> HP - Enterprise > A CISO's Guide to Securing Open Source Software

A CISO's Guide to Securing Open Source Software

Published By: HP - Enterprise
HP - Enterprise
Published:  Nov 19, 2008

For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.

Tagsbusiness risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, jennifer bayuk, bear stearns, ciso, application security best practices, auditing, security management