InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
This piece breaks down software license terminology and provides three different open-source license considerations for use in internal and commercial software projects.
Software licenses use a wide range of terminology. Some terms to understand include:
Open-source licenses have three main considerations:
READ: Secure Coding Basics for Developers
With respect to the various license considerations, some licenses can be easier to use than others. In general, most open-source licenses can be used safely for internal projects, because the license restrictions are typically only applied with respect
to software distribution. The distribution of open-source software can get very tricky, especially for larger works that are made up of many different projects.
In general, most open-source licenses are designed for sharing and have concessions for commercial use. However, it is wise to avoid mixing different restrictive licenses in the same project because there are cases where licenses have competing language
(e.g., GPL and CDDL).
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in connection with such information, opinions, or advice.
May 19, 2022
By IANS Faculty
Understand potential security risks for executives on social media. Find information on attack trends and guidelines to help identify potential attacks and keep both social media accounts and the organization secure.
May 17, 2022
Learn how to make progress with zero trust, including common zero trust use cases, success stories, tooling guidance and tips for effectiveness.
May 12, 2022
Gain an understanding of the role executives play in incident response (IR). Find guidance on key actions to take before, during and after a security incident.