Articles by Cynthia Harvey 

Different Types of Malware and How to Defend Against Them

Cybercriminals use many different types of malware to attack systems. Here are some of the most common malware types and how to defend against them. We define everything from adware to worms and everything in between.

Incident Response: How to Prepare for Attacks and Breaches

Make sure your organization is prepared for attacks and breaches by putting together an incident response plan and incident response team.

5 Useful New Open Source Security Apps

Our colleagues at Datamation pulled together a list of "50 Awesome Open Source Apps You've (Probably) Never Heard Of." Among them, we found some valuable computer security assets.

26 Open Source Security Apps with Commercial Support

For businesses, these apps offer the best of both worlds—the flexibility, security, and cost savings of open source combined with the peace of mind that comes with commercial support.

40 Open Source Tools for Protecting Your Privacy

Open source offers email encryption, anonymous file sharing, anonymous surfing, and many other apps for those with pressing privacy needs.

Open Source Security: 50 Good Apps

Open source software for anti-spam, firewalls, forensics, encryption, log monitoring, passwords, and more.

The Top 75 Open Source Security Apps

Without much fanfare, the open source security area is growing rapidly. Here are top contenders from anti-virus, firewalls, forensics, intrusion detection, and more.

10 Commercial Open Source Security Vendors

Can companies make money by selling a product customers can get for free?

Ten Open Source Security Apps Worth Considering

Are open source security apps a good choice for your company? A look at the pros and cons. Plus: a handful of apps in the forefront.