Cynthia Harvey Avatar
  • CyCognito: BAS Product Overview and Insight

    See our full list of Top Breach and Attack Simulation (BAS) Vendors Bottom Line Details are scarce on this very young breach and attack simulation startup, but its technology looks promising. CyCognito prioritizes potential attacks based on which look easiest from a hacker’s perspective, and it can analyze both known and unknown network assets. The […]

  • Breach and Attack Simulation: Find Vulnerabilities before the Bad Guys Do

    Despite implementing multiple solutions to create a defense in depth and following all industry best practices, some of the very best IT security directors will confess that they have a very fundamental problem: They don’t really know how well their security is working. Until recently, enterprises have had limited capabilities for assessing the damage that […]

  • 40 Open Source Tools for Protecting Your Privacy

    You don’t need to fork over big bucks – or even any bucks – to keep your online activities and identity secret. The open source community has dozens of privacy-related projects in development, and some of them have already proven themselves to be among the best privacy protection tools available. These tools are targeted at […]

  • The Top 75 Open Source Security Apps

      About a year ago, we took a look at the growing trend toward open-source securityand highlighted 10 of the best apps available. Since then, the area has continued to mature, and now we’re back highlighting 75 of the most frequently downloaded open-source security applications. Anti-Virus/Anti-Malware 1. ClamWin Free Antivirus This Windows-only app uses the […]

  • 10 Commercial Open Source Security Vendors

    Can companies make money by selling a product customers can get for free? Absolutely, yes. According to IDC, organizations spent $1.8 billion on stand-alone open source software in 2006, and IDC projects that total revenues in this market will reach $5.8 billion by 2011. Eager to get in on that action, a number of software […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis