Blog Posts Tagged with "Open Source"

69dafe8b58066478aea48f3d0f384820

New Metasploit 3.5.1 Release Includes Cisco Exploits

December 18, 2010 Added by:Headlines

The recent Metasploit 3.5.1 release offers users a wider range of tools, with 47 new modules and 8 new scripts, and now includes options to perform exploits on Cisco products. The latest version of Metasploit has a total of 635 exploits, 314 auxiliary modules, and 215 payloads available...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Open Source vs. Commercial Software Security

December 10, 2010 Added by:Rafal Los

Unless a piece of software explicitly says its aim is to be more secure then whether it's open source or a commercial software package doesn't matter. Software can be written securely or insecurely by an open-source project or a commercial vendor - it's all a matter of priority...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Software Piracy and the World Cup

June 20, 2010 Added by:Danny Lieberman

It’s World Cup season and Mondial fever will probably put a lot of regional conflicts on the back burner for the next month – not to mention put a dent in a lot of family budgets (husbands buying the latest 60 inch Sony Bravia and wives on retail therapy while the guys are watching football)

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Open Source: Free or Commercial? You Decide...

May 20, 2010 Added by:Anton Chuvakin

Open source software that is freely available for download and use is one of the greatest things about our technical community. The fact that at any given time I have a massive library of software available at my fingertips to accomplish any number of software tasks is nothing short of amazing! Then you tell me that if there is something I want to add to the software, I just jump in a...

Comments  (1)

E4b33dbe234685965beb3e9f2a0ad456

Need to consolidate information security compliance efforts? Try open source.

March 12, 2010 Added by:Ted LeRoy

Many organizations have to comply with multiple regulatory requirements for their information security infrastructures.  Fragmented efforts to comply Sarbanes-Oxley (sarbox or SOX), Gramm Leach Bliley Act (GLBA), Health Insurance Portability and Accountability Act (HIPAA),  Payment Card Industry - Data Security Standard (PCI-DSS), and ISO 27000 series, to name a few, can result in c...

Comments  (0)

Page « < 1 - 2 - 3 > »