New & Notable
Open Source Security Tools and Applications News
April 24, 2014
A number of tech giants have pledged financial help to OpenSSL and other open source projects after the Heartbleed bug exposed numerous issues.
March 04, 2014
Experts say Microsoft's EMET security tool remains valuable to enterprise security teams if used as one layer in a larger security strategy.
February 25, 2014
The networking giant unveils a new strategy highlighting Sourcefire technology, including new open source application firewall features for Snort.
December 18, 2013
CloudFlare hopes its open-sourced Red October server encryption software, based on the 'two-man rule,' can help thwart rogue insiders and secure Web.
Open Source Security Tools and Applications Get Started
Bring yourself up to speed with our introductory content
OpenAppID is an application-layer network security plugin for the open source intrusion detection system Snort. Continue Reading
TailsOS is a LiveDistro-based operating system that is configured to run from removable storage and to leave no information stored on the computer after the user’s session. A LiveDistro is a distribution of an operating system on some bootable ... Continue Reading
Keith Barker of CBT Nuggets demonstrates how to use LOG Storm, a free log management system from BlackStratus that organizes and prioritizes enterprise log data. Continue Reading
Evaluate Open Source Security Tools and Applications Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Michael Cobb discusses numerous open source and low-cost Web application security testing options for enterprises on a budget. Continue Reading
The recent news that TrueCrypt is insecure and has been retired has left many enterprises struggling to decide which encryption technologies to trust. Expert Michael Cobb offers other enterprise encryption options. Continue Reading
In the wake of Heartbleed, many enterprises are revisiting open source software security. Expert Michael Cobb offers a reality check. Continue Reading
Manage Open Source Security Tools and Applications
Learn to apply best practices and optimize your operations.
Worried about the stability of your software security? Lower your risk by rewriting policy and procedures for development with open source and third-party components. Continue Reading
Fears of backdoors and heightened concerns about encryption software are running rampant. Continue Reading
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of third-party libraries and components in projects. How do security teams go about documenting code to ensure ... Continue Reading
Problem Solve Open Source Security Tools and Applications Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Become familiar with four Wireshark features network security pros value in this packet-capturing analytics tool. Continue Reading
Reusing open source code can present a security risk. Application security expert Michael Cobb explains why and how to protect applications. Continue Reading
Video: Keith Barker of CBT Nuggets demonstrates how to use the free reverse engineering malware tools in REMnux to analyze malware in apps and PDFs. Continue Reading