How to use the ThreadFix vulnerability management tool

Open Source Security Tools and Applications

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Podcast: Tor peer-to-peer privacy could be hacked

    In this edition of Security Wire Weekly, Andrew Christensen of FortConsult explains how the Tor peer-to-peer network can be hacked to track down user identities. 

  • Sourcefire IPO could fuel Snort, users say

    Snort users frowned when Check Point tried to acquire Sourcefire last year. But they are more optimistic about Sourcefire's plans to go public. 

  • Sourcefire looking to go public

    The company behind the popular Snort open source IDS tool is making a bid to go public, months after its deal to be acquired by Check Point collapsed. 

  • Nmap Technical Manual

    By now, most infosec pros have heard of Nmap, and most would agree that even though the popular freeware tool is invaluable, installing, configuring and running it in the enterprise is no easy task. With that in mind, SearchSecurity.com, in collabora... 

  • Nmap and the open source debate

    Upper management may be hesitant to approve the use of an open source tool, but Nmap has many benefits. This tip offers selling points to present to upper management when proposing the use of Nmap. 

  • Nmap parsers and interfaces

    SearchSecurity expert contributor Michael Cobb continues his series on Nmap with a detailed look at Nmap parsers and interfaces. 

  • Logwatch: Taking the pain out of log analysis

    This column reviews the benefits of Logwatch, an open source security log analysis tool. 

  • Interpreting and acting on Nmap scan results

    As we continue our series on Nmap in the enterprise, SearchSecurity expert contributor Michael Cobb explains how to run some of the more regular Nmap scans. 

  • Metasploit completes license change, updates framework

    The open source pen-testing platform is used nearly universally by security assessment firms -- even those that buy "competitive" products from Core, Immunity and others, but big licensing and platform changes are in the works. 

  • Nmap: Techniques for improving scan times

    As we continue our series on using Nmap in the enterprise, SearchSecurity expert Michael Cobb provides commands that will help you adjust your Nmap scan times appropriately -- whether you want Nmap to run slow and quietly, fast and furious, or somewh...