Open Source Security Tools and Applications News
October 16, 2015
Jean Yang, who created the Jeeves software language, explains why the industry needs to do a better job of enforcing security and privacy policies in its applications.
July 22, 2015
According to researchers, malware makers have been targeting .NET since Microsoft made the software open source. And experts debate to what extent open source security can be maintained.
April 28, 2015
An open source threat model is aiming to be a repository for risk assessment with the aim of allowing enterprise to focus on creating the right security controls for each business.
March 23, 2015
A new open source security tool from CERT, dubbed 'Tapioca,' shows that Android app vulnerabilities are ubiquitous, according to new research from IBM.
Open Source Security Tools and Applications Get Started
Bring yourself up to speed with our introductory content
Open security is an approach to safeguarding software, hardware and other information system components with methods whose design and details are publicly available. Continue Reading
A rainbow table is a listing of all possible plaintext permutations of encrypted passwords specific to a given hash algorithm. Rainbow tables are often used by password cracking software for network security attacks. Continue Reading
OpenAppID is an application-layer network security plugin for the open source intrusion detection system Snort. Continue Reading
Evaluate Open Source Security Tools and Applications Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Many organizations are still vulnerable to the Heartbleed flaw. Expert Kevin Beaver explores the merits of an OpenSSL-specific risk assessment. Continue Reading
Following a slew of TLS vulnerabilities over the past year, the IETF is working on an updated version of the protocol. Security expert Michael Cobb discusses the changes and improvements. Continue Reading
Netflix released its own threat monitoring tools: Scumblr, Sketchy and Workflowable. Expert Joseph Granneman looks at these tools and their benefits to enterprises. Continue Reading
Manage Open Source Security Tools and Applications
Learn to apply best practices and optimize your operations.
Centrally managing system logs is an important practice for enterprise security. Expert Dejan Lukan explains how to set up cloud servers, such as ELK stack, for this purpose. Continue Reading
Flaws in the AFNetworking code library threaten iOS app security. Expert Michael Cobb explains how to prevent falling victim to the flaws. Continue Reading
Open source log monitoring tools are a budget-friendly way for organizations to increase network visibility and improve incident response times. Continue Reading
Problem Solve Open Source Security Tools and Applications Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
After the Heartbleed fiasco, the future of OpenSSL and open source cryptography libraries is up in the air. Application Security Expert Michael Cobb discusses whether they can -- and should -- be trusted. Continue Reading
Video: Keith Barker of CBT Nuggets shows how to use Prey tracking software to track stolen and lost mobile devices and reduce enterprise BYOD risks. Continue Reading
Video: In this AxCrypt tutorial, Keith Barker of CBT Nuggets shows how to use AxCrypt, a free, open source tool for quick, simple file encryption. Continue Reading