Encryption is a smart idea for protecting data on a USB flash drive, as we covered in our piece that described how to encrypt a flash drive using Microsoft BitLoc...
Failure to fix known software vulnerabilities is a big reason why organizations' networks get breached. In some cases organizations run software with known vulnerabilities for years. Forty-four perc...
Security professionals are increasingly acknowledging an uncomfortable truth: No network is secure from a sufficiently skilled and determined attacker. So while every effort...
Nmap was not the only popular open source network security tool to receive a recent upgrade. Wireshark 2.0.0 , an open source tool used for network sniffing and packet analy...
By Ted Dunning, MapR TechnologiesData has become too large to analyze with traditional tools, so companies are upping their security game by moving away from traditional app...
Many organizations must comply with regulations such as HIPAA, and the numbers are growing, fueled by constantly evolving legislation that creates new rules, requirements and auditin...
For over a decade, people all over the world have used Tor (formerly known as the Onion Router) to protect their privacy. The U.S. Naval Research Laboratory developed the system using open source te...
When the TrueCrypt encryption software project was abandoned two years ago, it left many folks looking for an open source encryption system. VeraCrypt appeared on the scene as a TrueCrypt alternativ...
Did you know that more than 73 million web sites in the world run on the WordPress publishing platform? This makes WordPress more popular than Microsoft SharePoint, Blogger, or Drupal. It also means...
About a year ago, we took a look at the growing trend toward open-source securityand highlighted 10 of the best apps available. Since then, the area has continued to mature,...