Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
12 Free, Ready-to-Use Security Tools
Newest First  |  Oldest First  |  Threaded View
pheil300
100%
0%
pheil300,
User Rank: Apprentice
10/31/2018 | 9:26:46 PM
Re: Pending Review
I thought priorities were: People, Process then Products....in order. The best products in the world aren't going to help if you don't have the right people or the security/business processes to utilize them.
RicoF727
100%
0%
RicoF727,
User Rank: Apprentice
10/31/2018 | 11:23:42 AM
Here's the actual 12 tools
Here's the actual 12 tools

1.     Wombat Security - https://www.wombatsecurity.com/heroes

2.     https://www.wombatsecurity.com/bingo

3.     https://www.knowbe4.com/phishing-security-test-offer  -  lets companies run a simulated phishing test for up to 100 users. Within 24 hours, companies will receive a PDF with their phish-prone percentage and charts to share with management

4.     https://www.knowbe4.com/domain-doppelganger -  an option that KnowBe4 made available about two weeks ago. Participants will also receive a PDF within 24 hours of all their look-alike domains

5.     https://www.knowbe4.com/ransomware-simulator -  This tool simulates 13 ransomware infections and one cryptomining infection and will point out vulnerable workstations.

6.     https://erpmaestro.com/arm/?domain=erpmaestro.com - ERP Maestro, analyzes all existing insider threats within a company's SAP environment and issues monthly updates on the company's risk profile

7.     https://logrhythm.com/products/logrhythm-netmon-freemium/ - LogRhythm offers a free network analysis tool in which network managers can retain data for up to three days

8.     https://www.anomali.com/learn/staxx-access-stix-taxii-feeds - Anomali offers STAXX as a free client that lets users access any STIX/TAXII-compatible threat intelligence feed. STAXX supports STIX 1.0 and 2.0 standards, which are common languages for conveying data about threat intelligence

9.     https://www.neuralys.io/pricing -  The Neuralys platform offers a centralized dashboard for visualizing a company's vulnerability trends, security zoning for the prioritization of risk management tasks, and mitigation tracking for monitoring responses across a team's security operations.

a.    Neuralys can import/upload risks or vulnerabilities from existing security toolsets or penetration tests in seconds by using its native Nessus parser or the universal CSV importer

10.    Bizploit  - https://www.onapsis.com/research/free-solutions - Bizploit helps infosec pros with the discovery, exploration, vulnerability assessment, and exploitation phases of specialized SAP penetration testing

11.    Onapsis Integrity Analyzer - https://www.onapsis.com/research/free-solutions - The Integrity Analyzer for SAP was developed to help SAP customers protect their systems from unauthorized modifications of ABAP programs

12.   https://detexian.com/ -  Detexian has created a B2B SaaS product for small and midsize businesses that offers 24/7 threat detection.
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
10/26/2018 | 10:45:34 PM
Re: Free Tools
True, but it takes some vetting. Some of the free tools can be anxiety-inducing if they're offered by an independent developer or small organization with minimal rep. For a couple of free tools I use, I've had to do quite a bit of research just to make sure they were on the up and up -- when in the long run I might have been better off and more comfortable had they just asked to charge $10 to my credit card. ;)
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/25/2018 | 12:19:52 PM
Re: 12 tools ??
Headline is correct--There are 9 slides for each company but 12 tools mentioned in total! 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/25/2018 | 11:50:42 AM
Re: 12 tools ??
Looking into that! Stay tuned. 
RSR555
50%
50%
RSR555,
User Rank: Strategist
10/25/2018 | 9:33:33 AM
12 tools ??
Only 8 tools listed, what happened to the other 4?
CallumLepide
50%
50%
CallumLepide,
User Rank: Apprentice
10/16/2018 | 6:11:37 AM
Free Tools
This article is absoultly right. IF you are unsure if you have a security threat in your system already but are low on budget. Download some free tools to help you find out where you need to direct fundsand see what solutions work best.

 

Its also a great way to trial a company's products and solution and to see how user friendly they are
rosiepage44
100%
0%
rosiepage44,
User Rank: Apprentice
10/13/2018 | 2:03:59 AM
Re: Pending Review
The security tools are the most important component of any system and those tools secure our data against any kind of scams over the system. There are several security tools available on the Internet and many of them are free. To get them all, consult with Microsoft Support Chat, it will help you to select the best option for your system. 
ronaldthomas
0%
100%
ronaldthomas,
User Rank: Apprentice
10/12/2018 | 9:49:17 AM
a
good post


Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23394
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.