{"id":18938,"date":"2021-08-05T21:41:35","date_gmt":"2021-08-05T21:41:35","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18938"},"modified":"2021-08-05T22:39:15","modified_gmt":"2021-08-05T22:39:15","slug":"open-source-security-a-big-problem","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/","title":{"rendered":"Open Source Security: A Big Problem"},"content":{"rendered":"<p>Open source security has been a big focus of this week&#8217;s Black Hat conference, but no open source security initiative is bolder than the one proffered by the Open Source Security Foundation (OpenSSF).<\/p>\n<p>Amid discussions on the security of open source technologies like eBPF and Hadoop, OpenSSF speakers Jennifer Fernick, SVP and head of global research at NCC Group, and Christopher Robinson, Intel&#8217;s director of security communications, outlined the group&#8217;s vision to secure open source software &#8220;end to end, at massive scale.&#8221;<\/p>\n<p>OpenSSF was formed a year ago by the merger of Linux Foundation, GitHub and industry security groups. It has more than 50 members so far, from tech giants like IBM, HPE, Intel, Facebook, Google, Cisco, Microsoft, Huawei, Samsung and VMware, to small companies, open source-based companies like Red Hat, Suse and Canonical, and open source users like JP Morgan Chase, Comcast and Uber.<\/p>\n<h2>Open Source Software is at the Heart of Everything<\/h2>\n<p>Fernick and Robinson cited Sonatype research that FOSS (free and open source software) constitutes 80-90% of any piece of modern software (see chart below).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-18941\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/08\/opensourcecodebase.jpg\" alt=\"open source code in software\" width=\"938\" height=\"908\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/opensourcecodebase.jpg 938w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/opensourcecodebase-300x290.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/opensourcecodebase-768x743.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/opensourcecodebase-150x145.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/opensourcecodebase-696x674.jpg 696w\" sizes=\"(max-width: 938px) 100vw, 938px\" \/><\/p>\n<p>A Synopsis report found that 84% of these codebases had at least one vulnerability, with the average having 158 per codebase. Most OSS vulnerabilities are discovered in indirect dependencies (Snyk). A typical vulnerability can go undetected for 218 weeks, and on average takes 4 weeks to get resolved once the project is alerted to it (Octoverse).<\/p>\n<p>At a time when the time between vulnerability disclosure and exploit creation has gone from 45 days to 3, &#8220;the number of vulnerabilities in the wild outpaces the speed at which the security community can <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patch<\/a> or even identify them,&#8221; and automated attacks are quickly weaponizing even little-publicized flaws, Fernick said.<\/p>\n<p>The distributed, public-facing nature of open source projects is one issue contributing to the security challenge, as can be limited project staffing. They noted that the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/critical-openssl-vulnerability\/\">Heartbleed OpenSSL vulnerability<\/a> persisted for years in part because the project had just two full-time developers to develop and maintain 500,000 lines of code. Nearly 100,000 public web servers remained vulnerable five years later.<\/p>\n<p>Robinson encouraged those who use open source software to help improve security by giving back.<\/p>\n<p>&#8220;We all use the software,&#8221; he said. &#8220;Let&#8217;s all find ways to help improve it.&#8221;<\/p>\n<h2>Big Ambitions<\/h2>\n<p>OpenSSF plans to tackle the OSS security problem in a big way, with stated objectives like &#8220;prevent classes of bugs from being possible at all.&#8221;<\/p>\n<p>The group wants to concentrate resources on securing the most critical libraries, components, and projects, a wise approach that should benefit everything using the same codebase, and a number of training, design, testing and vulnerability disclosure and patching projects are in the works. Robinsons also discussed OpenSSF&#8217;s reference architecture &#8211; see graphic below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-18940\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/08\/OpenSSFrefarch-1024x836.jpg\" alt=\"OpenSSF reference architecture\" width=\"696\" height=\"568\" \/><\/p>\n<p>A number of successes so far include:<\/p>\n<ul>\n<li><a href=\"https:\/\/openssf.org\/blog\/2020\/10\/29\/announcing-secure-software-development-edx-course-sign-up-today\/\" target=\"_blank\" rel=\"noopener\">Secure Software Development Fundamentals courses<\/a><\/li>\n<li><a href=\"https:\/\/openssf.org\/blog\/2020\/11\/06\/security-scorecards-for-open-source-projects\/\" target=\"_blank\" rel=\"noopener\">Security Scorecards<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/ossf\/criticality_score\" target=\"_blank\" rel=\"noopener\">Criticality