ALL >> Computers >> View Article
Prevent The Loss Of Ip Through Code Sharing Sites
Total Articles: 35
Everybody has IP in their code now
Coding is not just for software companies anymore. Companies in every industry – financial services, transportation, media, manufacturing, healthcare – all rely heavily on developers to create internal software that keeps their businesses running and provides an advantage over the competition. Much of the code developed is proprietary, but companies are increasingly leveraging open source code to support their development.
Don’t get me wrong – the open source movement is great and is here to stay (sharing is caring?). That being said, there are some hidden risks people need to know about in order to use open source code without endangering their organization’s intellectual property. One risk is that you may be downloading malware and implementing it into your code, but this article examines the other side of the issue – code that is uploaded and the risk of IP loss in doing so.
Risky T’s & C’s
Popular Cloud Security services for sharing open source code include GitHub, SourceForge, and Codehaus among many others. Most developers understand that, based on the terms and conditions of these sites, when they contribute code to an open source project, that code can become open source itself and that if the code is proprietary to their organization, their organization has lost exclusive legal rights to that code. Nonetheless, it happens and it happens a lot.
Enterprises block the wrong services
In our recent Cloud Adoption and Risk Report, we found that, similar to patterns found around file sharing services, enterprises are blocking the IT development services they are most familiar with, not the services that present the most risk. For example, GitHub, a popular open source development site is blocked 21% of the time, however Codehaus, a much riskier open source development site, is blocked only 1% of the time.
How to leverage open source safely
The key to leveraging open source safely is not “just block it”. Rather, you should take a measured approach. First, you need to understand which code sharing services your developers are currently using. Then, leverage a Cloud Security service registry to identify the best low-risk services, and promote the use of those rather than the high-risk alternatives. Next, look for directionality to identify data that is uploaded rather than downloaded. In doing so you’ll minimize the risk of IP loss and ensure that your code remains your code. Finally, make sure you’re managing use and receive alerts when an anomalous occurrence, such as a large upload, occurs.
Computers Articles1. How To Win Customers Faith And Run Your Own Online Business Portal With Alibaba Clone Script Pro
Author: sawati rawat
2. Call +1-855-490-2999 Microsoft Office 365 Customer Support Number
Author: Microsoft Office 365 Customer Support Phone Number
3. Top Laptop Rental Providers
4. A Plan Of Snmp Monitoring
Author: Gambit Communications
5. How To Minimize Threats Inside Your Network?
6. Why Can Parts Engraving Equipment Help Build Strong Business Venture
Author: Rob Hibbs
7. Church App – The Latest Way To Stay Connected To Your Preferred Church!
Author: Michael Brody
8. Microsoft Is Embedding A Potent Security Feature To Windows 10
Author: Lena Smith
9. Tell The Story Of Your Family With Free Genealogy Software
Author: Jonathan Clarke
10. Norton Com Setup +1-844-777-9606 Www Norton Com Setup And Installation
Author: Landy Corona
11. 6 Things Highly Successful Software Developers Know
12. Why Do You Need Antivirus Management?
13. Why Choose Lexington Ky For Your It Solutions?
14. Two Of Integrity It’s Best Services
15. Security Solutions Offered By Integrity It