Close Menu
  • Homepage
  • Local News
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
  • Business
  • Technology
  • Health
  • Lifestyle
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
Facebook X (Twitter) Instagram Pinterest
JHB NewsJHB News
  • Local
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
Let’s Fight Corruption
JHB NewsJHB News
Home»Technology»How monitoring libraries rather than containers is key to open-source security
Technology

How monitoring libraries rather than containers is key to open-source security

February 17, 2023No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
How monitoring libraries rather than containers is key to open-source security
Share
Facebook Twitter LinkedIn Pinterest Email

Take a look at all of the on-demand periods from the Clever Safety Summit right here.


The safety of open-source initiatives leaves loads to be desired. With 84% of codebases containing an open-source safety vulnerability, organizations have to be rather more proactive in figuring out potential entry factors in downstream software program elements.

It’s a problem that runtime software safety supplier, Oligo Safety, is getting down to remedy. At present, the corporate left stealth with $28 million in funding. It includes a group of former officers from the Israel Protection Pressure’s cyber models. 

Oligo Safety’s platform makes use of an eBPF-based engine to detect software vulnerabilities throughout runtime and alert the person. By leveraging information throughout the working software, the device provides dynamic library-level evaluation and conduct monitoring to establish vulnerabilities in working packages and prioritize fixes based mostly on software context. 

This funding spherical displays the central position that securing open-source software program elements has to play in stopping the lack of mission-critical information.  

Occasion

Clever Safety Summit On-Demand

Be taught the vital position of AI & ML in cybersecurity and trade particular case research. Watch on-demand periods right now.

Watch Right here

The open-source safety motion 

With high-profile vulnerabilities Log4Shell and Log4j shaking confidence in open-source software program from 2021 to 2022, it turned clear that organizations couldn’t afford to miss potential exploits in downstream software program elements. In any case, organizations that don’t are open to having their programs breached. 

“Open-source code includes 80% to 90% of contemporary software program, offering a pretty assault vector for nation-states and cybercriminals,” stated Nadav Czerninski, CEO and cofounder, Oligo Safety. 

After Oligo’s different cofounder, Gal Elbaz, “found {that a} extensively used app like Instagram could possibly be simply compromised by utilizing an open-source library in a method that deviates from the library’s permissions, we realized that there’s a broad hole in the way in which the market presently addresses open-source safety,” Czerninski stated. 

In response, Czerninski and Elbaz understood they wanted to watch the conduct of every library somewhat than all the container like different runtime options. 

Monitoring libraries throughout runtime permits Oligo to leverage software context and deal with the vulnerabilities which might be most related, in order that builders can prioritize and remediate essentially the most damaging potential exploits first. 

The applying safety market 

Oligo Safety’s resolution falls below the broader class of the applying safety market, which researchers estimate will attain a price of $27.7 billion by the top of 2030. 

Different suppliers providing safety for purposes embrace Aqua Safety, which provides a platform for scanning apps, VM photos, container photos and serverless features for vulnerabilities. It then generates particulars on remediating found points. 

In March 2021, Aqua Safety introduced elevating $135 million in collection E funding and achieved a $1 billion valuation. 

For Elbaz, Oligo’s use of contextual vulnerability prioritization differentiates it from different suppliers. 

“Current options lack the context of the working software and due to this fact alert even when vulnerabilities couldn’t even be exploited. The noise ratio could be very excessive — about 85% of alerts are irrelevant given the context of the applying,” Elbaz stated. 

Source link

Containers key libraries monitoring opensource security
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Anthropic and OpenAI just exposed SAST's structural blind spot with free tools

March 11, 2026

Meta acquires AI agent social network Moltbook

March 10, 2026

Poco X8 Pro Series Release Date Confirmed

March 10, 2026

Sonos Play, Era 100 SL Official Release Date & Price

March 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

WTI Crude Oil May Futures — Geopolitical Turmoil Meets Seasonal Demand

March 11, 2026

Bodo/Glimt’s Champions League run sparks debate over domestic postponements | Football News

March 11, 2026

Inmate Claims Prison Guards Discussed Cover-Up After Epstein’s Death

March 11, 2026

Anthropic and OpenAI just exposed SAST's structural blind spot with free tools

March 11, 2026
Popular Post

UNC legend Theo Pinson snubs Cooper Flagg for Pelicans star as best Duke freshman of all time

Stocks Get Hit as Economic Jitters Spur Bond Rally: Markets Wrap

Trump makes US copper mining a focus of his domestic minerals policy

Subscribe to Updates

Get the latest news from JHB News about Bangalore, Worlds, Entertainment and more.

JHB News
Facebook X (Twitter) Instagram Pinterest
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
© 2026 Jhb.news - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.