About UsCareersBlogLog In
Cyber Security ResourceCyber Security Resource
  • Home
  • Products
    • IT Security Partnership Program
    • Cyber Security Resource Community
    • Third Party Risk Management
    • Managed Detection and Response
  • Services
    • Cyber Security Risk Assessment
    • HITRUST Readiness Assessment
    • Cyber Security Advisory Services
    • Penetration Test
    • Vulnerability Assessment
  • Solutions
    • Security Awareness & Training
    • Email Phishing
    • Antivirus – Antimalware
  • Resources
    • Cyber Security Resource Library
    • IT Governance
    • Information Security
    • Risk Management
    • Vulnerability Management
    • Incident Response
  • Partners
    • Consultants Network
    • Sales Partners
Facebook
Twitter
LinkedIn
YouTube
About UsCareersBlogLog In

10 Free Security Tools at Black Hat Asia 2021

April 22, 2021AddMgrNo Comments
https://img.deusm.com/darkreading/1340733/1.jpg

Researchers are set to demonstrate a plethora of tools for conducting pen tests, vulnerability assessments, data forensics, and a wide range of other use cases.

Previous

1 of 11

Next

As in previous years, next month’s Black Hat Asia 2021 virtual event will feature a full lineup of free security tools — some new and some updated versions of existing tools.

Many of these tools are based on open source technologies, include those for conducting penetration tests and vulnerability assessments, data forensics and incident response, malware and network defense, application security, reverse engineering, and Web application security.

Some tools are designed for the security research community. Others are meant to help enterprise security teams address common challenges, such as those related to swift threat detection and mitigation, phishing attacks, and fileless malware.

Black Hat Asia 2021 will be held from Tuesday, May 4, through Friday, May 7. Security researchers and members of the open source community will showcase their offerings via a series of virtual events on Thursday and Friday of that week. Security practitioners, researchers, and testers will have an opportunity to learn more about the tools and how they work during these interactive sessions. 

The following is a representative sample of 10 of the 30 tools that researchers will introduce and demonstrate at the event.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Recommended Reading:

Previous

1 of 11

Next

More Insights

This post was originally published on this site

AddMgr
Our passion at Cyber Security Resource is to work with IT Security Officers, Risk Managers, IT Managers, and Business Professionals to meet their Compliance and IT Security requirements. We offer IT security risk assessments, network and application penetration testing, and security certification readiness for Hitrust or SOCII.
Previous post Nearly Half of All Malware is Concealed in TLS-Encrypted Communications Next post Looking for Greater Security Culture? Ask an 8-Bit Plumber

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get Our Newsletter

  • Virtual CISO Advisory Services
  • Cyber Security Risk Assessment
  • Vulnerability Assessment
  • Penetration Test
  • Cyber Security Awareness Training

Latest News

  • HITRUST Certification vs HIPAA: What you Need to Know
  • Why Do Businesses Need an Incident Response Plan?
  • Vulnerability Assessment vs. Penetration Testing: What’s the Difference?
  • Healthcare Cyber Security Trends: What You Need to Know Now and Going Forward
  • How To Perform a Cyber Security Risk Analysis For Any Organization.
HomeAccountPrivacy PolicyReturn & Refund PolicyTerms and ConditionsAbout UsContact Us

Return & Refund Policy - Terms and Conditions