Intellectual Property News From Silicon Valley

Intellectual Property in Silicon Valley

Subscribe to Intellectual Property in Silicon Valley : eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Intellectual Property in Silicon Valley : homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


IP Authors: Larry Alton, Linda Thayer, Ming-Tao Yang, Jack Newton, Yeshim Deniz

Related Topics: Open Source Journal, Intellectual Property in Silicon Valley, Telecom Innovation, Android

Blog Feed Post

Whether It’s Proprietary or Open Source, You’ve Got to Proactively Manage Your Code

Earlier this year, a serious security flaw in Internet Explorer was revealed, allowing hackers to figure out ways to remotely commandeer computers that were running Microsoft’s pervasive proprietary Web browser. On top of that, last month researchers concluded that Google’s Android open source operating system contained similar security vulnerabilities, which if exploited, would allow intruders to gain access to all sorts of sensitive information—from payment histories to emails to credentials.

Though there’s a never-ending conversation surrounding whether open source code or proprietary code is more secure, these two documented situations should lead readers to the same conclusion: Regardless of whether code is open source or proprietary, it’s imperative that businesses work to manage all vulnerabilities in their code base.

Proponents of proprietary code will argue that solutions developed inside the walls of an organization are more secure because staff works hard to ensure protected software. After all, a company’s name is on the line with each release. On the other hand, proponents of open source say a community of dedicated programmers works tirelessly to ensure that the code they produce is impenetrable as well.

No matter which perspective you most support, the flaws in Android and Internet Explorer highlight a basic premise: Humans are not infallible. It’s only a matter of time before there’s a flaw in some of the code your business uses—whether that code is proprietary or open source.

To ensure your company is protected from exposure to vulnerabilities, decision makers should strongly consider leveraging tools that work to reveal security gaps. Such tools can also help companies see whether their software contains any third-party code and, if so, whether that code is properly licensed.

Click here to learn more about how your business stands to benefit from performing an intellectual property software audit with Protecode Certified.

Read the original blog entry...

More Stories By Lacey Thoms

Lacey Thoms is a marketing specialist and blogger at Protecode, a provider of open source license management solutions. During her time at Protecode, Lacey has written many articles on open source software management. She has a background in marketing communications, digital advertising, and web design and development. Lacey has a Bachelor’s Degree in Mass Communications from Carleton University.