dcsimg

Paul Rubens - Article Archives - Page 3

What Are Your Container Security Options?

February 3, 2016
As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.
READ MORE

Are There Open Source Vulnerability Assessment Options?

January 26, 2016
Though some early open source vulnerability assessment tools went the proprietary route, you do still have open source options.
READ MORE

10 Open Source Vulnerability Assessment Tools

January 20, 2016
Open source vulnerability assessment tools are a great option for organizations that want to save money or customize tools to suit their needs.
READ MORE

Open Source Software's Role in Breach Prevention and Detection

December 29, 2015
While proprietary vendors dominate the intrusion prevention and detection market, open source software plays a key role.
READ MORE

5 Big Improvements in Wireshark

December 23, 2015
It's now even easier to use the open source Wireshark tool to analyze network traffic at the packet level, thanks to a recent upgrade.
READ MORE

10 Open Source Security Breach Prevention and Detection Tools

December 18, 2015
The breach prevention and detection market is dominated by names like Symantec, McAfee and Juniper, but open source tools are also popular.
READ MORE

5 Key New Features in Nmap Network Security Tool

December 15, 2015
The open source network security tool's latest version offers significant improvements.
READ MORE

Is Jailbreaking Apple Devices Always a No-No?

November 20, 2015
Apple and enterprise IT teams discourage jailbreaking Apple devices – and with good reason. But is jailbreaking always a bad thing?
READ MORE

TrueCrypt Travails Continue

October 26, 2015
Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?
READ MORE

Unlocking Smartphones: PINs, Patterns or Fingerprints?

October 8, 2015
PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?
READ MORE

Cyber War Is Hell

July 6, 2015
Think cyber war is bad now? It is only going to get worse – much worse -- says security expert Bruce Schneier.
READ MORE

Why Is Fighting Cybercrime So Hard?

June 22, 2015
It's tough to target the few hundred super hackers that experts believe are behind the majority of cyber attacks.
READ MORE

Static Analysis Can 'Score' Software Security

May 21, 2015
Static analysis can be even more effective in improving software security if it is used to create quality metrics.
READ MORE

Windows Server 2003: No Support, No Security?

April 30, 2015
What are your options, if any, for mitigating security risks of continuing to run Windows Server 2003 after Microsoft ends extended support in July?
READ MORE

Do Threat Exchanges Work?

April 2, 2015
Sharing intelligence on security threats is an old idea getting new cred, thanks to Facebook's new Threat Exchange. But how well do such exchanges work?
READ MORE

Hadoop Security Still Evolving

March 26, 2015
While organizations' use of Hadoop has become more sophisticated, associated security practices have not kept pace.
READ MORE

6 Tips for Developing Secure IoT Apps

February 26, 2015
Most IoT systems contain security vulnerabilities that can be exploited by hackers, a recent study found, highlighting the importance of developing secure IoT apps.
READ MORE

It's Not Easy to Determine Costs of Data Breach

January 29, 2015
Determining costs of a data breach is a complicated, but important, exercise. It may help convince executives to increase security spending.
READ MORE

10 Tips for Secure Business Travel

January 12, 2015
Business travelers are an attractive target for hackers. Here's how to protect yourself when you are on the road.
READ MORE