dcsimg

Applications - Article Archives - Page 5

Securing Docker, One Patch at a Time

April 24, 2017 |

The open-source Docker container project integrates many different security approaches, but like every other software project, it still has to deal with reported software vulnerabilities.

READ MORE

Data Loss Prevention (DLP): Keeping Sensitive Data Safe from Leaks

April 10, 2017 |

The cost of a data leak is getting so high that Data Loss Prevention technology is looking like a bargain. Here's everything you need to know about DLP technology and products.

READ MORE

Identity and Access Management: Balancing Access and Security

April 07, 2017 |

In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE

Web Application Firewalls: Protecting Web Applications from Attacks

March 29, 2017 |

Web application firewalls are a critical security layer between web traffic and your application server. Learn how WAF technology stops attacks and who the top vendors are.

READ MORE

Patch Management: How to Update Software on Your Network Securely

March 27, 2017 |

Efficient patch management is vital to ensure the security and smooth function of corporate software, and patch management solutions are the easiest way to get there. Find out everything you need to know to implement an effective patch management software system.

READ MORE

Multi-Factor Authentication: A Critical Security Tool for Enterprises

March 14, 2017 |

Multi-factor authentication provides a more secure option than passwords and ID alone. We take a comprehensive look at MFA security, two-factor authentication, mobile authentication, biometrics and vendors, and issues to consider before adopting an MFA solution.

READ MORE

Securing MySQL DBMS

January 20, 2017 |

These steps can help you secure your deployment of the open source MySQL Community Server.

READ MORE

Linux Foundation Restructuring CII Security Effort for Scale

August 31, 2016 |

The CTO of the Linux Foundation discusses how the governance structure for the Core Infrastructure Initiative is changing to promote better security. [VIDEO]



READ MORE

Startup Spotlight: Twistlock's Container Security

July 21, 2016 |

Given a dearth of companies focused on container security, it's no surprise that Twistlock, a container security startup founded by Microsoft veterans, recently raised $10 million.

READ MORE

Room for Application Security Improvement

July 11, 2016 |

Application security suffers from the indiscriminate use of open source software components, finds Sonatype research.

READ MORE

How to Encrypt a Flash Drive Using VeraCrypt

July 05, 2016 |

Many security experts prefer open source software like VeraCrypt, which can be used to encrypt flash drives, because of its readily available source code.

READ MORE

Better Security through Benchmarks

May 24, 2016 |

Security by the Numbers aims to offer comparative benchmarks that help companies understand how their security postures stack up against their peers.

READ MORE

What Are Your Container Security Options?

February 03, 2016 |

As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.

READ MORE

Are There Open Source Vulnerability Assessment Options?

January 26, 2016 |

Though some early open source vulnerability assessment tools went the proprietary route, you do still have open source options.

READ MORE

10 Open Source Vulnerability Assessment Tools

January 20, 2016 |

Open source vulnerability assessment tools are a great option for organizations that want to save money or customize tools to suit their needs.

READ MORE

Open Source Software's Role in Breach Prevention and Detection

December 29, 2015 |

While proprietary vendors dominate the intrusion prevention and detection market, open source software plays a key role.

READ MORE

5 Big Improvements in Wireshark

December 23, 2015 |

It's now even easier to use the open source Wireshark tool to analyze network traffic at the packet level, thanks to a recent upgrade.

READ MORE

10 Open Source Pentest Tools

December 11, 2015 |

Security pros rely heavily on pentest tools. Here are 10 useful ones and, bonus, they are open source.

READ MORE

Shevirah Moving Forward for Enterprise Mobile Pen Testing [VIDEO]

December 08, 2015 |

Security innovator Georgia Weidman discusses what her new startup is doing to help enterprise mobile security.

READ MORE

TrueCrypt Travails Continue

October 26, 2015 |

Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?

READ MORE