Open Source Security Tools and Applications News
May 06, 2016
Roundup: Customers, vendors both unaware of unpatched open source vulnerabilities in commercial software. Plus OpenSSL patches, warrantless wiretaps and more.
October 16, 2015
Jean Yang, who created the Jeeves software language, explains why the industry needs to do a better job of enforcing security and privacy policies in its applications.
July 22, 2015
According to researchers, malware makers have been targeting .NET since Microsoft made the software open source. And experts debate to what extent open source security can be maintained.
April 28, 2015
An open source threat model is aiming to be a repository for risk assessment with the aim of allowing enterprise to focus on creating the right security controls for each business.
Open Source Security Tools and Applications Get Started
Bring yourself up to speed with our introductory content
Pretty Easy Privacy (pEp) is an open source encryption tool designed to make it simple for users to protect their online communications. Continue Reading
Open security is an approach to safeguarding software, hardware and other information system components with methods whose design and details are publicly available. Continue Reading
A rainbow table is a listing of all possible plaintext permutations of encrypted passwords specific to a given hash algorithm. Rainbow tables are often used by password cracking software for network security attacks. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Open Source Security Tools and Applications Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Many organizations are still vulnerable to the Heartbleed flaw. Expert Kevin Beaver explores the merits of an OpenSSL-specific risk assessment. Continue Reading
Following a slew of TLS vulnerabilities over the past year, the IETF is working on an updated version of the protocol. Security expert Michael Cobb discusses the changes and improvements. Continue Reading
Netflix released its own threat monitoring tools: Scumblr, Sketchy and Workflowable. Expert Joseph Granneman looks at these tools and their benefits to enterprises. Continue Reading
Manage Open Source Security Tools and Applications
Learn to apply best practices and optimize your operations.
Don't assume that your open source Web applications are secure. Expert Kevin Beaver explains the common vulnerabilities and how to include these systems in your security testing. Continue Reading
Enterprises should have a diverse set of open source security tools in their arsenal. Here are three factors that can help guide them in building the right security toolkit. Continue Reading
Centrally managing system logs is an important practice for enterprise security. Expert Dejan Lukan explains how to set up cloud servers, such as ELK stack, for this purpose. Continue Reading
Problem Solve Open Source Security Tools and Applications Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Microsoft open sourced its .Net framework recently, and enterprises are concerned. Expert Michael Cobb explores if the fears of open source .Net are warranted. Continue Reading
After the Heartbleed fiasco, the future of OpenSSL and open source cryptography libraries is up in the air. Application Security Expert Michael Cobb discusses whether they can -- and should -- be trusted. Continue Reading
Video: Keith Barker of CBT Nuggets shows how to use Prey tracking software to track stolen and lost mobile devices and reduce enterprise BYOD risks. Continue Reading