Score<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/ossf\/Project-Security-Metrics\" target=\"_blank\" rel=\"noopener\">Security metrics dashboard<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/ossf\/security-reviews\" target=\"_blank\" rel=\"noopener\">Security Reviews Initiative<\/a><\/li>\n<li><a href=\"https:\/\/metrics.openssf.org\/\" target=\"_blank\" rel=\"noopener\">Security Metrics Initiative<\/a><\/li>\n<li>OWASP ZAP <a href=\"https:\/\/github.com\/marketplace\/actions\/owasp-zap-baseline-scan\" target=\"_blank\" rel=\"noopener\">Baseline<\/a> and <a href=\"https:\/\/github.com\/marketplace\/actions\/owasp-zap-full-scan\" target=\"_blank\" rel=\"noopener\">Full<\/a> scanning tools<\/li>\n<li><a href=\"https:\/\/openssf.org\/blog\/2020\/12\/09\/introducing-the-openssf-cve-benchmark\/\" target=\"_blank\" rel=\"noopener\">OpenSSF CVE Benchmark<\/a><\/li>\n<li><a href=\"https:\/\/owasp.org\/www-project-security-knowledge-framework\/\" target=\"_blank\" rel=\"noopener\">OWASP Security Knowledge Framework (SKF)<\/a><\/li>\n<\/ul>\n<h2>Big Data, eBPF Face Scrutiny<\/h2>\n<p>Weaknesses in Big Data tools and the eBPF kernel program and monitoring interface were among the open source tools in the spotlight at the conference.<\/p>\n<p>In a presentation titled &#8220;<a href=\"http:\/\/i.blackhat.com\/USA21\/Wednesday-Handouts\/us-21-The-Unbelievable-Insecurity-of-the-Big-Data-Stack-An-Offensive-Approach-To-Analyzing-Huge-And-Complex-Big-Data-Infrastructures.pdf\" target=\"_blank\" rel=\"noopener\">The unbelievable insecurity of the big data stack<\/a>,&#8221; Sheila Berta of Dreamlab Technologies discussed weaknesses in Apache Hadoop tools like the Zookeeper management layer and Ambari cluster management.<\/p>\n<p>Datadog researchers might have best summed up the attitude toward eBPF&#8217;s kernel access by asking, &#8220;<a href=\"https:\/\/www.blackhat.com\/us-21\/briefings\/schedule\/#with-friends-like-ebpf-who-needs-enemies-23619\" target=\"_blank\" rel=\"noopener\">With friends like eBPF, who needs enemies?<\/a>&#8221;<\/p>\n<p>The conference also included a number of <a href=\"https:\/\/www.blackhat.com\/us-21\/arsenal\/schedule\/index.html\" target=\"_blank\" rel=\"noopener\">open source security tools<\/a> that can be used to shore up security.<\/p>\n<h2>Microsoft Gets Attention Too, Of Course<\/h2>\n<p>Linux hardly got all the attention at the conference, of course. Microsoft got plenty, including architecture-level vulnerabilities in <a href=\"https:\/\/i.blackhat.com\/USA21\/Wednesday-Handouts\/us-21-ProxyLogon-Is-Just-The-Tip-Of-The-Iceberg-A-New-Attack-Surface-On-Microsoft-Exchange-Server.pdf\" target=\"_blank\" rel=\"noopener\">Microsoft Exchange<\/a>, along with significant flaws in <a href=\"http:\/\/i.blackhat.com\/USA21\/Wednesday-Handouts\/us-21-Tervoort-Zerologon-From-Zero-To-Domain-Admin-By-Exploiting-A-Crypto-Bug-Zerologon.pdf\" target=\"_blank\" rel=\"noopener\">Active Directory<\/a> and <a href=\"http:\/\/i.blackhat.com\/USA21\/Wednesday-Handouts\/us-21-Cloudy-With-A-Chance-Of-APT-Novel-Microsoft-365-Attacks-In-The-Wild.pdf\" target=\"_blank\" rel=\"noopener\">Microsoft 365<\/a>. <a href=\"https:\/\/www.blackhat.com\/us-21\/briefings\/schedule\/index.html#breaking-the-isolation-cross-account-aws-vulnerabilities-22945\" target=\"_blank\" rel=\"noopener\">AWS<\/a> and <a href=\"http:\/\/i.blackhat.com\/USA21\/Wednesday-Handouts\/us-21-A-New-Class-Of-DNS-Vulnerabilities-Affecting-Many-DNS-As-Service-Platforms.pdf\" target=\"_blank\" rel=\"noopener\">DNS-as-a-Service providers<\/a> got their time in the spotlight too.<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6fbb120b2a-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fbb120b2a\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fbb120b2a\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fbb120b2a\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fbb120b2a\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fbb120b2a\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fbb120b2a\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Open source security has been a big focus of this week&#8217;s Black Hat conference, but no open source security initiative is bolder than the one proffered by the Open Source Security Foundation (OpenSSF). Amid discussions on the security of open source technologies like eBPF and Hadoop, OpenSSF speakers Jennifer Fernick, SVP and head of global [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":18939,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22],"tags":[15272],"b2b_audience":[],"b2b_industry":[],"b2b_product":[382,371,418,401],"class_list":["post-18938","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","tag-linux-security","b2b_product-application-security-vulnerability-management","b2b_product-linux-os","b2b_product-linux-servers","b2b_product-operating-system-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Open Source Security: A Big Problem | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"With open source software at the heart of most codebases, Black Hat speakers discussed a