licensing Open Source Risks Open Source Management
Your Cloud, Your Data, Your Way! owncloud Overview. Club IT - Private and Hybrid Cloud. Austrian Chambers of Commerce Vienna, January 28th, 2014
Your Cloud, Your Data, Your Way! owncloud Overview Club IT - Private and Hybrid Cloud Austrian Chambers of Commerce Vienna, January 28th, 2014 owncloud s Mission owncloud allows IT organizations to deliver
Open Source Sustainability and RDM. Scott Wilson [email protected]
Open Source Sustainability and RDM Scott Wilson [email protected] What does sustainability mean? To be sustainable a project must meet its own costs. Most projects have their initial costs covered
PUBLISH YOUR COLLECTIONS TO THE WEB
emuseum PUBLISH YOUR COLLECTIONS TO THE WEB Easily Integrates with TMS Powerful Searching Fully Customizable User Created Collections Mobile Enabled Multiple Media Support Visit www.gallerysystems.com/emuseum
The Corporate Counsel s Guide to Open Source Software Policy Implementation
The Corporate Counsel s Guide to Open Source Software Policy Implementation How to Protect the Enterprise from Risk while Helping Your Company More Efficiently Develop and Maintain Applications Black Duck
ARE YOU RUNING LINUX RIGHT?
ARE YOU RUNING LINUX RIGHT? Linux is widely deployed today in the modern datacenter. However, in the face of modern security threats, are you running it right? INTRODUCTION Enterprise Linux has become
Open Source Software:
Open Source Software: Buyer Beware of Custom Development and M&A Transaction Risks By Heather R. Pruger and Adam S. Zarren Does your client develop software for others, or does it purchase customized software
OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE
OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE Martin Callinan [email protected] Wednesday, June 15, 2016 Table of Contents Introduction... 2 Source Code Control... 2 What we do... 2 Service
Open Source Software and the impact on Mergers & Acquisitions
Open Source Software and the impact on Mergers & Acquisitions Black Duck 2013 Speakers Russell Hartz VP of Corporate Development SAP Oliver Vivell Senior Director of Corporate Development SAP Matthew Jacobs
DEVELOP ROBOTS DEVELOPROBOTS. We Innovate Your Business
DEVELOP ROBOTS DEVELOPROBOTS We Innovate Your Business Security & Encryption Develop Robots has helped banks, real estate companies, law firms and many other businesses to secure and encrypt their database
DATA BREACH RISK INTELLIGENCE FOR HIGHER ED. Financial prioritization of data breach risk in the language of the C-suite
DATA BREACH RISK INTELLIGENCE FOR HIGHER ED Financial prioritization of data breach risk in the language of the C-suite WHY? Slow, disruptive to students & staff Almost 1 million records were False positives,
Open Source Policy Builder
Open Source Policy Builder Effective and comprehensive open source policies are based on a thorough and unbiased organizational assessment. You can start building your organization s open source policy
An Introduction to the Legal Issues Surrounding Open Source Software
An Introduction to the Legal Issues Surrounding Open Source Software By Daliah Saper Saper Law Offices, LLC 505 N. LaSalle, Suite #350 Chicago, IL 60654 http://www.saperlaw.com Open Source Software Open
DTWMS Required Software Engineers. 1. Senior Java Programmer (3 Positions) Responsibilities:
DTWMS Required Software Engineers 1. Senior Java Programmer (3 Positions) Responsibilities: Responsible to deliver quality software solutions using standard end to end software development cycle Collaborate
Intellectual Property Group Presentation. Using Open Source Software Issues to Consider. Peter J. Guffin, Esq. Pierce Atwood LLP January 22, 2009
Intellectual Property Group Presentation Using Open Source Software Issues to Consider Peter J. Guffin, Esq. Pierce Atwood LLP January 22, 2009 I. Agenda Select key terms in various open source licenses
BOM based on what they input into fossology.
