OpenAPIs and Third-Party Risks – Security Boulevard

With APIs, details and specifics are vital. Each API usually takes in very specific requests in a very specific format and returns very specific information, Sammy Migues, principal scientist at Synopsys Software Integrity Group explained. You make the request and you get the information. APIs can be constructed in different ways, but one of the most common forms of web-based APIs is REST.

OpenAPI is a standardization of formats for REST APIsa way for all people working on any REST APIs anywhere to have a common way to describe those APIs, said Migues. This includes the API endpoints, authentication methods, parameters for each operation the API supports and then contact information, terms of use, licensing and other general information.

By standardizing this collective documentation, it is easier for developers to understand the software and know exactly how it will behave in different circumstances.

Developers turn to OpenAPI, like they do with any open source software or component, as a way to use code thats already out there and has already been proven to work. It saves time, gets the software into production faster, is cost-efficient, integrates workflows and is easy to implement.

OpenAPI may also improve applications security posture by using the documentation format, according to Gabe Rust, cybersecurity consultant at nVisium.

Using standardized documentation allows security testers to more easily understand test APIs, said Rust. Because using formats like OpenAPI provides more transparency to users and testers, it prevents the pitfall of a big security mistake: Security through obscurity.

This allows security testers to provide more comprehensive coverage of applications, Rust added. Potentially serious security issues are more likely to be discovered and patched before damage is done.

You could say that security is a feature of OpenAPI, but thats not to say that it comes without risks.

Any time you introduce third-party software into architecture, you also introduce risk.

Third-party web APIs can access sensitive data/information which can increase security risks such as data breaches, Deepak Gupta wrote in a blog post.

Like any software or application, APIs can be infected with malware, and that can create a lot of damage for a web project, the organization and consumers.

OpenAPIs arent immune to security risks. They can be hacked, of coursenothing is totally immune from being attackedbut the most serious threats come from third parties. With openAPIs comes data sharing, and the data shared can include personal information or corporate intellectual property, unwittingly made available to third parties.

OpenAPI security is fairly limited, said Jeff Williams, CTO and co-founder at Contrast Security. It simply allows development teams to define the authentication scheme to be used with each API. This is useful to help prevent unauthenticated endpoints from exposing critical data and functionality.

Unfortunately, it doesnt protect APIs against attacks from authenticated users. Unless you fully trust all of your users, you should be very concerned about the long list of vulnerabilities that APIs can have, such as, for example, various types of injection, unsafe deserialization, server-side request forgery and libraries with known vulnerabilities, said Williams.

In OpenAPI, it is impossible to know, let alone trust, all the users. To protect sensitive data from third-party risks, it may be necessary to evaluate the use of OpenAPIs and the type of information they have access to. Protecting sensitive data and preventing data breaches from third party intrusion should be of the highest priority when using OpenAPIs.

Recent Articles By Author

See the original post here:

OpenAPIs and Third-Party Risks - Security Boulevard

Open Source Software – W3

About W3C Software

The natural complement to W3C specifications is runningcode. Implementation and testing is an essential part of specificationdevelopment and releasing the code promotes exchange of ideas in the developercommunity.

All W3C software is certified OpenSource/Free Software. (see the license)

2022-04-25 Version3.0of Ical2html includesthe changes byJohannes Weil: command line options to set a title on thegenerated page, to highlight the current day, and to start the week onMonday; and update to libical version3.

ical2html now also recognizes text in descriptions,summaries and locations that looks like a URL and turns it into ahyperlink.

(News Archive)

2022-04-15The slide framework b6+ can nowshow a second window with a preview of the current and next slides andspeaker notes. During a presentation, you could thus show the slideswhile looking at the preview on a second screen.

(News Archive)

2022-04-01 Version8.4 ofthe HTML-XML-utils fixes a bugwith ::attr() selectors. If hxselect wasgiven multiple, comma-separated selectors, the ::attr()selector only worked on the first selector. (Thanks to Bas Ploeger forthe patch!)

(News Archive)

2021-11-28 The slide framework b6+ has a couple ofnew features: 1)When slides are embedded in aniframe or object, links in the slide replacethe parent document, rather than open inside the iframe.2)It is possible to embed a slide as a static page, disablingthe navigation to other slides. 3)Accessibility has improved:When switching slides, the new slide is made available to screenreaders. See an explanationof ARIA role=application and aria-live by Lonie Watson. Theexplanation talks about Shower, but b6+ is similar. 4)Whenslides do not have ID attributes, you can still start at a specificslide by giving its number as fragment ID. E.g., to open apresentation with slide 25, end the URL with ?full#25.5)The F1 key switches to full screen, because not all browsersprovide a command for that. 6)Pressing the ? keyin slide mode pops up a brief overview of available commands.7)It is now possible to disable the use of a left mouse click toadvance slides. 8)Another option hides the mouse pointer when itdoesn't move for some seconds. 9)Various small bug fixes andimprovements.

You can read the manual ordownload a zip filecontaining the JavaScript file (b6plus.js), a style sheet(simple.css), the manual (Overview.html) and some images used in themanual.

(News Archive)

News Archives: 2022, 2021, 2020, 2019, 2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003.

Here is the list of Past Open SourceProjects developed at W3C.

W3C software is free and open source: the software is made primarily bypeople of the Web community, for the Web community.

There are many ways to get involved:

Great communities make great tools, and with only a few minutes of your timeyou can join the mailing-lists associated with W3C open source projects (suchas www-validator forthe markup validator or www-validator-cssfor the CSS validator) and participate in discussions and user support.

A lot of W3C software have a specific user discussion mailing-list (see eachprojects for details), some also have IRC (chat) channels, such as the#validator channel on the irc.freenode.net fordiscussions on W3C validation services.

Developers are welcome to get involved by contributing code. either to existing projects (see list above and check each project'sdocumentation for contact e-mail information), or proposed future software.Patches and bug fixes are alwayswelcome, and developers willing to get seriously involved will generally getcommit access after a proving period.

As explained below, all of W3C software source is freely available, developers areencouraged to get the source for the projects they care about and start hackingright away.

Read the IPR FAQon software contribution if you intend to contribute code. Note that asthis license is GPL compatible, it is possible to redistribute software basedon W3C sources under a GPL license.

Code is not the only way to get involved in making W3C software better.Testing, bug reports, suggestions, or help in creating good documentation areequally important! Most project will have a Feedback page, and you canreport bugs, test cases and patches on our Bugzilla.

All the tools listed on this page are free and open source, but hosting,maintaining and developing them often costs a lot. With your support throughthe Validator Donation Programor the W3C Supporters Program,we can build even better tools.

Most W3C software is available directly from our CVS base or in our Mercurial repository. You can browse the contentand history of either through their respective web interfaces.

See the documentation of each software for specific instructions fordownload and installation.

Some software that was formerly available via FTP atftp.w3.org has been moved to our web site.

See original here:
Open Source Software - W3

Understanding the hows and whys of open source audits – Security Boulevard

Learn who needs open source audits, why you might need one, who and what is involved, and how an open source audit can help you in an M&A.

If youre part of a modern business that does any software development, your dev teams are using open source components to move quickly, save money, and leverage community innovation. If youre a law firm or a consultant, your clients use open source. And if youre on the lookout for your next acquisition, youll be evaluating targets replete with open source. In the most recent Synopsys Open Source Security and Risk Analysis report, we found that 78% of all code analyzed was entirely open source.

While the prevalence of open source components is now widely understood, the implications of software license conflicts, unknown dependencies, and vulnerable components are often underestimated or overlooked. Unresolved issues consequent to open source in digital assets can negatively influence mergers and acquisitions (M&A). Its the responsibility of those involved in these engagements to adequately scope this influence and mitigate the issues that can spoil a deal.

The first step toward an effective and actionable audit is to consider why youre doing an audit. Are you doing it for internal purposes, or are you doing it to prove your resources are assets rather than liabilities?

For many, impending M&A activity drives an audit. After all, when buying, you want to acquire high-quality assets free of legal, security, and quality issues. When selling, you want to be a high-quality asset. Buyers want to have a good handle on the risks they are taking on so they can value and structure the deal appropriately. Those buyers want to know that their target does not bring with it baggage that is unaccounted for. Theyd like to know the company is using open source components within the bounds of their licenses, that it is minimizing potential cyber attack vectors, that it can ensure consistent uptime, and that its dataand its customers datawill be secure.

Some organizations opt for an internal open source audit because the leadership team has been reading news about open source vulnerabilities, exploits, and possible breaches. Some teams may be concerned about the intellectual property risks due to noncompliance with open source licenses. Whats driving your organizations choice? Your reason makes a difference in who you involve and your goals.

As the focus on digital transformation heightens, development and release velocity expectations rise, which is a heavy burden placed on developers. As a result, they depend more and more on open source for foundational functionality so they can spend more time on innovation.

When preparing for a code audit, understand that developers are focused on producing the highest-quality code possible given tight deadlines. Its important to not assume that developers understand the complex license terms often associated with the open source components they leverage. The same often goes for security vulnerabilities. Regardless, the scale of open source usage has far outpaced the ability to manually track these types of risks.

Senior leadership, legal departments, and senior technical managers are usually the ones charged with identifying the strategy, policies, and processes associated with open source risk management. Unfortunately, this does not always prescribe clear mechanisms to manage developers consumption of open source libraries. Developers often place more weight on a solution that meets the task if the alternative can mean missing a shipping deadline.

Software audits come in many different shapes and sizes. There are, however, several areas of consideration that should be addressed to make the audit insightful and actionable.

An audit report should focus on these areas. And the parties should review these topics with the auditor, whos experience can provide clarity and answer specific questions. This is a critical step, because what the audit uncovers may have a material impact on the valuation of a business and the deal terms during an M&A. For example, different licenses pose different levels of riskdepending on the industry in which a business operates, the sensitivity of data it touches, the external/internal orientation of the software, and more. The same goes for security vulnerabilities; they may affect web-based applications differently than they do embedded applications. These are the types of considerations that an expert audit group can advise on.

Maybe something needs to change, maybe it doesnt; the results of your audit will help you answer that question. If your audit showed exactly what you expected, youre in the minority. When we did an analysis of our security audits from 2021, we found that 97% of applications scanned used open source, and companies were only aware of about half of the open source in use. The majority of codebases we analyze have license and security issues.

The output of an open source audit provides clear information about not only the open source code in use, but also the known vulnerabilities in the code and the license compliance risks. This information gives you a clear picture of whats in the targets code, and it can help you be better prepared moving forward.

If your goal is to assess your own code for internal purposes, audit results arm you with the information to create open source risk management policies for future development efforts. If your audit is for an M&A or due diligence situation, the results provide invaluable information necessary for determining deal value and risk.

The most common reason for an open source audit among our customers is for merger and acquisition events. A snapshot of the open source use and risk exposure of the code in question provides much-needed information to help you move forward as a buyer or a seller. Buyers get visibility into risks they may be taking on; sellers have the opportunity to address such risks in advance of due diligence. If you anticipate being on either side of a transaction, the Black Duck Audit Services team can help you decide how to proceed.

Learn more about open source software audits

Follow this link:
Understanding the hows and whys of open source audits - Security Boulevard

TechOps is a mess: Open source is the solution – BetaNews

Building software is hard.Building cloud software is even harder because things move much faster -- and require mission-critical reliability and availability. To effectively build software in the cloud, engineering teams need observability, CI/CD, reporting, and lots of tooling. But all of the tools available to engineering teams never quite fit together in a way that provides visibility and consistency.When things go wrong, developers scramble to troubleshoot systems with disparate data and systems.

TechOps teams are in charge of keeping everything running. But poorly integrated toolsets create an environment where teams have several interfaces and data sets to wrangle when operating critical services. Teams often try to solve this problem by creating one-off integrations of out-of-the box tools with internally developed tooling and process.These integrations are generally very shallow, and create a significant maintenance burden and reliability gaps.

Custom integrations provide more places to store data and a wider pool to search, resulting in a decentralized view of the data sources and no easy way for developer collaboration. Whats needed is an open source-based control center for collaboration and proper integration with current systems -- no more copying and pasting. But its important to make the centralized command hub center work for everyone at the organization not just front line developers and SREs.

Challenges at every level

Challenges for operating, monitoring, and incident response exist at all level of our organizations. TechOps teams are focused on hosting, deployment, and reliability of services. These teams have specific concerns to address before, during and after a potential incident. How can developers get early warning of a service outage? How do we sort through large volumes of monitoring data to troubleshoot failures? How do we track the status and progress during an incident?How do we document the work that was done to restore the service?How do we gather all of the relevant incident information for the retrospective and RCA documents?

Lets say theres a service-interrupting issue.At the developer level, the teams need detailed monitoring and log data. Having a centralized control center provides easier access to this data, improving efficiency and offering perspectives on how to solve future problems.

Engineering leads have roughly the same goals as developers on the frontlines of the issue, but they are more focused on high-level, business-oriented trends. This broader perspective means that they primarily want a less granular view of outage data.These users will spend more of their time focused on analyzing trends in outages over time, understanding the current status and next steps for an ongoing incident, and ensuring proper communication with internal and external stakeholders.

At the Senior Management level, executives need high-level answers to explain problems to their customers. During major service disruptions, CEOs are often in constant communication with their major stakeholders providing status about why services went down. Rather than granular outage data, these discussions rely on high-level but informed and actionable business insights.

Addressing the disconnect with open source

Clear data and collaborative workflows are critical at every level of an organization. But the real power lies in integration -- not standalone solutions. By leveraging the flexibility of open source software, teams can create collaboration systems that reduce downtime, avoid confusion, enable speed, and increase efficiency.

When compared to internally developed one-off systems, open source solutions typically scale better, provide higher quality and reliability, and lower the overall maintenance burden for TechOps teams.Creating a streamlined Ops process with proper visibility and integrations improves developer productivity.It also boosts workplace satisfaction and helps reduce developer burnout.

One of the major problems with custom in-house tooling for TechOps is maintenance.This tooling may work great when its first built.But over time, requirements shift, and maintenance work for internal tooling often falls to the bottom of the priority list.Meanwhile, new tools are inserted into the tech stack, and common dependencies arent always updated and managed appropriately.The result?The tooling we all rely on breaks in an ugly way as soon as we have an incident or outage.This leaves teams scrambling to restore critical services without proper visibility and control into their systems.

Implementing an open source solution also improves a teams ability to maintain the software needed to solve future problems. When organizations adopt open source, theyre gaining access to underlying source, backed by a community of independent contributors, with flexible, layered extensibility. This allows the team to speed up maintenance and deployment of the software so they can focus on solving issues quickly and improving systems for better operations in the future.

Flexibility is one of the top traits organizations look for in developers. But to achieve complete flexibility, organizational software needs to match these human expectations. Without open source enabling this flexibility, TechOps is a mess. On the other hand, integrating tools into a centralized view makes cross-organizational collaboration easier and addresses diverse challenges at every level of a modern organization.

Photo Credit: Rawpixel.com/Shutterstock

Chris Overton is Vice President of Engineering at Mattermost, Inc. Previously, Chris led engineering at Elastic, where he was also responsible for the Cloud product division. Chris is an expert in building and operating public and hybrid SaaS services, distributed systems, analytics/processing of large data sets, and search.

Read more:
TechOps is a mess: Open source is the solution - BetaNews

New Metaverse Track at O3DCon to Tackle Big Questions and Practical Applications of Emerging Graphical Technology – PR Web

Sessions will explore where we are today in metaverse technology and applications, whats lacking, and how open source software and standards communities can take a leadership role in bridging the gaps.

SAN FRANCISCO (PRWEB) September 12, 2022

A new metaverse track hosted by the Linux Foundation is being offered at next months O3DCon event, taking place October 17-19 in Austin, Texas. The track will be presented by thought leaders from a range of open source projects. Sessions will explore where we are today in metaverse technology and applications, whats lacking, and how open source software and standards communities can take a leadership role in bridging the gaps. The event will also host open floor discussions each day for event attendees to share thoughts and ideas about the presentations delivered in the metaverse track.

The metaverse track schedule can be found at: https://bit.ly/3L3IrLG

Session topics in the metaverse track include:

This years event will convene a vibrant, diverse community focused on building an unencumbered, first-class, 3D engine poised to revolutionize real-time 3D development across a variety of applicationsfrom game development, metaverse, digital twin and AI, to automotive, healthcare, robotics and more.

Early bird pricing for O3DCon expires September 16.

The event is produced by the Open 3D Foundation (O3DF), home of the open-source Open 3D Engine (O3DE) project. O3DE is a modular, cross-platform 3D engine built to power anything from AAA games to cinema-quality 3D worlds to high-fidelity simulations. The code is hosted on GitHub under the Apache 2.0 license. Connect with the community on Discord.com/invite/o3de and GitHub.com/o3de.

About the Open 3D FoundationEstablished in July 2021, the mission of the Open 3D Foundation (O3DF) is to make an open-source, fully-featured, high-fidelity, real-time 3D engine for building games and simulations, available to every industry. The Open 3D Foundation is home to the O3D Engine project. Since its launch in 2021, more than 25 member companies have joined the O3DF. Newest members include OPPO and Heroic Labs, as well as Microsoft, LightSpeed Studios and Epic Games. Other Premier members include Adobe, Amazon Web Services (AWS), Huawei, Intel and Niantic. In May, O3DE announced its latest release, focused on performance, stability and usability enhancements. The O3D Engine community is very active, averaging up to 2 million line changes and 350-450 commits monthly from 60-100 authors across 41 repos.

About the Linux FoundationFounded in 2000, the Linux Foundation and its projects are supported by more than 2,950 members. The Linux Foundation is the worlds leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the worlds infrastructure including Linux, Kubernetes, Node.js, ONAP, Hyperledger, RISC-V, and more. The Linux Foundations methodology focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at linuxfoundation.org.

The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our trademark usage page: https://www.linuxfoundation.org/trademark-usage. Linux is a registered trademark of Linus Torvalds.

Media Inquiries:pr@o3d.foundation

Share article on social media or email:

Go here to read the rest:
New Metaverse Track at O3DCon to Tackle Big Questions and Practical Applications of Emerging Graphical Technology - PR Web

Rezilion Recognized as SBOM Tool Provider in Gartner Emerging Technologies Trend Report on Software Bills of Materials (SBOM) USA – English – USA -…

BE'ER SHEVA, Israel, Sept. 9, 2022 /PRNewswire/ --Rezilion,an automated software vulnerability management platform,announced today that it has been named a vendor providing Innovative tools for SBOM management in Gartner's new report, titled Emerging Tech: A Software Bill of Materials Is Critical to Software Supply Chain Management.

The report highlights the growing importance of SBOMs in managing software supply chain risk at a time when the software industry increases its reliance on third-party and/or open-source code. Unlike internally-developed components, which adhere to rigorous security and quality guidelines, open-source software (OSS) can come from many sources and is far more prone to risk. These security and compliance risks are exacerbated by a lack of visibility and understanding of open-source dependencies within the software supply chain. SBOMs answer that challenge by providing a much-needed view into an organization's inventory of software, as well as the dependencies, licenses, compliance posture and provenance information.

The software supply chain has become a target and is under constant attack, with high-profile breaches, such as the ones impacting SolarWinds and Kaseya. An SBOM is critical because it offers visibility, and also allows users to monitor vulnerabilities in parallel with whatever vulnerability management is conducted by the supplier. But having visibility isn't enough - organizations also need to be able to identify new software vulnerabilities. To meet this need, the report recommends that static SBOMs evolve to include dynamic and real time capabilities. Furthermore, the report highlights the need to go beyond identification of software vulnerabilities and leverage SBOMs to drive efficient remediation.

