Open Source Security 

What Are Your Container Security Options?

As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.

Are There Open Source Vulnerability Assessment Options?

Though some early open source vulnerability assessment tools went the proprietary route, you do still have open source options.

Open Source Software's Role in Breach Prevention and Detection

While proprietary vendors dominate the breach prevention and detection market, open source software plays a key role.

5 Big Improvements in Wireshark

It's now even easier to use the open source Wireshark tool to analyze network traffic at the packet level, thanks to a recent upgrade.

10 Open Source Pentest Tools

Security pros rely heavily on pentest tools. Here are 10 useful ones and, bonus, they are open source.

Shevirah Moving Forward for Enterprise Mobile Pen Testing [VIDEO]

Security innovator Georgia Weidman discusses what her new startup is doing to help enterprise mobile security.

TrueCrypt Travails Continue

Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?

Using Hadoop to Reduce Security Risks

Using Hadoop and advanced analytics is one option for detecting and deflecting cyber attacks.

Why Microsoft Wants to Improve Open Source Security [VIDEO]

Mark Cartwright, group program manager at Microsoft, discusses the intersection between the Security Development Lifecycle and open source software.

5 Free Tools for Compliance Management

Most IT pros consider compliance a hassle. Yet the tools of compliance can empower security technologies and simplify risk management. Better yet, some of those tools are free.

Will Red Hat Enter the Security Market?

VIDEO: Red Hat CEO Jim Whitehurst discusses the role that security plays at the Linux vendor and whether it's a business he plans on entering with a new product.

Bringing Secure Boot to the Core of Containers [VIDEO]

VIDEO: Matthew Garrett, principal security engineer at CoreOS, discusses his efforts to bring a root of trust from bare metal all the way to the operating system level.

Why All Linux (Security) Bugs Aren't Shallow

With Heartbleed and Shellshock, the open source community realized that Linus' law can be challenged.