InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
This piece breaks down software license terminology and provides three different open-source license considerations for use in internal and commercial software projects.
Software licenses use a wide range of terminology. Some terms to understand include:
Open-source licenses have three main considerations:
READ: Secure Coding Basics for Developers
With respect to the various license considerations, some licenses can be easier to use than others. In general, most open-source licenses can be used safely for internal projects, because the license restrictions are typically only applied with respect
to software distribution. The distribution of open-source software can get very tricky, especially for larger works that are made up of many different projects.
In general, most open-source licenses are designed for sharing and have concessions for commercial use. However, it is wise to avoid mixing different restrictive licenses in the same project because there are cases where licenses have competing language
(e.g., GPL and CDDL).
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in connection with such information, opinions, or advice.
September 29, 2022
By IANS Faculty
Understand the integration points between information security and enterprise architecture. Find guidance for functional organizational constructs to maintain a solid EA practice.
September 27, 2022
By IANS Research
Learn how to ensure full cyber insurance policy coverage and find 5 tips to help maximize your potential cyber insurance claims.
September 22, 2022
Find information on cyber insurance coverage types along with best practices to choose a cyber insurance carrier and policy for optimal security coverage.