major effort to shore up security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Open Source Security: A Big Problem | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"With open source software at the heart of most codebases, Black Hat speakers discussed a major effort to shore up security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-05T21:41:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-05T22:39:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/openssf-horizontal-color_720x.png\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"274\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Paul Shread\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Shread\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/\"},\"author\":{\"name\":\"Paul Shread\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\"},\"headline\":\"Open Source Security: A Big Problem\",\"datePublished\":\"2021-08-05T21:41:35+00:00\",\"dateModified\":\"2021-08-05T22:39:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/\"},\"wordCount\":653,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/openssf-horizontal-color_720x.png\",\"keywords\":[\"Linux security\"],\"articleSection\":[\"Applications\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/\",\"name\":\"Open Source Security: A Big Problem | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/openssf-horizontal-color_720x.png\",\"datePublished\":\"2021-08-05T21:41:35+00:00\",\"dateModified\":\"2021-08-05T22:39:15+00:00\",\"description\":\"With open source software at the heart of most codebases, Black Hat speakers discussed a major effort to shore up security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/openssf-horizontal-color_720x.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/openssf-horizontal-color_720x.png\",\"width\":720,\"height\":274,\"caption\":\"openssf logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Open Source Security: A Big Problem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\",\"name\":\"Paul Shread\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"caption\":\"Paul Shread\"},\"description\":\"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Open Source Security: A Big Problem | eSecurity Planet","description":"With open source software at the heart of most codebases, Black Hat speakers discussed a major effort to shore up security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/","og_locale":"en_US","og_type":"article","og_title":"Open Source Security: A Big Problem | eSecurity Planet","og_description":"With open source software at the heart of most codebases, Black Hat speakers discussed a major effort to shore up security.","og_url":"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/","og_site_name":"eSecurity Planet","article_published_time":"2021-08-05T21:41:35+00:00","article_modified_time":"2021-08-05T22:39:15+00:00","og_image":[{"width":720,"height":274,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/openssf-horizontal-color_720x.png","type":"image\/png"}],"author":"Paul Shread","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Shread","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/"},"author":{"name":"Paul Shread","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04"},"headline":"Open Source Security: A Big Problem","datePublished":"2021-08-05T21:41:35+00:00","dateModified":"2021-08-05T22:39:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/"},"wordCount":653,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/openssf-horizontal-color_720x.png","keywords":["Linux security"],"articleSection":["Applications"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/","url":"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/","name":"Open Source Security: A Big Problem | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/openssf-horizontal-color_720x.png","datePublished":"2021-08-05T21:41:35+00:00","dateModified":"2021-08-05T22:39:15+00:00","description":"With open source software at the heart of most codebases, Black Hat speakers discussed a major effort to shore up security.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/openssf-horizontal-color_720x.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/openssf-horizontal-color_720x.png","width":720,"height":274,"caption":"openssf logo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Open Source Security: A Big Problem"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04","name":"Paul Shread","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","caption":"Paul Shread"},"description":"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).","url":"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18938"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18938"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18938\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18939"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18938"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18938"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18938"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}