SPDX Tool Website SPDX Tool Description License and copyright scanner that emits license names that conform to SPDX. In March a module should be added that gives the user an SPDX FOSSology fossology.org
Managing Security Risks in Modern IT Networks
Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling
Beginning in 2007 and, for the following five years, Open Source Software (OSS)
1 Introduction Beginning in 2007 and, for the following five years, Open Source Software (OSS) has disrupted market segments across the IT industry; the growth has been overwhelming for operating systems
GiftCardXpress - Elavon Brief
GiftCardXpress - Elavon Brief CFXWORKS, INC 2015 http://www.cfxworks.com GiftCardXpress - Elavon Brief GiftCardXpress (Elavon) Version 16.1: This gift card solution, GiftCardXpress (Elavon), is an open
HOT TOPICS IN OPEN-SOURCE SOFTWARE LICENSING. By Robert J. Scott and Christopher Barnett
HOT TOPICS IN OPEN-SOURCE SOFTWARE LICENSING By Robert J. Scott and Christopher Barnett HOT TOPICS IN OPEN-SOURCE SOFTWARE LICENSING I. Introduction Businesses and software developers who incorporate new
2015 Vulnerability Statistics Report
2015 Vulnerability Statistics Report Introduction or bugs in software may enable cyber criminals to exploit both Internet facing and internal systems. Fraud, theft (financial, identity or data) and denial-of-service
Put a Firewall in Your JVM Securing Java Applications!
Put a Firewall in Your JVM Securing Java Applications! Prateep Bandharangshi" Waratek Director of Client Security Solutions" @prateep" Hussein Badakhchani" Deutsche Bank Ag London Vice President" @husseinb"
Security Vulnerabilities in Open Source Java Libraries. Patrycja Wegrzynowicz CTO, Yonita, Inc.
Security Vulnerabilities in Open Source Java Libraries Patrycja Wegrzynowicz CTO, Yonita, Inc. About Me Programmer at heart Researcher in mind Speaker with passion Entrepreneur by need @yonlabs Agenda
Linux, Open Source, and IBM: The Next Decade
Linux, Open Source, and IBM: The Next Decade Bob Sutor VP, Open Source and Standards Today's talk In order to set the context for the next ten years, we'll start by looking back over the last decade. From
Foundations for your. portable cloud
Foundations for your portable cloud Start Today Red Hat s cloud vision is unlike that of any other IT vendor. We recognize that IT infrastructure is and will continue to be composed of pieces from many
What You Should Know About Open Source Software
What You Should Know About Open Source Software J.D. Marple Silicon Valley Latham & Watkins operates as a limited liability partnership worldwide with an affiliate in the United Kingdom and Italy, where
Open Source. Knowledge Base. By: Karan Malik INTRODUCTION
Open Source By: Karan Malik INTRODUCTION Open source is a development method, offering accessibility to the source of a product. Some consider open source as possible design approaches, while some of them
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
Software Requirements Specification
Software Requirements Specification (SRS v1.0) For Mobile Real Estate Project Prepared by D. Destan Sarpkaya Advisor Assist.Prof.Dr. Onur Demir Yeditepe University 2011 1 P a g e 1. Introduction a. Purpose
Legal Issues for FOSS-based Supply Chain Management. Herve Guyomard, Black Duck Software
Legal Issues for FOSS-based Supply Chain Management Herve Guyomard, Black Duck Software Agenda Legal Case in Supply Chain Open Source in Mobile Mobile devices Supply Chain Management Summary Copyright
THE OPEN SOURCE DEVELOPER REPORT
THE OPEN SOURCE DEVELOPER REPORT 2009 ECLIPSE COMMUNITY SURVEY M A Y 2 0 0 9 COPYRIGHT 2009 THE ECLIPSE FOUNDATION ALL RIGHTS RESERVED THIS WORK I S LIC EN SE D UND ER TH E C RE ATI VE COMMON S ATTRIBUT
Open Source Server Product Description
Open Source Server Product Description Disclaimer: The information in this document shall not be disclosed outside System Associates Limited and shall not be duplicated, used, or disclosed in whole or
Framework Adoption for Java Enterprise Application Development
Framework Adoption for Java Enterprise Application Development Clarence Ho Independent Consultant, Author, Java EE Architect http://www.skywidesoft.com [email protected] Presentation can be downloaded
HOW TO UTILIZE OPEN SOURCE IN YOUR CODE BASE AND BUILD PROCESS. 2015 Black Duck Software, Inc. All Rights Reserved.
