Applications

NeuVector Courts Large-Scale Enterprise Container Deployments

Less than a week after NeuVector announced it had raised $7 million in Series A funding round, the company announced version of 1.3 of its container security platform.New to the platform are tunneli...

WordPress 4.8.3 Fixes Critical SQL Injection Vulnerability

Boo! On Oct. 31, the open-source WordPress content management (CMS) and blogging platform released its 4.8.3 update, patching a frightening SQL Injection security vulnerabi...

IBM Cloud Identity Offers Identity & Access Management Tools

Big Blue this week took the wraps off IBM Cloud Identity Connect, its Identity-as-a-Service (IDaaS) for hybrid cloud environments.Part of the IBM Cloud Identity, a collectio...

Securing MySQL DBMS

By Maxim Sovetkin, ItransitionMySQL, owned by Oracle since 2009, is the number one open source database for successful startups and Web-based applications, loved by such ico...

Linux Foundation Restructuring CII Security Effort for Scale

Since creating the Core Infrastructure Initiative (CII) in 2014 in response to the Heartbleed vulnerability in the OpenSSL cryptographic library, the Linux Foundation has ra...

Room for Application Security Improvement

Using open source components is a common software development process; just how common, however, may come as a surprise -- even a shock -- to some. The average organization ...

How to Encrypt a Flash Drive Using VeraCrypt

  Encryption is a smart idea for protecting data on a USB flash drive, as we covered in our piece that described how to encrypt a flash drive using Microsoft BitLoc...

What Are Your Container Security Options?

When it comes to security, anything new is usually bad news. And for most organizations, containers are something new.That's a concern, as containers will likely come to you...

Are There Open Source Vulnerability Assessment Options?

Failure to fix known software vulnerabilities is a big reason why organizations' networks get breached. In some cases organizations run software with known vulnerabilities for years. Forty-four perc...

Open Source Software’s Role in Breach Prevention and Detection

Security professionals are increasingly acknowledging an uncomfortable truth: No network is secure from a sufficiently skilled and determined attacker. So while every effort...

Latest articles