Applications

Stay up-to-date with the latest security technologies and best practices to secure software applications, identify vulnerabilities, and protect your code from potential threats. As software development accelerates, robust application security is essential to safeguard against exploits and breaches.

  • Are There Open Source Vulnerability Assessment Options?

    Failure to fix known software vulnerabilities is a big reason why organizations’ networks get breached. In some cases organizations run software with known vulnerabilities for years. Forty-four percent of known breaches in 2014 were caused by unfixed vulnerabilities that were between two and four years old, according to HP’s Cyber Risk Report 2015. This is…


  • Open Source Software’s Role in Breach Prevention and Detection

    Security professionals are increasingly acknowledging an uncomfortable truth: No network is secure from a sufficiently skilled and determined attacker. So while every effort should be made to prevent intruders getting on to the corporate network, it’s important that you can quickly spot an intrusion and minimize the damage that can result. Anton Chuvakin, a security…


  • 5 Big Improvements in Wireshark

    Nmap was not the only popular open source network security tool to receive a recent upgrade. Wireshark 2.0.0 , an open source tool used for network sniffing and packet analysis, also got a major update in November. The new release of Wireshark (formerly known as Ethereal) is important because if you want to keep your…


  • Using Hadoop to Reduce Security Risks

    By Ted Dunning, MapR Technologies Data has become too large to analyze with traditional tools, so companies are upping their security game by moving away from traditional approaches and instead using a combination of Apache Hadoop and advanced analytics to help predict, identify and deter security threats. Hadoop can improve enterprise security in several different…


  • 5 Free Tools for Compliance Management

    Many organizations must comply with regulations such as HIPAA, and the numbers are growing, fueled by constantly evolving legislation that creates new rules, requirements and auditing procedures. Security compliance requirements are often seen as an unnecessary burden that was legislated into existence to protect external entities. However, properly enforced compliance policies can protect organizations from a…


  • The Trouble with Tor

    For over a decade, people all over the world have used Tor (formerly known as the Onion Router) to protect their privacy. The U.S. Naval Research Laboratory developed the system using open source technology, to protect U.S. government communications. It is used by people living under restrictive regimes who want to access forbidden information or…


  • VeraCrypt a Worthy TrueCrypt Alternative

    When the TrueCrypt encryption software project was abandoned two years ago, it left many folks looking for an open source encryption system. VeraCrypt appeared on the scene as a TrueCrypt alternative. VeraCrypt is a fork of the original TrueCrypt code, and the project is run and managed almost single handedly by French IT security consultant…


  • 5 Common WordPress Security Vulnerabilities and How to Fix Them

    Did you know that more than 73 million web sites in the world run on the WordPress publishing platform? This makes WordPress more popular than Microsoft SharePoint, Blogger, or Drupal. It also means that WordPress is a large target for hackers. Half of the WordPress sites out there are self-hosted, which means that the WordPress…


  • The Top 75 Open Source Security Apps

      About a year ago, we took a look at the growing trend toward open-source securityand highlighted 10 of the best apps available. Since then, the area has continued to mature, and now we’re back highlighting 75 of the most frequently downloaded open-source security applications. Anti-Virus/Anti-Malware 1. ClamWin Free Antivirus This Windows-only app uses the…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies