{"id":24470,"date":"2014-07-02T18:40:36","date_gmt":"2014-07-02T22:40:36","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24470"},"modified":"2014-07-02T18:40:36","modified_gmt":"2014-07-02T22:40:36","slug":"security-of-open-source-in-a-post-heartbleed-world","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/open-source-software\/security-of-open-source-in-a-post-heartbleed-world.php","title":{"rendered":"Security of open source in a post-Heartbleed world"},"content":{"rendered":"<p><p>    The open source horse has bolted and organisations must    scrutinise their network security to ensure the use of such    software doesn't put data at risk.  <\/p>\n<p>    That was the consensus of IT leaders speaking at    Computing's Enterprise Security and Risk Management    Summit, which took place at the London Tower Bridge Hilton    Hotel.  <\/p>\n<p>    During a panel discussion on the subject of \"Keeping up with    the security threats of today: can you future-proof your    business?\", Computing editor Stuart Sumner asked    whether the participants were more doubtful about the security    of open source software in the post-Heartbleed    world.  <\/p>\n<p>    \"I think it's horses for courses. Open source needs more    scrutiny,\" said Barry Coatesworth, chief information security    officer for New Look.  <\/p>\n<p>    \"There are pros and cons. But I think it boils down to what's    the habitat, where's the business going, is it cost saving to    use open source? So it's swings and roundabouts,\" he added.  <\/p>\n<p>    Marc Lueck, director of global threat management at publishing    company Pearson, continued with the horse theme, using it to    suggest open source is already out there in the enterprise and    that it's something that security personnel need to take into    account when managing risks and networks.  <\/p>\n<p>    \"I'd add to that using a horse analogy; the stable door is open    and the horse has bolted. We don't have the opportunity to    change our minds now, we're using open source, that decision is    made,\" he said. \"We now need to figure out how to fix it, how    to solve it, how to protect ourselves from decisions that have    already been made.\"  <\/p>\n<p>    However, Ashley Jelleyman, head of information assurance at BT,    took the view that no matter what sort of software is being    used, it still has to be properly evaluated for security.  <\/p>\n<p>    \"I think the real issue is not whether it's open source or    closed source, it's actually about what you do with it and how    you actually evaluate it to make sure it's fit for purpose.    It's have we checked this through, are we watching what it's    doing?,\" he said.  <\/p>\n<p>    \"One of the things we can look at - whether it's open source or    closed source software - is whether it's doing things that are    expected, it's about having an eye on not just the software but    the whole network around it, it's environment, to make sure    you're not seeing shed loads of data disappearing out of your    extranet for no good reason,\" Jelleyman added.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.computing.co.uk\/c\/554\/f\/538923\/s\/3c19661c\/sc\/1\/l\/0L0Scomputing0O0Cctg0Cnews0C23532820Csecurity0Eof0Eopen0Esource0Ein0Ea0Epost0Eheartbleed0Eworld\/story01.htm\/RK=0\/RS=wkHY6F4.213Nju5cUSeksFBTnas-\" title=\"Security of open source in a post-Heartbleed world\">Security of open source in a post-Heartbleed world<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The open source horse has bolted and organisations must scrutinise their network security to ensure the use of such software doesn't put data at risk. That was the consensus of IT leaders speaking at Computing's Enterprise Security and Risk Management Summit, which took place at the London Tower Bridge Hilton Hotel. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-24470","post","type-post","status-publish","format-standard","hentry","category-open-source-software"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24470"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24470"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24470\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}