ALL >> Computers >> View Article
Prevent The Loss Of Ip Through Code Sharing Sites

Everybody has IP in their code now
Coding is not just for software companies anymore. Companies in every industry – financial services, transportation, media, manufacturing, healthcare – all rely heavily on developers to create internal software that keeps their businesses running and provides an advantage over the competition. Much of the code developed is proprietary, but companies are increasingly leveraging open source code to support their development.
Don’t get me wrong – the open source movement is great and is here to stay (sharing is caring?). That being said, there are some hidden risks people need to know about in order to use open source code without endangering their organization’s intellectual property. One risk is that you may be downloading malware and implementing it into your code, but this article examines the other side of the issue – code that is uploaded and the risk of IP loss in doing so.
Risky T’s & C’s
Popular Cloud Security services for sharing open source code include GitHub, SourceForge, and ...
... Codehaus among many others. Most developers understand that, based on the terms and conditions of these sites, when they contribute code to an open source project, that code can become open source itself and that if the code is proprietary to their organization, their organization has lost exclusive legal rights to that code. Nonetheless, it happens and it happens a lot.
Enterprises block the wrong services
In our recent Cloud Adoption and Risk Report, we found that, similar to patterns found around file sharing services, enterprises are blocking the IT development services they are most familiar with, not the services that present the most risk. For example, GitHub, a popular open source development site is blocked 21% of the time, however Codehaus, a much riskier open source development site, is blocked only 1% of the time.
How to leverage open source safely
The key to leveraging open source safely is not “just block it”. Rather, you should take a measured approach. First, you need to understand which code sharing services your developers are currently using. Then, leverage a Cloud Security service registry to identify the best low-risk services, and promote the use of those rather than the high-risk alternatives. Next, look for directionality to identify data that is uploaded rather than downloaded. In doing so you’ll minimize the risk of IP loss and ensure that your code remains your code. Finally, make sure you’re managing use and receive alerts when an anomalous occurrence, such as a large upload, occurs.
Author :
Lauren Ellis is a research analyst covering the technology industry’s top trends & topics, focusing on Cloud Security, Cloud Computing, Data Loss Prevention etc.,
Add Comment
Computers Articles
1. What Is Power Bi: Your Questions Are Answered By A Bi ConsultantAuthor: goodcoders
2. Unlocking The Power Of Digital Marketing In Bangalore: Why Choose A Leading Digital Marketing Agency
Author: Cubikeymedia
3. Top 5 Innovation Management Software Of 2025
Author: Ben Gross
4. Top 5 Mlops Tools Of 2025
Author: Ben Gross
5. Top Cybersecurity Trend 2025 | Vapt & Soc Services In India
Author: Reinfosec
6. Best Alternative Dating Apps Like Tinder
Author: goodcoders
7. Best 9 Programming Languages For Blockchain App Development
Author: goodcoders
8. The Significance Of Early Exposure To Ai And Robotics For Kids
Author: stem-xpert
9. Top 5 Cloud Analytics Platforms Of 2025
Author: Ben Gross
10. Top 5 Network Monitoring Systems Of 2025
Author: Ben Gross
11. Revolutionise Your Training Management With Xsosys Technology
Author: Xsosys Technology(S) Pte. Ltd.
12. Rugtek Printers: Your Complete Guide To Selecting The Perfect Model
Author: srikanth
13. Rsgoldfast Runescape Gold:fishing
Author: RuneScape gold
14. Understanding Mobile Intranet Workflow
Author: goodcoders
15. How To Personalize Your Mobile Ux?
Author: goodcoders