Email Alerts
-
What's ahead for Samba-3, Samba-4 and FUD-fighting
Get the scoop on upcoming new features in Samba-3 and Samba-4, recent events in FUD-fighting and the benefits that businesses can realize by adopting open source early from Samba guru John H. Terpstra. Article | 19 Sep 2005
-
Sourcefire offers Snort certification and online training
The security vendor creates new opportunity to show skills with its 3D System and the popular open source IDS. Article | 01 Aug 2005
-
Open source: Time to pay up
If you think open-source products are free, it's time to wise up. Article | 03 Feb 2005
-
Nessus no longer free
Developers of the popular open-source tool are starting to charge commercial customers who bring nothing to the project's development. Article | 16 Dec 2004
-
Network architect: Hardening Linux networks with open source tools, part two
A network architect gets granular about using a few lesser known OS tools to build a secure infrastructure. Article | 21 Oct 2004
-
How secure are you?
A bias-free security testing methodology can help your organization move beyond general best-security practices, to discern exactly how many systems are actually protected. Article | 30 Aug 2004
-
Is Snort better than a proprietary IDS?
SearchSecurity's Snort and Network Security Expert JP Vossen answers the age-old questions, Is Snort better than a proprietary IDS? And is it difficult to manage or find support for? News | 03 Aug 2004
-
Industry Notebook: Seclarity joins security community; Edgeos offers free guide for Nessus
A new security company launches, while several established vendors release upgrades. Another provides a free guide for Nessus users. Article | 20 Apr 2004
-
Snort survives first vulnerability
Snort, the immensely popular open-source intrusion-detection system, is no longer confined to cult status. Since going commercial in 2001 with the formation of Columbia, Md.-based Sourcefire Inc., Snort has extended its reach into enterprises and dee... Interview | 12 Mar 2003
-
Basic security tenets apply to open source programs too
Making source code available for all to see and manipulate does not make it secure. Secure development and proper configuration are essential to the safety of Linux systems as well as proprietary. Article | 05 Feb 2003
Security Management Strategies for the CIO