{"id":44831,"date":"2022-01-14T16:46:29","date_gmt":"2022-01-14T16:46:29","guid":{"rendered":"https:\/\/www.darkreading.com\/application-security\/software-firms-open-source-orgs-meet-with-white-house-on-security"},"modified":"2022-01-14T16:46:29","modified_gmt":"2022-01-14T16:46:29","slug":"white-house-meets-with-software-firms-and-open-source-orgs-on-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/","title":{"rendered":"White House Meets With Software Firms and Open Source Orgs on Security"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blte70183aade2d1b4d\/61e1ae94af1b76690d9f29b3\/WhiteHouse_Rob_Crandall_Alamy_Stock_Photo.jpeg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Driven by vulnerabilities in widespread software affecting organizations worldwide, the US government met with the open source community and major software firms on Jan. 13 at the White House to find ways to support the innovative software development community, while at the same time reducing the likelihood of future security flaws in common software components.<\/p>\n<p>The White House Software Security Summit brought together officials from the various government agencies that deal with national security and technology with representatives from major software companies \u2014 including&nbsp;Akamai, Amazon, Apple, GitHub, Google, Meta, Microsoft, and RedHat&nbsp;\u2014 as well as members of the open source software community, such as the Apache Software Foundation and the Linux Foundation.&nbsp;<\/p>\n<p>The summit aimed to find ways of &#8220;preventing security defects and vulnerabilities in code and open source packages, improving the process for finding defects and fixing them, and shortening the response time for distributing and implementing fixes,&#8221; the Biden administration said in a statement. <\/p>\n<p>At the heart of the discussion, however, is how the innovative development of open source communities can continue to flourish while improving efforts to create secure software and speed the patching in the face of vulnerabilities.<\/p>\n<p>&#8220;Open source software brings unique value, and has unique security challenges, because of its breadth of use and the number of volunteers responsible for its ongoing security maintenance,&#8221; <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/01\/13\/readout-of-white-house-meeting-on-software-security\/\" target=\"_blank\" rel=\"noopener\">the administration stated<\/a>. &#8220;Participants had a substantive and constructive discussion on how to make a difference in the security of open source software, while effectively engaging with and supporting, the open source community.&#8221;<\/p>\n<p>The summit took place as companies continue to struggle to find and patch a significant vulnerability in the Log4j logging framework for Java applications, which is widely used in enterprise applications. More than 80% of the Java applications on the Maven Central Repository, a widely used package management repository, had <a href=\"https:\/\/www.darkreading.com\/tech-trends\/the-log4j-flaw-will-take-years-to-be-fully-addressed\" target=\"_blank\" rel=\"noopener\">Log4j as a dependency<\/a>&nbsp;\u2014 meaning those Java applications and components are likely vulnerable. While the vulnerability has not yet led to a major compromise, <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\" target=\"_blank\" rel=\"noopener\">according to US officials<\/a>, the issue will likely take years to remediate because of its ubiquity. <\/p>\n<p><strong>A Long History of Widespread Vulns<br \/><\/strong>Vulnerability in widespread software packages are not new. The <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/heartbleed-examining-the-impact\" target=\"_blank\" rel=\"noopener\">2014 Heartbleed vulnerability in OpenSSL<\/a> and the <a href=\"https:\/\/www.darkreading.com\/security-management\/spectre-meltdown-vulnerabilities-will-haunt-industry-for-years\/a\/d-id\/748629?\" target=\"_blank\" rel=\"noopener\">2018 SPECTRE and Meltdown vulnerabilities<\/a> demonstrated that security issues found in ubiquitous software and firmware have long tails.<\/p>\n<p>&#8220;The world runs on software, which in turn relies on open source, [which] means that vulnerabilities in open source code can have a global ripple effect across the billions of developers and services that rely on it,&#8221; Mike Hanley, chief security officer at GitHub, <a href=\"https:\/\/github.blog\/2022-01-13-open-source-software-security-summit-securing-the-worlds-code-together\/\" target=\"_blank\" rel=\"noopener\">said in a statement on the summit<\/a>. &#8220;We\u2019ve seen how just one or two lines of vulnerable code can have a dramatic impact on the health, safety, and trustworthiness of entire systems in the blink of an eye.&#8221;<\/p>\n<p>The summit aimed to find <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/can-government-effectively-help-businesses-fight-cybercrime-\" target=\"_blank\" rel=\"noopener\">ways for government and industry<\/a> to work together to improve the security of open source code, such as integrating security features into developer tools and services as well as ensuring the integrity of the platforms used to store and distribute packages. Initial efforts will likely focus on ways to improve the security of popular and critical open source software projects and packages and speed the adoption of software bills of materials to allow developers and companies to track their dependencies.<\/p>\n<p>&#8220;This all begins with a common effort to increase visibility into the use of open source software,&#8221; says Boaz Gelbord, chief security officer with Akamai. &#8220;Government and private sector organizations must invest in tools that reveal the reliance on open source technologies and, crucially, take action to mitigate and contain risks to strengthen the security of the ecosystem at large.&#8221;<\/p>\n<p>The efforts will be a balance between maintaining the innovative and standards-setting efforts of independent open source development and enforcing secure development practices on projects and products that become part of the critical infrastructure on which industry and government rely, says Brian Behlendorf, executive director of the Open Source Security Foundation (OpenSSF).<\/p>\n<p>&#8220;At the beginning of the supply chain is the raw, sometimes messy, but also often incredibly innovative processes of writing code in a group that so often leads to great software,&#8221; he says. &#8220;That\u2019s precious and shouldn\u2019t be shackled by bureaucracy or requirements that create no value for those upstream core devs.&#8221;<\/p>\n<p>However, the OpenSSF recognizes that more secure development processes need to be added to each step in the chain from core developer to package manager to the development teams that eventually use the software component or library.&nbsp;<\/p>\n<p>&#8220;What\u2019s important now, in a world of millions of software projects and developers, is to help scale up what used to be informal, high-trust processes along this chain into more rigorous, automatable tools and practices,&#8221; Behlendorf says.<\/p>\n<p>The industry has already started investing in securing open source software, as well as their own software products. At a similar summit in August, Google and Microsoft <a href=\"https:\/\/www.darkreading.com\/operations\/google-amazon-microsoft-share-new-security-efforts-post-white-house-summit\" target=\"_blank\" rel=\"noopener\">pledged to spend billions on software security and cybersecurity efforts<\/a> in the next five years. Google, for example, has committed to an invisible security initiative to integrate protections so that developers and businesses reap the benefits, and also has&nbsp;worked with the OpenSSF to release <a href=\"https:\/\/www.darkreading.com\/dr-tech\/google-releases-tool-to-help-developers-enforce-security\" target=\"_blank\" rel=\"noopener\">tools for developers<\/a>. Akamai committed to continuing to help the open source community find ways to <a href=\"https:\/\/www.akamai.com\/newsroom\/press-release\/akamai-comments-on-national-security-council-and-white-house-open-source-software-security-summit\" target=\"_blank\" rel=\"noopener\">detect vulnerabilities in software and contain attacks<\/a>, but recognized that the work is only starting.<\/p>\n<p>&#8220;While this executive order is a move in the right direction, more needs to be done to support the open source community to thrive within our ever-evolving threat landscape,&#8221; Akamai&#8217;s Gelbord says.<\/p>\n<p>Last year, the Biden administration <a href=\"https:\/\/www.darkreading.com\/operations\/software-incident-response-among-big-focus-areas-in-biden-s-cybersecurity-executive-order\" target=\"_blank\" rel=\"noopener\">released an executive order<\/a> on cybersecurity that was widely praised for being more detailed than past administrations. In addition, the administration announced in October that it would <a href=\"https:\/\/www.darkreading.com\/risk\/us-to-create-diplomatic-bureau-to-lead-cybersecurity-policy\" target=\"_blank\" rel=\"noopener\">create the Bureau of Cyberspace and Digital Policy<\/a> within the US Department of State to lead international diplomacy on the issue. <\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/application-security\/software-firms-open-source-orgs-meet-with-white-house-on-security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Log4j vulnerability is only the latest security flaw to have global impact, prompting the Biden administration and software developers to pledge to produce more secure software.Read More <a href=\"https:\/\/www.darkreading.com\/application-security\/software-firms-open-source-orgs-meet-with-white-house-on-security\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-44831","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>White House Meets With Software Firms and Open Source Orgs on Security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"White House Meets With Software Firms and Open Source Orgs on Security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-14T16:46:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blte70183aade2d1b4d\/61e1ae94af1b76690d9f29b3\/WhiteHouse_Rob_Crandall_Alamy_Stock_Photo.jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"White House Meets With Software Firms and Open Source Orgs on Security\",\"datePublished\":\"2022-01-14T16:46:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\\\/\"},\"wordCount\":1000,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blte70183aade2d1b4d\\\/61e1ae94af1b76690d9f29b3\\\/WhiteHouse_Rob_Crandall_Alamy_Stock_Photo.jpeg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\\\/\",\"name\":\"White House Meets With Software Firms and Open Source Orgs on Security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blte70183aade2d1b4d\\\/61e1ae94af1b76690d9f29b3\\\/WhiteHouse_Rob_Crandall_Alamy_Stock_Photo.jpeg\",\"datePublished\":\"2022-01-14T16:46:29+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blte70183aade2d1b4d\\\/61e1ae94af1b76690d9f29b3\\\/WhiteHouse_Rob_Crandall_Alamy_Stock_Photo.jpeg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blte70183aade2d1b4d\\\/61e1ae94af1b76690d9f29b3\\\/WhiteHouse_Rob_Crandall_Alamy_Stock_Photo.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"White House Meets With Software Firms and Open Source Orgs on Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"White House Meets With Software Firms and Open Source Orgs on Security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/","og_locale":"en_US","og_type":"article","og_title":"White House Meets With Software Firms and Open Source Orgs on Security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-01-14T16:46:29+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blte70183aade2d1b4d\/61e1ae94af1b76690d9f29b3\/WhiteHouse_Rob_Crandall_Alamy_Stock_Photo.jpeg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"White House Meets With Software Firms and Open Source Orgs on Security","datePublished":"2022-01-14T16:46:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/"},"wordCount":1000,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blte70183aade2d1b4d\/61e1ae94af1b76690d9f29b3\/WhiteHouse_Rob_Crandall_Alamy_Stock_Photo.jpeg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/","url":"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/","name":"White House Meets With Software Firms and Open Source Orgs on Security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blte70183aade2d1b4d\/61e1ae94af1b76690d9f29b3\/WhiteHouse_Rob_Crandall_Alamy_Stock_Photo.jpeg","datePublished":"2022-01-14T16:46:29+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blte70183aade2d1b4d\/61e1ae94af1b76690d9f29b3\/WhiteHouse_Rob_Crandall_Alamy_Stock_Photo.jpeg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blte70183aade2d1b4d\/61e1ae94af1b76690d9f29b3\/WhiteHouse_Rob_Crandall_Alamy_Stock_Photo.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/white-house-meets-with-software-firms-and-open-source-orgs-on-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"White House Meets With Software Firms and Open Source Orgs on Security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44831"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44831\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}