Open Source Security 

Why Microsoft Wants to Improve Open Source Security [VIDEO]

Mark Cartwright, group program manager at Microsoft, discusses the intersection between the Security Development Lifecycle and open source software.

5 Free Tools for Compliance Management

Most IT pros consider compliance a hassle. Yet the tools of compliance can empower security technologies and simplify risk management. Better yet, some of those tools are free.

Will Red Hat Enter the Security Market?

VIDEO: Red Hat CEO Jim Whitehurst discusses the role that security plays at the Linux vendor and whether it's a business he plans on entering with a new product.

Bringing Secure Boot to the Core of Containers [VIDEO]

VIDEO: Matthew Garrett, principal security engineer at CoreOS, discusses his efforts to bring a root of trust from bare metal all the way to the operating system level.

Why All Linux (Security) Bugs Aren't Shallow

With Heartbleed and Shellshock, the open source community realized that Linus' law can be challenged.

How Secure Is Android if Google Won't Patch?

A security researcher alleges that Google won't patch its older Android software for a new vulnerability. Luckily, users have options to boost security for older versions of the OS.

The Trouble with Tor

Confidence that Tor can reliably provide users with anonymity on the Internet has been shattered, thanks to recent revelations. Tor alternatives do exist, however.

Google Brings Open Source Security Gifts

Google isn't just about search anymore. In recent weeks it has announced multiple security projects including Santa for Mac.

Is Shellshock a Feature, not a Bug?

The Shellshock flaw highlights a major security issue. Software created before mass adoption of the Internet is highly susceptible to today's security risks.

VeraCrypt a Worthy TrueCrypt Alternative

A fork of TrueCrypt's code, VeraCrypt strengthens the open source encryption software's transformation process and addresses other weaknesses.

An Open Source Solution to Shellshock

An open source tool can mitigate risks associated with Bash shell attack.

TrueCrypt Getting a New Life

TrueCrypt will stay alive, thanks to devotees who are forking the encryption program's code. 'Cleaned up' code will get a new name, CipherShed, and a different open source license.