Four Steps to Secure Open-Source Software After CSRB’s Log4j Investigation

Open-source code appears in 92 percent of all applications. These publicly available components comprise 70 percent of the average piece of software. While this shortcut propels rapid tech advances and the global economy, the Log4j event that rocked the cybersecurity world last winter shows the giant security risks of using free code all the time. This article presents four key steps that companies can take to use open-source software more securely, and it includes comments from Cyber Safety Review Board members about their new report on Log4j, which they call an endemic threat to companies for the next decade. See “Lessons From CISA for In-House Counsel on Mitigating and Managing MSP Breach Threats” (Jun. 29, 2022).

To read the full article

Continue reading your article with a CSLR subscription.