Security Projects

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Security Projects News

6 Hot And Sought-After IT Security Skills

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The IT security job market is booming -- but that doesn't mean everyone is automatically getting a job, or the right job. And just like the threat landscape is rapidly evolving, so are the qualifications and qualities needed for positions in the security profession.

Sun Open Source Reborn in ForgeRock

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When Oracle bought Sun, there were many unanswered questions about Sun's open-source portfolio of programs. Over a year later, we still don't know, for example, if OpenSolaris is going to have Oracle's support. We now know, however, that OpenSSO, an open source access management and federation server platform, will live on as a product under the new open-source company ForgeRock.

It's Time To Think Like A Hacker

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security Consultant and Trainer Joe McCray has been hacking into the Department of Defense (DoD), Federal Agencies, Financial Institutions, and other big companies for years - legally of course. He's a Penetration Tester, a term used to describe a computer security consultant that hacks into companies in order to demonstrate security weaknesses.

Apache Traffic Server Gets Top-Level Project Status

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Apache Software Foundation runs its open source projects on a hierarchy of principally three levels, top-level projects (TLPs), sub-projects and incubated projects. Achieving the TLP status is a major milestone for an open source effort and this week Apache announced that six projects were being graduated to TLP status.

An information security blueprint, part 1

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Symantec's Francis deSouza lays out the requirements for a more practical way of addressing information security threats. The recent the Hydraq attacks were the latest example of just how radically the Internet threat landscape has changed over the past few years, and how vulnerable companies and their information stores are to cyber attacks.

A Digital Forensics Student's Linux Workspace

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Our next entry for the "The $100.00 (USD) Coolest Linux Workspace Contest" was sent all the way from the Netherlands by a digital forensics student named Huseyin. He is also working as an intern at an IT-audit company and described Linux as the best OS to do research on. If ever chosen as the grand winner, he says he will use the $100 to buy another 1TB hard disk drive since the 3TB of HDDs that he already have are not enough --probably because of lots of legal evidences to store :-)

OAuth Is the New Hotness in Identity Management

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With Facebook Connect being abandoned in its favor, and a new draft specification before the IETF, OAuth is shaping up as the cornerstone of identity management for cloud-based applications and services. eWEEK Labs Senior Analyst P. J. Connolly looks at what's behind the seamless access to services on social media sites such as Facebook, LinkedIn and Twitter.