- Insight
- Open Source Development
- Open Source Risk
- Open Source Security
Telecom Cloud and its Open Source Risks
According to federal cyber authorities, some new and emerging technologies that are taking over the ...
Avoid Surprises: Don’t Let Open Source Issues Impact a Transaction
Open source software (OSS) is becoming increasingly popular and widely used by companies of all size...
Software Security Checkpoints in the SDLC
How Widespread Are Software Security Checkpoints in the SDLC? According to the 13th and latest editi...
The Balance Between Open Source Software and Monetisation
Can OSS Be Commercially Viable? It is commonly assumed that OSS and monetisation do not readily go h...
Why it’s important to not ignore Log4j
Open-source software is becoming more popular, which is beneficial for many reasons, but with this c...
The risks of neglecting open source developers
Nowadays, it is rare to find a business which does not use open source software. OpenUK’s 2022...
How government can rebuild trust in open source software
Open source software (OSS) provides developers with many benefits, allowing them to streamline commo...
Know your ingredients! How SBOMs protect code
What is an SBOM? When making a good meal or buying food in the supermarket, we always pay attention ...
How to start an Open Source Program Office (OSPO)
What is an OSPO? In the modern world, tech companies are becoming more reliant on open source softwa...
Using open source software responsibly
Why is responsible OSS usage important? Nowadays, it is difficult to find a software development pro...
What are the risks posed by open source software, and how can I defend myself?
Open source software is used by lots of businesses and developers. Whether creating new applications...
Digital dilemma – the security issues of open source software
Tech utopia or security risk? The ideals behind open source software (OSS) are championed by many. P...