RSS feed Get our RSS feed

News by Topic

A CISO's Guide to Securing Open Source Software

HP - Enterprise

For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.

Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
 Email this page
Published:  Nov 19, 2008
Type:  Webinar