Using the Rezilion platform, customers can identify, prioritize, and remediate software vulnerabilities using a first-of-its-kind Dynamic SBOM. Unlike static SBOMs, which traditionally provide visibility into a single software environment at a specific point in time, Rezilion's Dynamic SBOM seamlessly plugs into all software environments, from development to production, and provides real-time visibility to all software components. Rezilion's Dynamic SBOM then does more than just uncover what software components are there: it reveals if and how they're being executed in runtime, providing organizations with an unparalleled solution to understand where bugs exist but also whether or not they could be exploited by attackers.

Through Rezilion's Dynamic SBOM, customers benefit from:

"Gartner's analysis and outlook on SBOMs arrives at a critical time," said Liran Tancman, Co-Founder and CEO of Rezilion. "As more organizations embrace SBOMs as a vital component of their software security tooling, we're thrilled to be among the named providers. Our Dynamic SBOM gives organizations the ability to know how their dependencies are being exploited, which solidifies how well-aligned our current capabilities are with the evolution of SBOMs in the future."

Rezilion was named a vendor in the Software Bill of Materials (SBOM) category in the Gartner Hype Cycle for Open Source Software, 2022, and the SBOM and ASOC categories in the Gartner Hype Cycle for Application Security, 2022, in July of this year.

Rezilion's Dynamic SBOM is available now across CI and on-prem and cloud environments. A basic, free-of-charge version is available for use in CI through Rezilion's website. Get started today at http://www.rezilion.com/get-started.

Rezilion's platform automatically secures the software you deliver to customers. Rezilion's continuous runtime analysis detects vulnerable software components on any layer of the software stack and determines their exploitability, filtering out up to 95% of identified vulnerabilities. Rezilion then automatically mitigates exploitable vulnerabilities across the SDLC, reducing vulnerability backlogs and remediation timelines from months to hours, while giving DevOps teams time back to build.

Learn more about Rezilion's software attack surface management platform at http://www.rezilion.com and get a 30-day free trial.

Disclaimer: GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Media Contact:Danielle OstrovskyHi-Touch PR410-302-9459[emailprotected]

SOURCE Rezilion

View original post here:
Rezilion Recognized as SBOM Tool Provider in Gartner Emerging Technologies Trend Report on Software Bills of Materials (SBOM) USA - English - USA -...

Open Security: The next step in the evolution of cybersecurity – SC Media

When it comes to openness in technology, people first think of open source software. But IT professionals can (and should) explore another avenue of openness: open security.

Open security may sound like an oxymoron for many in the cybersecurity field. After all, many security vendors today employ secrecy to guard their threat detection and response methods. But the consequence of this secrecy has created a dangerous monoculture in security, characterized by a general lack of transparency, black-box products, and poor integrations. The prioritization of vendor competition over collaboration to safeguard users further supports the asymmetric advantage held by attackers and ensures one breach can take down an entire ecosystem.

Closed security, while good in the short-term for vendors, has not been good for users, customers, or organizations seeking better security.

As a CISO with more than two decades of experience leading tech and financial service organizations, I believe that open securityoffering open detection rules, open artifacts, and open codeholds significant promise in making for transparent, interoperable, and accessible cybersecurity for all companies.

Open Security Open Source

Think of open security as a philosophy, methodology, and way of doing business that shifts the dynamic of a security companys relationship with its users toward transparency. Open security encourages community engagement to further strengthen the security posture of vendors, their customers, and users.

By developing security in the open, vendors let security practitioners see the underlying code of a product and run tests before implementing it in their environment.

Open security also offers practitioners a better understanding of how threat detections work and how security technology operates within a given environment, allowing organizations to simplify their cybersecurity processes.

Most important, it helps information security professionals identify potential blind spots or known gaps in a products code, and thats especially crucial given that no single security solution can protect against every known and unknown cyber threat.

Instead of spending time and resources verifying a chosen security vendors protection claims, open security lets companies focus on addressing gaps in their security technology stack and developing risk profiles for new and emerging threats. Similar to open source collaboration, security teams can leverage the cybersecurity community to identify security gaps faster than any security operations center can on its own.

In reality, security professionals have been playing defense with limited information thus far. When companies employ open security to look at their defense-in-depth, it offers a deeper understanding of how their organizations are protected.

Expand the talent pool with open security

The same information silos that lead to thousands of data breaches every year also contribute to the ever-widening cyber skills gap. By making security closed and proprietary, security vendors increase the barrier to entry for new security professionals.

As any security practitioner will admitits hard to break into the industry absent the ability to tinker with the tools to understand how they work. Security has wrapped itself in a dark-arts culture that reduces the diversity of its talent pool, deters new entrants, and encourages tolerance for complex and hard-to-use tools.

While many security practitioners get their start in the public sector, there are not enough of these hyper-skilled defenders to fill the ranks of organizations facing increasingly frequent and sophisticated attacks.

Developing security in the open lowers the barrier to entry for new cybersecurity professionals by making security accessible to a wider range of people. It encourages them to seize the opportunity to learn by letting them study the technology on a deeper level than whats available in the current market.

