Open Source Security 

Startup Spotlight: Twistlock's Container Security

Given a dearth of companies focused on container security, it's no surprise that Twistlock, a container security startup founded by Microsoft veterans, recently raised $10 million.

Room for Application Security Improvement

Application security suffers from the indiscriminate use of open source software components, finds Sonatype research.

How to Encrypt a Flash Drive Using VeraCrypt

Many security experts prefer open source software like VeraCrypt, which can be used to encrypt flash drives, because of its readily available source code.

Better Security through Benchmarks

Security by the Numbers aims to offer comparative benchmarks that help companies understand how their security postures stack up against their peers.

What Are Your Container Security Options?

As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.

Are There Open Source Vulnerability Assessment Options?

Though some early open source vulnerability assessment tools went the proprietary route, you do still have open source options.

10 Open Source Vulnerability Assessment Tools

Open source vulnerability assessment tools are a great option for organizations that want to save money or customize tools to suit their needs.

Open Source Software's Role in Breach Prevention and Detection

While proprietary vendors dominate the intrusion prevention and detection market, open source software plays a key role.

5 Big Improvements in Wireshark

It's now even easier to use the open source Wireshark tool to analyze network traffic at the packet level, thanks to a recent upgrade.

10 Open Source Pentest Tools

Security pros rely heavily on pentest tools. Here are 10 useful ones and, bonus, they are open source.

Shevirah Moving Forward for Enterprise Mobile Pen Testing [VIDEO]

Security innovator Georgia Weidman discusses what her new startup is doing to help enterprise mobile security.

TrueCrypt Travails Continue

Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?

Using Hadoop to Reduce Security Risks

Using Hadoop and advanced analytics is one option for detecting and deflecting cyber attacks.

Why Microsoft Wants to Improve Open Source Security [VIDEO]

Mark Cartwright, group program manager at Microsoft, discusses the intersection between the Security Development Lifecycle and open source software.

5 Free Tools for Compliance Management

Most IT pros consider compliance a hassle. Yet the tools of compliance can empower security technologies and simplify risk management. Better yet, some of those tools are free.