New & Notable
Open Source Security Tools and Applications News
October 08, 2014
Yahoo says a reported attack was not the result of a Shellshock exploit, but researchers have found new vulnerabilities in SSH key-management and network-attached storage systems.
October 03, 2014
Shellshock and Heartbleed showed how flawed even ubiquitous open-source software components can be, but experts say that doesn't necessarily mean the open-source security model is to blame.
April 24, 2014
A number of tech giants have pledged financial help to OpenSSL and other open source projects after the Heartbleed bug exposed numerous issues.
March 04, 2014
Experts say Microsoft's EMET security tool remains valuable to enterprise security teams if used as one layer in a larger security strategy.
Open Source Security Tools and Applications Get Started
Bring yourself up to speed with our introductory content
OpenAppID is an application-layer network security plugin for the open source intrusion detection system Snort. Continue Reading
TailsOS is a LiveDistro-based operating system that is configured to run from removable storage and to leave no information stored on the computer after the user’s session. A LiveDistro is a distribution of an operating system on some bootable ... Continue Reading
Keith Barker of CBT Nuggets demonstrates how to use LOG Storm, a free log management system from BlackStratus that organizes and prioritizes enterprise log data. Continue Reading
Evaluate Open Source Security Tools and Applications Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Michael Cobb discusses numerous open source and low-cost Web application security testing options for enterprises on a budget. Continue Reading
The recent news that TrueCrypt is insecure and has been retired has left many enterprises struggling to decide which encryption technologies to trust. Expert Michael Cobb offers other enterprise encryption options. Continue Reading
In the wake of Heartbleed, many enterprises are revisiting open source software security. Expert Michael Cobb offers a reality check. Continue Reading
Manage Open Source Security Tools and Applications
Learn to apply best practices and optimize your operations.
Industry participation in the Core Infrastructure Initiative is growing, but how will it affect open source security? Security expert Michael Cobb explains. Continue Reading
Worried about the stability of your software security? Lower your risk by rewriting policy and procedures for development with open source and third-party components. Continue Reading
Fears of backdoors and heightened concerns about encryption software are running rampant. Continue Reading
Problem Solve Open Source Security Tools and Applications Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
After the Heartbleed fiasco, the future of OpenSSL and open source cryptography libraries is up in the air. Application Security Expert Michael Cobb discusses whether they can -- and should -- be trusted. Continue Reading
Video: Keith Barker of CBT Nuggets shows how to use Prey tracking software to track stolen and lost mobile devices and reduce enterprise BYOD risks. Continue Reading
Video: In this AxCrypt tutorial, Keith Barker of CBT Nuggets shows how to use AxCrypt, a free, open source tool for quick, simple file encryption. Continue Reading