HOW TO UTILIZE OPEN SOURCE IN YOUR CODE BASE AND BUILD PROCESS 2015 Black Duck Software, Inc. All Rights Reserved. TODAY S PRESENTERS Baruch Sadogursky JFrog Dave Gruber Black Duck 2 2015 Black Duck Software,
APPLICATION SECURITY FOR OPEN SOURCE SOFTWARE - THE NEW IMPERATIVE
APPLICATION SECURITY FOR OPEN SOURCE SOFTWARE - THE NEW IMPERATIVE Donald J. Fergus Intekras, Inc. 21515 Ridgetop Circle Suite 260 Sterling, VA 20166 (703) 547-3500 www.intekras.com April 2010 Information
nexb- Software Audit for Acquisition Due Diligence
nexb- Software Audit for Acquisition Due Diligence www.nexb.com Agenda About nexb What nexb does Our experience Software Audit: M&A License Violation Risks & Recent Audit Issues Software Audit Process
Open Source Software: Recent Developments and Public Policy Implications. World Information Technology and Services Alliance
December 2004 Open Source Software: Recent Developments and Public Policy Implications Open source software has become a topic of great interest in the press and among policymakers. Open source software
Open-Source vs. Proprietary Software Pros and Cons
Open-Source vs. Proprietary Software Pros and Cons Analyze the strengths and weaknesses of proprietary vs. open source software to determine what is best for your business. White Paper Weighing the Options
Fast, Low-Overhead Encryption for Apache Hadoop*
Fast, Low-Overhead Encryption for Apache Hadoop* Solution Brief Intel Xeon Processors Intel Advanced Encryption Standard New Instructions (Intel AES-NI) The Intel Distribution for Apache Hadoop* software
GPL AND SOFTWARE LICENSING ISSUES LESSONS FROM THE VERSATA LAWSUIT. 2015 Black Duck Software, Inc. All Rights Reserved.
GPL AND SOFTWARE LICENSING ISSUES LESSONS FROM THE VERSATA LAWSUIT 2015 Black Duck Software, Inc. All Rights Reserved. SPEAKERS Phil Odence Vice President & General Manager Karen Copenhaver Partner at
Open Source Software: Strategies and Risk Management
Open Source Software: Strategies and Risk Management Elisabeth Esner i DLA Pper i Rudnick Gray Cary US LLP (858) 677-1484 elisabeth.e isner@dlap iper.com Mark Lehberg DLA Pper i Rudnick Gray Cary US LLP
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
Middleware Platforms for Application Development: A Product Comparison
Middleware Platforms for Application Development: A Product Comparison Richard Naszcyniec Senior Principal Program Marketing Manager, Red Hat June 13, 2013 Today s session Red Hat JBoss Middleware focus
Huawei and Open Source. Industry development department Shi Hao
Huawei and Open Source Industry development department Shi Hao ICT industry trend IT Value Big Data DC silos Mainframe Client / server Web Cloud Computer Business Drivers Virtualization Data Innovation
Information Security Organizations trends are becoming increasingly reliant upon information technology in
DATASHEET PENETRATION TESTING SERVICE Sales Inquiries: [email protected] Visit us: http://www.spentera.com Protect Your Business. Get Your Service Quotations Today! Copyright 2011. PT. Spentera. All Rights
WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services
WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating
CSPA. Common Statistical Production Architecture Descritption of the Business aspects of the architecture: business models for sharing software
CSPA Common Statistical Production Architecture Descritption of the Business aspects of the architecture: business models for sharing software Carlo Vaccari Istat ([email protected]) Index Costs categories
Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise
Best practices in open source governance Managing the selection and proliferation of open source software across your enterprise Table of contents The importance of open source governance... 2 Executive
White Paper. Java versus Ruby Frameworks in Practice STATE OF THE ART SOFTWARE DEVELOPMENT 1
White Paper Java versus Ruby Frameworks in Practice STATE OF THE ART SOFTWARE DEVELOPMENT 1 INTRODUCTION...3 FRAMEWORKS AND LANGUAGES...3 SECURITY AND UPGRADES...4 Major Upgrades...4 Minor Upgrades...5
Successful Mobility. Matej Lavric Sales Leader for Mobile CEE
