Category

In the News

InfoWorld: Linux Foundation Tackles Open Source Security with New Badge Program

By | In the News | No Comments

InfoWorld writer Fahmida Y. Rashid interviews Nicko van Someren, chief technology officer of The Linux Foundation about The Core Infrastructure Initiative’s Best Practices Badge program.

Businesses increasingly rely on open source software, but they usually don’t have a way to tell if developers are following secure coding practices, how they handle vulnerabilities and security updates, or how stable the software is. The CII Best Practices Badge program gives businesses answers to these questions.

Read more at InfoWorld.

CIO: CII’s Best Practices Badge Program is Making Open Source Projects More Secure

By | In the News | No Comments

Swapnil Bhartiya provides an overview of the CII Best Practices Badges Progam.

While open source projects boast of being more secure compared to proprietary solutions, the fact is not every project has resources or mechanism to ensure security. In many cases there are not enough eyeballs to render all bugs shallow.

CII enables technology companies, industry stakeholders and esteemed developers to collaboratively identify, fund and improve the security of critical open source projects.

Read more at CIO.

Softpedia News: Linux Foundation’s Badge Program Launches to Boost Security of Open Source Apps

By | In the News | No Comments

Marion Nester of Softpedia covers the basics of CII Best Practices Badges Program.

Dubbed CII Best Practices Badges, the free badge program has been created by Linux Foundation’s Core Infrastructure Initiative (CII) project. Its main goal is determining the security, stability, and quality and various open source software projects, and among the first to earn these badges are the well-known Linux kernel, OpenSSL, Node.js, GitLab, cURL, Zephyr, and OpenBlox.

Read more at Softpedia News.

SecurityWeek: No Exit: The Case for Moving Security Information Front and Center

By | In the News | No Comments

SecurityWeek has published an article by CII’s Emily Ratliff called No Exit: The Case for Moving Security Information Front and Center.

The top 4 were picked for brevity for this article, but I encourage you to compare the full lists for greater impact. With this in mind, the similarities between the two lists released 13 years apart are startling and humbling.

Read more at SecurityWeek.

SecurityWeek: Establishing Correspondence Between an Application and its Source Code

By | In the News | No Comments

SecurityWeek has published an article by CII’s Emily Ratliff called Establishing Correspondence Between an Application and its Source Code.

Soon it will be possible to enroll the signed hashes from the package management system as IMA attributes during the installation process. Then, if you configure your system to be IMA enforcing, you will know that every running application came from your trusted distribution.

If your trusted distribution uses reproducible builds, then you will be able directly trace the chain of integrity of the executing process back to the original code and know that the code has not been subverted during delivery.

Read more at SecurityWeek.

Wired: One Startup’s Heretical Plan to Turn Open Source Code Into Cash

By | In the News | No Comments

Klint Finley mentions CII in an article for Wired about the problems monetizing open source development efforts, called One Startup’s Heretical Plan to Turn Open Source Code Into Cash.

Non-profit organizations like the Linux Foundation have stepped in to help fund a growing number of projects in recent years. For example, the Linux Foundation started the Core Infrastructure Initiative to help fund OpenSSL and other crucial but obscure open source projects.

Read more at Wired.