Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.more »
OpenNMS OpenNMS: Monitoring large systems and networksMar 30, 2011
If you need to monitor very large networks, you need powerful software. OpenNMS offers serious monitoring capabilities in a truly open source package.more »
Security Lessons Linux security in the cloudMar 28, 2011
Although you give up control of the underlying infrastructure when you use cloud computing, you can still maintain some control over security.more »
Intrusion Detection Platform-independent and extensible IDS with PreludeMar 23, 2011
The Prelude security information management system receives both host- and network-based IDS messages and displays them in an easy web interface. We show you how to set it up.more »
Security Lessons: Secure Video Secure Video SurveillanceMar 01, 2011
Unless your surveillance cameras are wired directly to a video board, they are notoriously insecure. We show you how to keep your cameras from being compromised.more »
Security Lessons: HTML5 HTML5 – Building a better botnetJan 31, 2011
New web technologies address shortcomings in web browsers but create new problems as well.more »
Security Lessons: OpenID User authentication for the massesDec 28, 2010
Outsourcing authentication services gives you access to more services – at a price. Kurt examines the pros and cons of distributed authentication.more »
The Institute for Security and Open Methodologies (ISECOM) announced the released of the Open Source Security Testing Methodology Manual (OSSTMM) 3.0.more »
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.