article thumbnail

Open Source Software Security: Is Open Source Software Safe?

Percona

Even though open source software is firmly in the mainstream, used widely by businesses, governments, and everyone who owns a cell phone or computer, the question repeatedly arises: “Is open source software safe?” Is open source software as stable as other software? Our bar is higher than that.

article thumbnail

Powering the Web: Two Decades of Open Source Publishing With WordPress and MySQL

Percona

WordPress, the ubiquitous publishing platform that launched millions of blogs and websites, turned 20 on May 27th. While not the first open source content management system (CMS), WordPress caught on like nothing before and helped spread open source to millions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Open Source for Testers – What, Where, Who, Why, When, and How- 5W1H

Testsigma

The open-source movement has become the most talked-about topic in the tech industry for the past two decades. We see a huge demand, inclination, and adoption of open-source software by organizations as well as software workers. In this article, I have condensed my thoughts on Open Source for Testers.

article thumbnail

Open Source at AWS re:Invent

Adrian Cockcroft

We’re excited to let you know that we have an Open Source track at re:Invent this year! AWS Developer Relations on how the shift from Robot Operating System (ROS) 1 to ROS 2 will change the landscape for all robot lovers. Brendan Gregg tours BPF tracing, with open source tools & examples for EC2 instance analysis.

article thumbnail

Open Source at AWS re:Invent

Adrian Cockcroft

We’re excited to let you know that we have an Open Source track at re:Invent this year! AWS Developer Relations on how the shift from Robot Operating System (ROS) 1 to ROS 2 will change the landscape for all robot lovers. Brendan Gregg tours BPF tracing, with open source tools & examples for EC2 instance analysis.

article thumbnail

Container security: What it is, why it’s tricky, and how to do it right

Dynatrace

Application developers commonly leverage open-source software when building containerized applications. In fact, the market research firm Forrester says that the average container image is comprised of 70% open-source software.[1] 1] And unfortunately, open-source software is often fraught with security vulnerabilities.

article thumbnail

Vulnerability assessment: key to protecting applications and infrastructure

Dynatrace

NMAP is an example of a well-known open-source network scanner. Host analysis focuses on operating systems, virtual machines, and containers to understand if there are software components with known vulnerabilities that can be patched. Analyze findings. The next step is to analyze your findings. Assess risk.