Using No Electronics, 3D-Printed Objects Can Now Connect to Wi-Fi

Using No Electronics, 3D-Printed Objects Can Now Connect to Wi-Fi

3D-Printed Objects Can Connect to Wi-Fi The vast collection of 3-D-printed products in existence is impressive enough to inspire people of all ages and interests. However, a team recently made 3D-printed items that are remarkable in their own right — they connect to Wi-Fi but don’t
Have You Spotted the Turn?

Have You Spotted the Turn?

You are hammered to be ready for the latest technologies. But all of them have lifecycles. It is just as important to identify when they’re diminishing, maybe even dying. Look for the turn or risk a millstone around your neck. They seem like they will

CONTRIBUTORS

Infosec thought leaders

Beyond VDI: How the hybrid cloud is forcing us to rethink an industry

Beyond VDI (Virtual Desktop Infrastructure) Before I start this blog, I want to get something off my chest. Here it ...
Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies ...
Infatuation leads to love - How container orchestration and federation enables multi-cloud competition

Infatuation leads to love – How container orchestration and federation enables multi-cloud competition

Container Orchestration The use of containers by developers -- and now increasingly IT operators -- has grown from infatuation to ...

RESOURCES

20 Leading Cloud CMS Wordpress Alternatives

20 Leading Cloud CMS WordPress Alternatives

THE FUTURE FOR CYBER SECURITY A study entitled, State of Cyber Security 2017, performed by ISACA (Information Systems Audit and Control Association), suggested that cyber security staff are becoming increasingly difficult to find in such a rapidly expanding and evolving field ...
real time hacking attacks

Live Real Time Hacking and Ransomware Tracking Maps Online

Real Time Hacking Attacks We've recently covered a few real time hacking maps but have decided to extend the list based on the recent ransomware activities with some additional real time hacking attack and ransomware tracking maps. Ransomware refers to malicious ...
12 WordPress Managed Hosting Services

12 WordPress Managed Hosting Services

WordPress Hosting Services WordPress hosting services has exploded in popularity as a blogging tool and content management system in recent years, and is now used by more than 23.3 percent (2018 Edit: 53%) of the top 10 million websites worldwide. Due ...
open source cloud

Expect Open Source Security to Become a Major Focus in 2017

Open Source Security

There is no doubt about it: We are living in the middle of the Digital Age.

But we didn’t get here alone. Thousands of people from all over the world have come together to develop programs, apps and software to get us where we are now. In order to maintain the level of technology that we have become accustomed to, we need the help of coders and programmers from all over to help solve problems and make changes.

When the coding community is invited to manipulate the source code of a program, it is known as open source. But what does open source really mean for your software — and your security?

Open Source vs. Closed Source

Open Source Security

(Infographic Source: Kinvey)

Behind each program you are running, there is a set of codes that allow your computers, cellphones or tablets to read. For large companies, this code is heavily protected. When a company does not allow customers or users to manipulate the code of the program, this is known as closed source.

A company may choose to keep their code secret in an effort to protect their ideas or property. They may fear a competitor stealing their code to make a similar program, or they may not want to lose control of how the program or app runs. But in keeping the code a secret, customers and users are unable to understand how it works or make changes for themselves.

On the other hand, an open source code is available for users, coders and programmers to manipulate as they see fit. For example, Vid.ly is an open source video platform and an excellent example of the benefits one offers. Another popular example is GitHub, an open source community where developers and coding fanatics can follow or create projects.

Using an open source code rather than a closed source code gives users the opportunity to solve problems for themselves or recruit coders to make necessary changes for them. Open source code also gives users the opportunity to see and understand how the program works.

But open source codes can also bring up questions of security.

Why Is Open Source Security Important?

When code is open source, anyone can make changes or view the code. There are no restrictions on who can access that information, make adjustments or pull details.

Unfortunately, this means that hackers also have access to open source codes. Does this mean that open source is less safe than closed source? Not necessarily.

Having a source code open to the public means that many individuals can look for potential areas where hackers may attack. When multiple professionals can make changes when they are needed, codes are updated more frequently. Users can also browse through the code to determine its safety and security, something they are unable to do with closed code.

As we move into 2017, open source codes are only going to become more popular. This also means that security for open source codes will continue to grow.

What Open Source Security May Look Like in 2017

While open source code is no stranger to the world of database management systems, 2017 will be the year that it truly takes off. As more companies adopt open source codes as the standard, there will also be a new focus on how to keep that code safe from hackers.

As the demand for open source code grows in 2017, so will the demand for open source security. With more companies using open source code to run their programs, it can be expected that 2017 will see an increase of attacks on open source codes. To combat this and protect users, open source security will increase as well.

With the right security measures, there’s no reason to believe that open source code is less safe than closed source. By allowing teams of coders from all over the world to find potential problems and recommend solutions, open source code may actually be safer than closed source. In 2017, we will continue to see that level of security increase as more companies focus on protecting their open source codes.

By Kayla Matthews

Kayla Matthews

Kayla Matthews is a technology writer dedicated to exploring issues related to the Cloud, Cybersecurity, IoT and the use of tech in daily life.

Her work can be seen on such sites as The Huffington Post, MakeUseOf, and VMBlog. You can read more from Kayla on her personal website, Productivity Bytes.

View Website

Cloud Community Supporters

(ISC)²
Cisco
SAP
CA Technologies
Dropbox

Cloud community support comes from (paid) sponsorship or (no cost) collaborative network partnership initiatives.