Cyber maturity requires transparency

While open security may sound radical, relying on security through obscurity as the primary form of protection against cyber threats does not work as an effective strategy for long-term success. The cybersecurity industry has transformed significantly in the past decade; now, its time for the next phase of growth, and an open security model unlocks new opportunities to educate and empower users.

Ultimately, customer demand will determine whether vendors adopt open security. Today, security providers may not want to open the black box of security because they know too many bypasses and questionable coding choices exist because of balancing performance and security or developing in a closed environment with minimal accountability. Open security can help right that wrong. And if customers demand that transparency, security providers will oblige.

By adopting an open approach to security, providers can invest the time to improve their products and practices while encouraging a new and diverse talent pool to join their ranks. Doing so can strengthen the security industry and better equip organizations to tackle tomorrows threats.

Mandy Andress, chief information security officer, Elastic

View post:
Open Security: The next step in the evolution of cybersecurity - SC Media

11 Interesting Firefox Add-ons to Improve Your Browsing Experience – It’s FOSS

I think we can all agree that Firefox is one of the best browsers for Linux.

And, as a cherry on top, you can enhance your browsing experience with some extensions! Maybe even isolate Facebook?

Before I suggest some awesome Firefox add-ons, let me give you some pointers.

One thing that we all know is that blindly installing browser extensions can be extremely harmful. So how do you determine if a browser extension is safe to use?

Since this article is about Firefox add-ons, we focus on Firefoxs marketplace (the official place to get the add-ons).

While nothing is 100% bug-free/secure, there are a few things one can check:

With that said, let us take a look at a few of the extensions that improves your web browsing experience.

Also Read: 9 Open Source Add-Ons to Improve Your Mozilla Firefox Experience

Key Highlights:

Everyone hates Facebook, but rarely anyone is willing to remove Facebooks tracking elements from their own website. So Mozilla pulled a Thanos moment Fine. Ill do it myself and created this add-on for Firefox users.

As the name suggests, an isolated container (not related to Docker) is created for Facebook. All the Facebook-related stuff happens inside this isolated container. This ends up making it harder for the social media giant to track you.

Key Highlights:

uBlock Origin is one of the most well-known and trusted ad blocking add-ons for Firefox. Yes, it is primarily used for blocking ads, but because its basic task is to block elements in your web browser, it can block a lot of items. Advertisements, yes, but also web trackers, cryptocurrency miners, pop-ups, etc.

Though its permissions may seem a bit excessive, there is a reason behind it. The add-on needs permissions like Access browser activity during navigation and Access your data for all websites so that it can assess every query and block ones that seem harmful or useless.

Key Highlights:

Bitwarden should be the go-to password manager for everyone. It has free sync support for mobile, web (browser), and desktop, can also store notes securely, helps generate usernames and passwords, auto-fills user info, and much more. On top of that, it is made available under the GPL-3.0 License. Who doesnt love free and open source software?

Bitwarden has everything that I would look for in a password manager. It costs just $10, if you want to upgrade to its premium plan and not self-host it. I highly recommend its Firefox add-on!

Key Highlights:

Are you someone who wants an open-source alternative to Grammarly? While I dont have any issues using Grammarly, something that I really like and prefer is free and open-source software. LanguageTool is an excellent tool one can use for checking grammar inconsistencies like spelling errors, using a different spelling (color vs colour), commonly confused words (then vs than) and you also get a thesaurus with it.

In my experience of using this add-on, it has worked reliably on almost all text fields. No issues there. The two biggest features of this add-on are as follows:

Picture this, you are reading an article on the Internet. There are two banner ads on the top and bottom of the webpage. There are ads on the whole right side. On top of the bottom ad banner is a video playing automatically. You turn on the ad blocker. But the video continues to play. The banners dont have ads in them, but they still use up valuable screen real estate. Bothered much?

Dont be too bothered. Behold, the Tranquility Reader add-on for Firefox. This extension removes extra elements like photos, videos, ads, social media share buttons, etc. It gives you a clean UI with nothing but text, so you can focus on reading.

The Tranquility Reader add-on has the following stats:

Key Highlights:

Enhancer for Youtube add-on for Firefox is one of its kind. It adds a few buttons to the YouTube player, allowing for greater customization. You get things like changing the resolution, controlling playback speed, controlling audio volume level with the mouse scroll wheel, and much, much more.

You can find more information about the extension on its official webpage.

Keeping a track of your time, productivity and sanity is crucial when you are browsing the internet. Especially when you are researching a topic and go down a rabbit hole. You deserve a break, but you will be so entrenched that you may lose track of time.

The Tomato Clock add-on is exactly what its name suggests. It is a clock timer. A tomato is 25 minutes long, which feels either long or short depending on your mental engagement with the content displayed on the screen. Upon completion of 25 minutes, you will get a browser notification, notifying you about the ever-passing of time.

