Application Security

11/3/2014
10:00 AM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

10 Cool Security Tools Open-Sourced By The Internet's Biggest Innovators

Google, Facebook, Netflix, and others have all offered up tools they've developed in-house to the community at large.
Previous
1 of 10
Next

As today's Internet giants break the barrier for speed and scale of development of systems, their teams are increasingly tasked with building home-brewed security systems that can help them develop and manage their systems securely without missing a beat. In the end, the entire security community is benefitting from a lot of these investments, as many of these firms make these tools available through open-source projects. Over the past few years, some very useful tools have come from the security and engineering teams at Facebook, Twitter, Google, Netflix, Etsy, and even AOL.

Security Monkey
Built by Netflix three years ago, Security Monkey is a monitoring and security analysis tool for Amazon Web Services configurations. It includes components for monitoring various AWS account components, developing, and executing actions based on policy rules, notifying users when audit rules are triggered and storing configuration histories for forensic and audit purposes.

(Image: Netflix)

Built by Netflix three years ago, Security Monkey is a monitoring and security analysis tool for Amazon Web Services configurations. It includes components for monitoring various AWS account components, developing, and executing actions based on policy rules, notifying users when audit rules are triggered and storing configuration histories for forensic and audit purposes.

(Image: Netflix)

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
1 of 10
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
11/4/2014 | 10:49:12 AM
Solid collection of open source tools> what's your favorite?
Great job, Ericka on putting this together. Wondering which ones Dark Reading commnunity members use and what are their favorites. Share your thoughts in the comments. 
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-2607
PUBLISHED: 2018-05-21
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting vulnerability in console notes (SECURITY-382). Jenkins allows plugins to annotate build logs, adding new content or changing the presentation of existing content while the build is running. Malicious Jenkins users...
CVE-2018-1108
PUBLISHED: 2018-05-21
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
CVE-2018-11330
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. There is authenticated stored XSS because the character set for filenames is not properly restricted.
CVE-2018-11331
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. Remote PHP code execution is possible because the set of disallowed filetypes for uploads in missing some applicable ones such as .phtml and .htaccess.
CVE-2018-7687
PUBLISHED: 2018-05-21
The Micro Focus Client for OES before version 2 SP4 IR8a has a vulnerability that could allow a local attacker to elevate privileges via a buffer overflow in ncfsd.sys.