×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.

Applications - Article Archives - Page 3

Securing MySQL DBMS

January 20, 2017 |

These steps can help you secure your deployment of the open source MySQL Community Server.

READ MORE

Linux Foundation Restructuring CII Security Effort for Scale

August 31, 2016 |

The CTO of the Linux Foundation discusses how the governance structure for the Core Infrastructure Initiative is changing to promote better security. [VIDEO]



READ MORE

Startup Spotlight: Twistlock's Container Security

July 21, 2016 |

Given a dearth of companies focused on container security, it's no surprise that Twistlock, a container security startup founded by Microsoft veterans, recently raised $10 million.

READ MORE

Room for Application Security Improvement

July 11, 2016 |

Application security suffers from the indiscriminate use of open source software components, finds Sonatype research.

READ MORE

How to Encrypt a Flash Drive Using VeraCrypt

July 05, 2016 |

Many security experts prefer open source software like VeraCrypt, which can be used to encrypt flash drives, because of its readily available source code.

READ MORE

Better Security through Benchmarks

May 24, 2016 |

Security by the Numbers aims to offer comparative benchmarks that help companies understand how their security postures stack up against their peers.

READ MORE

What Are Your Container Security Options?

February 03, 2016 |

As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.

READ MORE

Are There Open Source Vulnerability Assessment Options?

January 26, 2016 |

Though some early open source vulnerability assessment tools went the proprietary route, you do still have open source options.

READ MORE

10 Open Source Vulnerability Assessment Tools

January 20, 2016 |

Open source vulnerability assessment tools are a great option for organizations that want to save money or customize tools to suit their needs.

READ MORE

Open Source Software's Role in Breach Prevention and Detection

December 29, 2015 |

While proprietary vendors dominate the intrusion prevention and detection market, open source software plays a key role.

READ MORE

5 Big Improvements in Wireshark

December 23, 2015 |

It's now even easier to use the open source Wireshark tool to analyze network traffic at the packet level, thanks to a recent upgrade.

READ MORE

10 Open Source Pentest Tools

December 11, 2015 |

Security pros rely heavily on pentest tools. Here are 10 useful ones and, bonus, they are open source.

READ MORE

Shevirah Moving Forward for Enterprise Mobile Pen Testing [VIDEO]

December 08, 2015 |

Security innovator Georgia Weidman discusses what her new startup is doing to help enterprise mobile security.

READ MORE

TrueCrypt Travails Continue

October 26, 2015 |

Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?

READ MORE

Using Hadoop to Reduce Security Risks

October 13, 2015 |

Using Hadoop and advanced analytics is one option for detecting and deflecting cyber attacks.

READ MORE

Why Microsoft Wants to Improve Open Source Security [VIDEO]

August 20, 2015 |

Mark Cartwright, group program manager at Microsoft, discusses the intersection between the Security Development Lifecycle and open source software.

READ MORE

5 Free Tools for Compliance Management

July 27, 2015 |

Most IT pros consider compliance a hassle. Yet the tools of compliance can empower security technologies and simplify risk management. Better yet, some of those tools are free.

READ MORE

Will Red Hat Enter the Security Market?

June 30, 2015 |

VIDEO: Red Hat CEO Jim Whitehurst discusses the role that security plays at the Linux vendor and whether it's a business he plans on entering with a new product.

READ MORE

Bringing Secure Boot to the Core of Containers [VIDEO]

May 29, 2015 |

VIDEO: Matthew Garrett, principal security engineer at CoreOS, discusses his efforts to bring a root of trust from bare metal all the way to the operating system level.

READ MORE

Why All Linux (Security) Bugs Aren't Shallow

February 20, 2015 |

With Heartbleed and Shellshock, the open source community realized that Linus' law can be challenged.

READ MORE