Sonatype's DevSecOps Community Survey, saw IT professionals report that open-source breaches have increased by 71% over the past five years. While the jury is still out on whether proprietary or open-source operating systems are more secure, there have been several recent negative reports in relation to the security of open-source software in general. What are the main security concerns with open-source operating systems? In the past year, only 3% of enterprises who had surveyed their usage of open-source technologies said they had plans to scale them back, with 59% planning to increase their open-source commitment. The 2019 Red Hat State of Enterprise Open Source report, based on 950 interviews with worldwide enterprise IT leaders, found only 1% of enterprises dismiss the importance of open-source software. It says that "adoption of open-source infrastructure software continues to disrupt the CSP ecosystem" and advises CSPs to accelerate the adoption of open-source infrastructure software. Gartner's Hype Cycle for Open-Source Software, 2018 gives examples of open-source infrastructure projects as Clearwater Core IMS, Core Network Dynamics (openEPC), OpenBTS, openRAN, Open Edge Computing, OpenStack, Docker and KVM. Additionally, cloud platforms are increasingly running a mesh of microservices that rely on an array of open-source tooling, from Docker containers to the Kubernetes platform for managing those containers. Red Hat's made a multi-billion dollar business out of supporting open-source software and today owns organizations responsible for everything from integration services for the open-source cloud platform OpenStack through to creating the KVM hypervisor.Īs businesses migrate more and more systems to these cloud platforms, the open-source software at their heart will increasingly become a key part of any enterprise architecture - even more so than it's already important role today. The purchase was largely seen as an on-ramp for IBM to the datacenters that underpin the cloud, which are increasingly reliant upon open-source software and tooling to prop up their platforms. If you needed proof of open-source software's value to business in 2019, look no further than IBM's recent purchase of Red Hat. Why should you use open-source software for your business? For example, you might have one qube for visiting untrusted websites and another for doing online banking. Tails can be run from a DVD or USB stick and its designers say it will "leave no trace on the computer you are using", will attempt to anonymise internet use via the Tor network, and will encrypt your files, emails and instant messaging.Īnother example of a security-focused, open-source OS is Qubes, which is an operating system that ramps up security by compartmentalizing different activities into isolated instances called qubes that are unable to affect each other. SEE: 10 tips for new cybersecurity pros (free PDF) There are also many open-source operating systems focused on providing highly secure machines that also protect the privacy of the user.įor example, Tails is a privacy-centric OS designed for those who want to evade tracking as much as possible. While not widely distributed in on its own, Chromium OS forms the basis of the Chrome OS that runs on Chromebooks, which are particularly popular in the education market. There's also Chromium OS, the open-source operating system designed around running web apps. At the core of the Android OS is the Android Open Source Project, which is open, as the name suggests, but built around that are closed-source Google-branded apps. The issue is that what many people think of as Android is not wholly open-source. On the face of it, the most popular open-source operating system is Android, which is based on a modified version of the Linux kernel. Working out which are the most popular open-source operating systems isn't straightforward. What are the most popular open-source operating systems? The difference is that, like open-source operating systems, the source-code of the applications is available for anyone to inspect, modify and share. Open-source applications are fundamentally the same as proprietary applications.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |