{"id":46637,"date":"2022-05-13T19:41:47","date_gmt":"2022-05-13T19:41:47","guid":{"rendered":"http:\/\/57116fe7-e2fb-4ce1-82f6-b48e094d1a12"},"modified":"2022-05-13T19:41:47","modified_gmt":"2022-05-13T19:41:47","slug":"white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/","title":{"rendered":"White House joins OpenSSF and the Linux Foundation in securing open-source software"},"content":{"rendered":"<div class=\"share-bar-wrapper\">\n<div class=\"full-byline\">\n<div class=\"author-avatars\"> <a rel=\"author\" class=\"thumb author-modal-open\" data-component=\"authorModal\" data-author-modal-options=\"{&quot;selector&quot;:&quot;steven-vaughan-nichols-modal&quot;,&quot;hoverSelector&quot;:&quot;.full-byline&quot;}\" href=\"https:\/\/www.zdnet.com\/meet-the-team\/us\/steven-j-vaughan-nichols\/\" data-vanity-rewritten=\"true\"> <span class=\"img \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/b43d0720aa5435df692e9998d3eb65393369d8ab\/2014\/07\/22\/e57da6d8-1174-11e4-9732-00505685119a\/steven-j-vaughan-nichols.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp\" class alt=\"Steven Vaughan-Nichols\" height=\"50\" width=\"50\"><\/span> <\/a> <\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p>Securing the open-source software supply chain is a huge deal. Last year, the Biden administration issued an <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">executive order to improve software supply chain security<\/a>. This came after the <a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/\">Colonial Pipeline ransomware attack<\/a> shut down gas and oil deliveries throughout the southeast and the <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-solarwinds-attack-took-more-than-1000-engineers-to-create\/\">SolarWinds software supply chain attack<\/a>. Securing software became a top priority. In response, The <a href=\"https:\/\/openssf.org\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Open Source Security Foundation (OpenSSF)<\/a> and <a href=\"https:\/\/www.linuxfoundation.org\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Linux Foundation<\/a> rose to <a href=\"https:\/\/www.zdnet.com\/article\/linux-and-open-source-communities-rise-to-bidens-cybersecurity-challenge\/\">this security challenge<\/a>. Now, they&#8217;re calling for $150 million in funding over two years to fix ten major open-source security problems.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">Open Source<\/span> <\/h3>\n<\/p><\/div>\n<p>They&#8217;ll need every penny of it and more.<\/p>\n<p>The government will not be paying the freight for these changes. $30 million has already been pledged by Amazon, Ericsson, Google, Intel, Microsoft, and VMWare. More is already on the way.&nbsp;<a href=\"https:\/\/aws.amazon.com\/blogs\/opensource\/aws-investing-an-additional-10-million-in-open-source-supply-chain-security\/?sc_channel=sm&amp;sc_campaign=Open_Source&amp;sc_publisher=TWITTER&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=Open_Source\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Amazon Web Services (AWS) has already pledged an additional $10 million<\/a>.&nbsp;<\/p>\n<p>At the White House press conference, OpenSSF general manager Brian Behlendorf said, &#8220;I want to be clear: We&#8217;re not here to fundraise from the government. We did not anticipate needing to go directly to the government to get funding for anyone to be successful.&#8221;<\/p>\n<p>Here are the ten goals the open-source industry is committed to meeting.<\/p>\n<ol readability=\"14.138827838828\">\n<li readability=\"0\">\n<p>Security Education: Deliver baseline secure software development education and certification to all.<\/p>\n<\/li>\n<li readability=\"3\">\n<p>Risk Assessment: Establish a public, vendor-neutral, objective-metrics-based risk assessment dashboard for the top 10,000 (or more) OSS components.<\/p>\n<\/li>\n<li readability=\"-1\">\n<p>Digital Signatures: Accelerate the adoption of digital signatures on software releases.<\/p>\n<\/li>\n<li readability=\"0\">\n<p>Memory Safety: Eliminate root causes of many vulnerabilities through the replacement of non-memory-safe languages.<\/p>\n<\/li>\n<li readability=\"2\">\n<p>Incident Response: Establish the OpenSSF Open Source Security Incident Response Team, security experts who can step in to assist open source projects during critical times when responding to a vulnerability.<\/p>\n<\/li>\n<li readability=\"0\">\n<p>Better Scanning: Accelerate the discovery of new vulnerabilities by maintainers and experts through advanced security tools and expert guidance.<\/p>\n<\/li>\n<li readability=\"0\">\n<p>Code Audits: Conduct third-party code reviews (and any necessary remediation work) of up to 200 of the most-critical OSS components once per year.<\/p>\n<\/li>\n<li readability=\"0\">\n<p>Data Sharing: Coordinate industry-wide data sharing to improve the research that helps determine the most critical OSS components.<\/p>\n<\/li>\n<li readability=\"-0.65656565656566\">\n<p><a href=\"https:\/\/www.zdnet.com\/article\/securing-the-open-source-ecosystem-sboms-are-no-longer-optional\/\">Software Bill of Materials (SBOMs)<\/a>: Everywhere Improve SBOM tooling and training to drive adoption.<\/p>\n<\/li>\n<li readability=\"2\">\n<p>Improved Supply Chains: Enhance the 10 most critical open-source software build systems, package managers, and distribution systems with better supply chain security tools and best practices.<\/p>\n<\/li>\n<\/ol>\n<p>I&#8217;ll go into more detail about those in later stories, but even at a glance, this is a massive undertaking. For instance, C, which is core to the Linux kernel, the most important of all open-source projects, has many vulnerabilities within it. While the memory-safe <a href=\"https:\/\/www.zdnet.com\/article\/rust-takes-a-major-step-forward-as-linuxs-second-official-language\/\">Rust language is now being used in Linux<\/a>, it&#8217;s years, decades away, from replacing C in Linux&#8217;s over 27.8 million lines of code. Indeed, I doubt we&#8217;ll ever see all of Linux&#8217;s C code replaced by Rust.&nbsp;<\/p>\n<p>We&#8217;re already close to solving some of the others. The open-source security company <a href=\"https:\/\/www.chainguard.dev\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Chainguard<\/a> is calling on the <a href=\"https:\/\/blog.chainguard.dev\/sigstore-statement-for-openssf-call\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">software industry to standardize on Sigstore<\/a>. <a href=\"https:\/\/www.sigstore.dev\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Sigstore<\/a> enables developers to securely sign software artifacts such as release files, container images, binaries, bills of material manifests. and more. This Linux Foundation project is backed by Google, Red Hat, and Purdue University.<\/p>\n<p>Sigstore has several great features. These include:<\/p>\n<ul readability=\"6.5399061032864\">\n<li readability=\"0\">\n<p>Sigstore&#8217;s keyless signing gives a great developer experience and removes the need for painful key management.<\/p>\n<\/li>\n<li readability=\"0\">\n<p><a href=\"https:\/\/github.com\/sigstore\/rekor\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Sigstore&#8217;s public transparency log (Rekor)<\/a> and APIs mean Kubernetes consumers may easily verify signed artifacts.<\/p>\n<\/li>\n<li readability=\"6\">\n<p>Sigstore&#8217;s use of standards, such as support for any Open Container Initiative (OCI) artifact (including containers, Helm Charts, configuration files, and policy bundles) and OpenID Connect (OIDC), means it integrates seamlessly with other tools and services.<\/p>\n<\/li>\n<li readability=\"2\">\n<p>The active, open-source, vendor-neutral Sigstore community gives confidence that the project will be rapidly adopted and become a de-facto industry standard.<\/p>\n<\/li>\n<\/ul>\n<p>Indeed, <a href=\"https:\/\/thenewstack.io\/kubernetes-adopts-sigstore-for-supply-chain-security\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Kubernetes has already adopted Sigstore<\/a>. In brief, it makes it simple to adopt a secure digital signature for your code. Then, the programmers who use your code can be sure it really is the code they want and can trust.<\/p>\n<p>This is essential. As Stephen Chin, software chain security company <a href=\"https:\/\/jfrog.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">JFrog<\/a> VP of Developer Relations, said, &#8220;While open source has always been seen as a seed for modernization, the recent rise of software supply chain attacks has demonstrated we need a more hardened process for validating open-source repositories.&#8221;<\/p>\n<p>Of course, there will always be bugs. As Behlendorf said, &#8220;Software will never be perfect. The only software that doesn&#8217;t have any bugs is software with no users.&#8221;<\/p>\n<p><strong>Related Stories:<\/strong><\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Open-source software supply chain security is now a vital issue of national security.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-46637","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>White House joins OpenSSF and the Linux Foundation in securing open-source software 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"White House joins OpenSSF and the Linux Foundation in securing open-source software 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-13T19:41:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/b43d0720aa5435df692e9998d3eb65393369d8ab\/2014\/07\/22\/e57da6d8-1174-11e4-9732-00505685119a\/steven-j-vaughan-nichols.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"White House joins OpenSSF and the Linux Foundation in securing open-source software\",\"datePublished\":\"2022-05-13T19:41:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\\\/\"},\"wordCount\":760,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b43d0720aa5435df692e9998d3eb65393369d8ab\\\/2014\\\/07\\\/22\\\/e57da6d8-1174-11e4-9732-00505685119a\\\/steven-j-vaughan-nichols.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\\\/\",\"name\":\"White House joins OpenSSF and the Linux Foundation in securing open-source software 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b43d0720aa5435df692e9998d3eb65393369d8ab\\\/2014\\\/07\\\/22\\\/e57da6d8-1174-11e4-9732-00505685119a\\\/steven-j-vaughan-nichols.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2022-05-13T19:41:47+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b43d0720aa5435df692e9998d3eb65393369d8ab\\\/2014\\\/07\\\/22\\\/e57da6d8-1174-11e4-9732-00505685119a\\\/steven-j-vaughan-nichols.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b43d0720aa5435df692e9998d3eb65393369d8ab\\\/2014\\\/07\\\/22\\\/e57da6d8-1174-11e4-9732-00505685119a\\\/steven-j-vaughan-nichols.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"White House joins OpenSSF and the Linux Foundation in securing open-source software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"White House joins OpenSSF and the Linux Foundation in securing open-source software 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/","og_locale":"en_US","og_type":"article","og_title":"White House joins OpenSSF and the Linux Foundation in securing open-source software 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-05-13T19:41:47+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/b43d0720aa5435df692e9998d3eb65393369d8ab\/2014\/07\/22\/e57da6d8-1174-11e4-9732-00505685119a\/steven-j-vaughan-nichols.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"White House joins OpenSSF and the Linux Foundation in securing open-source software","datePublished":"2022-05-13T19:41:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/"},"wordCount":760,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/b43d0720aa5435df692e9998d3eb65393369d8ab\/2014\/07\/22\/e57da6d8-1174-11e4-9732-00505685119a\/steven-j-vaughan-nichols.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/","url":"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/","name":"White House joins OpenSSF and the Linux Foundation in securing open-source software 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/b43d0720aa5435df692e9998d3eb65393369d8ab\/2014\/07\/22\/e57da6d8-1174-11e4-9732-00505685119a\/steven-j-vaughan-nichols.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp","datePublished":"2022-05-13T19:41:47+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/b43d0720aa5435df692e9998d3eb65393369d8ab\/2014\/07\/22\/e57da6d8-1174-11e4-9732-00505685119a\/steven-j-vaughan-nichols.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/b43d0720aa5435df692e9998d3eb65393369d8ab\/2014\/07\/22\/e57da6d8-1174-11e4-9732-00505685119a\/steven-j-vaughan-nichols.jpg?width=50&amp;height=50&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/white-house-joins-openssf-and-the-linux-foundation-in-securing-open-source-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"White House joins OpenSSF and the Linux Foundation in securing open-source software"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46637"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46637\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}