open source

Wrapping up a decade of insights from the State of the Software Supply Chain
Sonatype's 10th annual State of the Software Supply Chain report marks a transformative decade for open source software ...

Open-Source Security Tools are Free… And Other Lies We Tell Ourselves
The most expensive security tool isn't the one you pay for - it's the one that fails when you need it most. Just ask those 110,000 websites that thought they were saving ...

Why Open-Source CIAM Solutions Are Essential for Data Security and Privacy
Businesses face mounting cyber threats and data breaches from third-party vendors. Open-source CIAM solutions offer a secure, transparent alternative for customer identity management. Discover how these solutions provide enhanced security, complete data ...

The Open Source AI : Understanding the New Standard
Open Source AI Definition 1.0 marks a milestone in transparent and ethical AI development by providing clear guidelines for truly open source AI, bringing the proven benefits of open-source to AI technology ...
AI Industry is Trying to Subvert the Definition of “Open Source AI”
The Open Source Initiative has published (news article here) its definition of “open source AI,” and it’s terrible. It allows for secret training data and mechanisms. It allows for development to be ...

Permiso Adds Three More Open Source Cybersecurity Tools
Permiso today made available three additional tools under an open-source license that make it simpler to secure cloud computing environments ...

Optimizing efficiency and reducing waste in open source software management
As the use of open source software (OSS) continues to grow, so do the challenges around maintaining security and efficiency in software dependency management ...

The evolution of open source risk: Persistent challenges in software security
As organizations increasingly rely on open source software, associated security risks grow, demanding more robust and proactive risk management ...

EU CRA: Good Intentions, Impossible Requirements
As the European Union’s Cyber Resilience Act (EU CRA) prepares to publish a final draft, product manufacturers with any “digital” component must comply three years after final publication. If passed, the EU ...

Exploring Goldilocks: ‘Just Right’ Resource Management
Managing resource requests and limits in Kubernetes can be challenging, especially for teams that are new to container orchestration or scaling complex workloads. But without proper configuration, your cluster can become unstable, ...