Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

The Open Source (R)evolution: From Great Technology to Greater Intelligence

Open Source is a Valuable Tool for Defenders as They Work to Close Gaps and to Gather Greater Intelligence About Potential Threats

Open Source is a Valuable Tool for Defenders as They Work to Close Gaps and to Gather Greater Intelligence About Potential Threats

The concept of open source software has been around since the early ‘80s beginning as a way for computer science academics and corporate researchers to work in collaboration to build great software to address new challenges. As technology adoption spread in the 90s, interest in the ‘open’ approach continued to grow as users also recognized the value side of the equation. Not only were they gaining access to software that had the benefit of a community of engaged and interested minds working together to continuously improve it, but open source saved costs. As corporate networks expanded another benefit emerged. Open source enabled agility; organizations could more easily integrate complementary applications and services into their environments to respond to new business imperatives and expand capabilities for their users.

More recently, in the context of cybersecurity, open source is a foundational way to solve complex problems. In today’s environment where the exploitation of trust is a common mode of operation for online attackers and other malicious actors, and where customer trust in the integrity of products is also on the line, open source is gaining further inroads.

Map of Cyber Security InformationModern corporate networks extend beyond the traditional perimeter to include data centers, endpoints, virtual, mobile and the cloud. These networks and their components constantly evolve and spawn new attack vectors including: mobile devices, web-enabled and mobile applications, hypervisors, social media, web browsers and home computers. Attackers are taking advantage of gaps in protection to accomplish their mission. They also go to great lengths to remain undetected, using technologies and methods that result in nearly imperceptible indicators of compromise.

Open source is a valuable tool for defenders as they work to close these gaps and to gather greater intelligence about potential threats to make better decisions and take action. Let’s take a closer look at the role of open source in these two areas.

Closing security gaps. Reducing the attack surface is essential as organizations strive to protect against the latest sophisticated threats. Waiting for updates from vendors to close vulnerabilities isn’t realistic when high-value assets are at stake and attacks are relentless. For organizations creating their own custom applications, the ability to detect and protect these applications is even more challenging. An open approach can help organizations close security gaps faster with the ability to create protections on their own or apply shared best practices and tools.

Gaining greater intelligence. To deal with dynamic environments organizations need access to global intelligence, with the right context, to identify vulnerabilities and take immediate action. An open architecture facilitates the sharing of real-time threat intelligence and protections across a vast community of users for collective immunity. It also streamlines integration with other layers of security defenses added as IT environments and business requirements change, thus enabling more effective, coordinated protection. In the realm of technology, open source has a long history and a legacy of success. Based on the tenets of community, collaboration and trust, it is an approach that delivers stronger solutions, addresses complex problems and demonstrates technical excellence, innovation and dependability.

The applications and benefits of open source will continue to evolve and grow. Educators are using open source programming as a way to interest, involve and inspire up and coming technologists. It enables students to learn by doing and to become more engaged. With a next generation of minds focused on next-generation technology challenges, open source will continue to revolutionize the way we overcome obstacles and create new opportunities.

Advertisement. Scroll to continue reading.
Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Training & Awareness

Google has announced a new training program for cybersecurity analysts and those who graduate will get a professional certificate from Google.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...