Source code auditing keeps organizations on the right side of licensing

Wednesday, 16 May 2007, 11:45 AM EST

In 2000, when Theresa Friday, Ray Waldin, and Jeff Luszcz were working for dot-com startup Cacheon, they saw firsthand the power of open source software to impact a business model. In Cacheon's case, it looked like open source had dealt a death blow to the company, but it was really careless use of third-party code that was the source of the trouble, Friday says. The three colleagues were so impacted by what they had seen that they launched a new business designed to help other companies prevent implosion from software licensing issues.

At IT Manager's Journal.

[ Read more ]




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //