How to use the ThreadFix vulnerability management tool

Open Source Security Tools and Applications

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Brief: Moore releases flaw-finding tool

    On the eve of Black Hat, Metasploit Project founder H.D. Moore has released a new tool for finding vulnerabilities in Internet Explorer ActiveX controls, and an updated version of the Metasploit Framework. 

  • Nmap: Firewall configuration testing

    This tip, in our Nmap manual series, explains how Nmap can be used to test the effectiveness of a firewall configuration. Learn how to use the open source network mapper to better understand how your firewall handles uninvited traffic and to test yo... 

  • Five freeware tools for mitigating network vulnerabilities

    From Nmap to Snort, there are a variety of viable freeware tools available for information security professionals. In this tip, Michael Cobb reviews five freeware tools and explains why he believes they are the best tools in their space. 

  • Shareware applications vs. commercial software

    Considering using a shareware application? In this information security threats Ask the Expert Q&A, SearchSecurity's resident expert Ed Skoudis examines if commercial software product are more secure than shareware applications. 

  • Can Snort read multi-platform syslogs?

    Most security pros are aware of Snort's network intrusion detection capabilities, but can this freeware tool read and monitor multi-platform syslogs? SearchSecurity's network security expert Mike Chapple tackles this question in this Ask the Expert Q... 

  • Nmap: More port scanning techniques

    In this fifth tip in our Nmap manual, SearchSecurity.com expert Michael Cobb looks at some of the Nmap port scanning techniques that exploit certain idiosyncrasies of specific platforms or protocols in order to better differentiate between open and c... 

  • Are there any patch management products that track the patching process?

    Before you dip into your IT budget to solve your patching problems, read this Q&A. Our platform security expert examines why security pros should consider using available freeware products to track and manage their patching process. 

  • Brief: Sourcefire addresses Snort flaw

    Sourcefire has issued an updated version of Snort to address a flaw that could allow malicious packets to damage Snort-protected computers. 

  • Security Bytes: Major spammer offers an allocution

    Meanwhile, McAfee acquires Preventsys; a new Snort fix is released; Microsoft launches Web-based security services; and a group forms to tackle health industry flaws. 

  • How to install and configure Nmap on Linux

    Get tips on how to install and configure Nmap on Linux in an enterprise network environment.