CONFERENCE Cyber AI & Automation Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

The Open Source (R)evolution: From Great Technology to Greater Intelligence

Open Source is a Valuable Tool for Defenders as They Work to Close Gaps and to Gather Greater Intelligence About Potential Threats

Open Source is a Valuable Tool for Defenders as They Work to Close Gaps and to Gather Greater Intelligence About Potential Threats

The concept of open source software has been around since the early ‘80s beginning as a way for computer science academics and corporate researchers to work in collaboration to build great software to address new challenges. As technology adoption spread in the 90s, interest in the ‘open’ approach continued to grow as users also recognized the value side of the equation. Not only were they gaining access to software that had the benefit of a community of engaged and interested minds working together to continuously improve it, but open source saved costs. As corporate networks expanded another benefit emerged. Open source enabled agility; organizations could more easily integrate complementary applications and services into their environments to respond to new business imperatives and expand capabilities for their users.

More recently, in the context of cybersecurity, open source is a foundational way to solve complex problems. In today’s environment where the exploitation of trust is a common mode of operation for online attackers and other malicious actors, and where customer trust in the integrity of products is also on the line, open source is gaining further inroads.

Map of Cyber Security InformationModern corporate networks extend beyond the traditional perimeter to include data centers, endpoints, virtual, mobile and the cloud. These networks and their components constantly evolve and spawn new attack vectors including: mobile devices, web-enabled and mobile applications, hypervisors, social media, web browsers and home computers. Attackers are taking advantage of gaps in protection to accomplish their mission. They also go to great lengths to remain undetected, using technologies and methods that result in nearly imperceptible indicators of compromise.

Open source is a valuable tool for defenders as they work to close these gaps and to gather greater intelligence about potential threats to make better decisions and take action. Let’s take a closer look at the role of open source in these two areas.

Closing security gaps. Reducing the attack surface is essential as organizations strive to protect against the latest sophisticated threats. Waiting for updates from vendors to close vulnerabilities isn’t realistic when high-value assets are at stake and attacks are relentless. For organizations creating their own custom applications, the ability to detect and protect these applications is even more challenging. An open approach can help organizations close security gaps faster with the ability to create protections on their own or apply shared best practices and tools.

Gaining greater intelligence. To deal with dynamic environments organizations need access to global intelligence, with the right context, to identify vulnerabilities and take immediate action. An open architecture facilitates the sharing of real-time threat intelligence and protections across a vast community of users for collective immunity. It also streamlines integration with other layers of security defenses added as IT environments and business requirements change, thus enabling more effective, coordinated protection. In the realm of technology, open source has a long history and a legacy of success. Based on the tenets of community, collaboration and trust, it is an approach that delivers stronger solutions, addresses complex problems and demonstrates technical excellence, innovation and dependability.

The applications and benefits of open source will continue to evolve and grow. Educators are using open source programming as a way to interest, involve and inspire up and coming technologists. It enables students to learn by doing and to become more engaged. With a next generation of minds focused on next-generation technology challenges, open source will continue to revolutionize the way we overcome obstacles and create new opportunities.

Advertisement. Scroll to continue reading.
Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Don’t miss this Live Attack demonstration to learn how hackers operate and gain the knowledge to strengthen your defenses.

Register

Join us as we share best practices for uncovering risks and determining next steps when vetting external resources, implementing solutions, and procuring post-installation support.

Register

People on the Move

Shanta Kohli has been named CMO at Sysdig.

Cloud security firm Sysdig has appointed Sergej Epp as CISO.

F5 has appointed John Maddison as Chief Product Marketing and Technology Alliances Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.