Key Highlights:

Key Highlights:

When you search for the term Red Lamborghini, you get images of a red-colored Lamborghini. But, what if you didnt know what car it was? This add-on allows you to search for images, using the imageinstead of textual termsand shows similar results or the source of origin for that image.

You have the following ways of choosing an image for a search:

Key Highlights:

Having an accessible dictionary is never a bad thing! Ive certainly been spoilt by the force touch to look-up feature of macOS. The Dictionary Anywhere add-on for Firefox really makes up for it when I am on my desktop, using Linux. All I need to do to get a words definition is to double-click on the word, and the definition pops up!

For the moment, the only supported languages are English, Spanish, German and French. Please note that this extension will NOT work with Firefoxs reader mode. That is because scripts are not allowed to be executed in this mode.

A slight downside is that this makes it slightly annoying to double click and select a whole word in an editable text field. A small price to pay for salvation.

Also, if you want an actively maintained extension, this will disappoint you.

Key Highlights:

If you are a Vim user, do I really need to explain this to you? Go try it for yourself! Youll thank me later.

For those who dont know what this add-on does, it allows you to navigate around Firefox solely using the Vim-style keys. Pressing the J key scrolls down, pressing the K key scrolls up, pressing the X key closes the current tab, pressing the T key opens a new tab, and a variety of other keyboard shortcuts.

While this add-on has the Experimental badge, I have had no problems with it in my experience of using it over the last year or two.

FireShot is a very simple Firefox add-on. It allows you to capture the full web pages into a single, long image or as a PDF file. On top of that, you can annotate too (hahaha)! Although annotation only works on Windows, thats a bummer!

It does not have a Recommended badge by Firefox. So, you can explore more about it on its add-on page before you decide to use it.

This article covers a wide range of add-ons for Firefox that I think should help improve your web browsing experience.

What is your favorite Firefox extension? Let me know your thoughts in the comments below.

Excerpt from:
11 Interesting Firefox Add-ons to Improve Your Browsing Experience - It's FOSS

Free Speech | American Civil Liberties Union

Freedom of expression is the matrix, the indispensable condition, of nearly every other form of freedom.

U.S. Supreme Court Justice Benjamin N. Cardozo in Palko v. Connecticut

Freedom of speech, the press, association, assembly, and petition: This set of guarantees, protected by the First Amendment, comprises what we refer to as freedom of expression. It is the foundation of a vibrant democracy, and without it, other fundamental rights, like the right to vote, would wither away.

The fight for freedom of speech has been a bedrock of the ACLUs mission since the organization was founded in 1920, driven by the need to protect the constitutional rights of conscientious objectors and anti-war protesters. The organizations work quickly spread to combating censorship, securing the right to assembly, and promoting free speech in schools.

Almost a century later, these battles have taken on new forms, but they persist. The ACLUs Speech, Privacy, and Technology Project continues to champion freedom of expression in its myriad forms whether through protest, media, online speech, or the arts in the face of new threats. For example, new avenues for censorship have arisen alongside the wealth of opportunities for speech afforded by the Internet. The threat of mass government surveillance chills the free expression of ordinary citizens, legislators routinely attempt to place new restrictions on online activity, and journalism is criminalized in the name of national security. The ACLU is always on guard to ensure that the First Amendments protections remain robust in times of war or peace, for bloggers or the institutional press, online or off.

Over the years, the ACLU has represented or defended individuals engaged in some truly offensive speech. We have defended the speech rights of communists, Nazis, Ku Klux Klan members, accused terrorists, pornographers, anti-LGBT activists, and flag burners. Thats because the defense of freedom of speech is most necessary when the message is one most people find repulsive. Constitutional rights must apply to even the most unpopular groups if theyre going to be preserved for everyone.

Some examples of our free speech work from recent years include:

Link:

Free Speech | American Civil Liberties Union

Censorship wars: Why have several communities voted to defund their public libraries? – WBUR News

Public libraries in the U.S. are under increasing scrutiny.

Last year, the American Library Association reported a record number of book challenges, topping nearly 1,600 books.

"How a book on a shelf could be a threat to anyone is beyond us. Libraries are for voluntary reading. Libraries are for choice. They're a resource we should fiercely protect and preserve."

Efforts are also more aggressive. Several communities have voted to stop funding their public libraries. In others:

"There's been a few instances where there have been physical threats or, for example, the library in Montana that found books in their book dropped that had been riddled with bullets."

Today, On Point: Protecting America's public libraries.

Deborah Caldwell-Stone, director of the American Library Association's Office for Intellectual Freedom. She works on projects "addressing censorship and privacy in the library."

Patrick Sweeney, political director of EveryLibrary, the first and only national political action committee for libraries. He is also the former Administrative Librarian of the Sunnyvale Public Library in California.

George M. Johnson, author of All Boys Arent Blue. The book is a young adult non-fiction memoir about Johnson's journey growing up as a queer Black man in America. Its the third most challenged book of 2021 out of nearly 1,600 books. It has been targeted for removal in at least 14 states. (@IamGMJohnson)

Kimber Glidden, director of the Boundary County Library in Idaho.