Successful Mobility Matej Lavric Sales Leader for Mobile CEE There are 7.1 billion people on the planet 6 billion of them have access to mobile phones, only 3.5 billion of them use a toothbrush 2 90% of
WHITE PAPER. Domo Advanced Architecture
WHITE PAPER Domo Advanced Architecture Overview There are several questions that any architect or technology advisor may ask about a new system during the evaluation process: How will it fit into our organization
Project Manager 1 Post == Experience 10-12 years in Project Management in reputed company, Salary Rs.1,20,000/-
Project Manager 1 Post == Experience 10-12 years in Project Management in reputed company, Salary Rs.1,20,000/- Senior Soft ware Developer 2 Posts Junior Soft ware Developer 4 Posts Database Administrator
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
Closing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
Privacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
Intellectual Property& Technology Law Journal
Intellectual Property& Technology Law Journal Edited by the Technology and Proprietary Rights Group of Weil, Gotshal & Manges LLP VOLUME 26 NUMBER 6 JUNE 2014 A Practical Approach to Working with Open
Polycom RealPresence Resource Manager System
Offer of Source for Open Source Software 8.3.0 December 2014 3725-72108-001D Polycom RealPresence Resource Manager System Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Open Source in the Real World: Beyond the Rhetoric
Open Source in the Real World: Beyond the Rhetoric Maureen Dorney Partner, DLA Piper Kat McCabe Board of Advisors, Black Duck Software, Inc. Gemma Dreher Senior Counsel, BAE Systems Introduction Widespread
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
27 th March 2015 Istanbul, Turkey. Performance Testing Best Practice
27 th March 2015 Istanbul, Turkey Performance Testing Best Practice Your Host.. Ian Molyneaux Leads the Intechnica performance team More years in IT than I care to remember Author of The Art of Application
Google and Open Source. Jeremy Allison Google Open Source Programs Office [email protected]
Google and Open Source Jeremy Allison Google Open Source Programs Office [email protected] Who Am I? Engineer in Google Open Source Programs Office What do we do? License Compliance Code Release The Summer
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
The 7 Myths of IP Risk: The Real Exposure Issues with Free and Open Source Software. Black Duck Software White Paper
The 7 Myths of IP Risk: The Real Exposure Issues with Free and Open Source Software Black Duck Software White Paper FOSS is widely recognized as providing significant technology, innovation and financial
MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.
MySQL Strategy Morten Andersen, MySQL Enterprise Sales Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not
FOSS Governance Fundamentals
FOSS Governance Fundamentals HP Part Number: 5992-4059 Published: January 2008 Edition: 1.0 Copyright 2008 Hewlett-Packard Development Company, L.P. Legal Notice Confidential computer software. Valid license
IT Risk Management: Guide to Software Risk Assessments and Audits
IT Risk Management: Guide to Software Risk Assessments and Audits Contents Overview... 3 Executive Summary... 3 Software: Today s Biggest Security Risk... 4 How Software Risk Enters the Enterprise... 5
McAfee Database Security. Dan Sarel, VP Database Security Products
McAfee Database Security Dan Sarel, VP Database Security Products Agenda Databases why are they so frail and why most customers Do very little about it? Databases more about the security problem Introducing
Securing Data in the Cloud
Securing Data in the Cloud Meeting the Challenges of Data Encryption and Key Management for Business-Critical Applications 1 Contents Protecting Data in the Cloud: Executive Summary.....................................................
Apache Jakarta Tomcat
Apache Jakarta Tomcat 20041058 Suh, Junho Road Map 1 Tomcat Overview What we need to make more dynamic web documents? Server that supports JSP, ASP, database etc We concentrates on Something that support