On the climate in American libraries

Deborah Caldwell-Stone: "We're seeing the result of a divisive campaign intended to limit everyone's access to information, to really sanction one viewpoint, one political view, one approach to information, to prevent everyone from having the ability to make choices for themselves.

"We're observing organized advocacy groups try to impose an agenda on libraries to change policies, to ban books, to really limit the ability of the public library to serve as a community resource that meets the information needs of everyone in the community, but instead limits their offerings to what's approved by a few political groups in the community. And this has had very real consequences for libraries across the country.

"We're seeing contentious board meetings. We're seeing librarians actually charged in criminal court with pandering obscenity to minors. And we're also working with libraries, closely monitoring situationslike you've described, where there's been an effort to either defund the library or take over the library board in order to impose a particular agenda."

In Jamestown Township, Michigan, voters voted to defund the Patmos Library.

The library has 67,000 books, videos and other items. There were only about 90 titles voters had a problem with. Why were they willing to risk the whole library over that tiny fraction number of titles?

Deborah Caldwell-Stone: "We're seeing the result of a lot of disinformation and misinformation about libraries, how librarians work and the content of the books. For example, I absolutely reject the idea that books that deal with puberty, human reproduction, sexual health, developing good relationships have anything to do with what's called grooming. That's a falsehood that's spread by a number of advocacy groups that really have an anti-pornography, anti-LGBTQIA agenda.

"And these talking points are picked up. People don't have any basis to question them. And as a result, they are encouraged to act on that false information when they participate in elections. You know, and it's also a fundamental misunderstanding of the purpose of public libraries as a whole. These are community institutions that are intended to serve everyone in the community. And we know that we live in a rapidly diversifying society, that there are all kinds of people in every community that have different information needs.

"And so the library, by its nature, is going to be acquiring works that represent a variety of ideas, viewpoints, including books you might not agree with. That you might not give to your own child, but another family, another parent would want their child to read. And there's this loss of civic engagement, community feeling where we share a resource. And we understand there's a book on the shelf that is there for me. But by its very nature, the library is also going to have books on the shelf that I don't agree with, but I tolerate that. I understand that, because that means that the library will be there for me, as well, to serve my information needs.

"And we're seeing a real loss of that community, of that understanding of the library as a community institution. And the loss can be so great. A public library is essential for not only for reading books, but, you know, many, many times it's the community's portal to the internet. It supports home schooling. It supports the ability to train for new jobs, to find new jobs. It supports small businesses in the community. It's a real resource. It can help seniors with applying for Social Security.

"You know, the public library has really turned into that place, that third place you go to. Not only to read a murder mystery, but also where you can find support and information to live your best life, to find work to support your family. ... If you're a young adult, it's the place you can go to prepare to go into college, to enter the military, to start a successful career."

On defunding libraries for political leverage

Patrick Sweeney:"I think it is fundraising and getting elected. You know, we are seeing that the governors who we are seeing surfacing themselves to run for president are the ones that are beating the indoctrination and grooming drums the most. Speaking of Idaho, Heather Scott in Idaho had the Panhandle Patriots come to a meeting where she was talking about the grooming indoctrination of children who said that they weren't scared of librarians and they defend against librarians.

"Librarians are average age over 40 and 80% female. So these open carry highly militant organizations are going to shoot a 48 year old female librarian over some books. But what we're seeing is that talk was really about fundraising. It was really about riling her base. It was really about her getting the resources she need to move her personal agenda forward. You know, I think that's the most terrifying thing, how effective these lies have become in order to raise money. And so disconnect and divisiveness in our country simply for short term political gain."

On what we stand to lose when libraries are under threat

George M. Johnson: "We literally just go back to our origins, when we start to deny the ability of reading and writing. And that's what it really is, right? We're trying to literally deny an ability for people to read and people to write. And that is something that my ancestors know about very well, because we were denied that ability to read and write. It was illegal for people like me to be able to read and write in the 1800's and in the 1700's in this country. And so when we are specifically targeting books by Black people, books by queer people, we are going back to this country's origins, which is interesting.

"Because that's the whole tagline, right? Make America Great Again. And it's like, But at what point are you speaking of? Are you speaking before Black people had civil rights? Are you speaking of during slavery? Are you speaking of when the indigenous people? Like what point was it great for the people who you're literally targeting right now? And so even like when we hear those type of statements, we know exactly what the dog whistle is, too. And so when you start to say, Well, we're going to remove these specific books and we're going to start to remove these specific talking points.

"What you are really saying is that there is a second class and a third class of citizen that exists in this country, and we are going to remove the materials that make them powerful, that make other people want to know about these people, and that make other people build those bridges of empathy towards these people. Because the danger is if we lose our power as the majority, oh my God, there might actually be equity and equality. And that's not what we want. We don't want equity inequality. Like who would want that when we've been in power for so long? And so that's really the danger in removing that. It's like the onion and we just keep peeling away layers. First it's books. Then it's our rights. Then what's next?"

See the original post here:

Censorship wars: Why have several communities voted to defund their public libraries? - WBUR News