Found 61 bookmarks
Newest
Wiz - #1 Cloud Security Software for Modern Cloud Protection
Wiz - #1 Cloud Security Software for Modern Cloud Protection
Wiz is the unified cloud security platform with prevention and response capabilities, enabling security and development teams to build faster and more securely.
·wiz.io·
Wiz - #1 Cloud Security Software for Modern Cloud Protection
Huorong - 火绒安全
Huorong - 火绒安全
火绒安全致力于在终端安全领域,为用户提供专业的产品和专注的服务,并持续对外赋能反病毒引擎等自主研发技术,拥有免费个人产品“火绒安全软件”,及企业产品“火绒终端安全管理系统”。
·huorong.cn·
Huorong - 火绒安全
CrowdStrike: Stop breaches. Drive business.
CrowdStrike: Stop breaches. Drive business.
CrowdStrike is a global cybersecurity leader with an advanced cloud-native platform for protecting endpoints, cloud workloads, identities and data.
·crowdstrike.com·
CrowdStrike: Stop breaches. Drive business.
ESET Digital Security
ESET Digital Security
Best IT security solutions for your home and business devices. Try ESET antivirus and internet security solutions for Windows, Android, Mac or Linux OS.
·eset.com·
ESET Digital Security
dope.security – Fly Direct Secure Web Gateway
dope.security – Fly Direct Secure Web Gateway
Your new SWG. Eliminate the datacenter and perform security checks directly on endpoint for stronger privacy, reliability, and up to 4x performance speeds.
·dope.security·
dope.security – Fly Direct Secure Web Gateway
GitGuardian: Git Security Scanning & Secrets Detection
GitGuardian: Git Security Scanning & Secrets Detection
Level up your code security with GitGuardian: Scan your Git Repos in Real-Time for Secrets ✔️ Free Trial ✔️ Used by 200k+ developers ✔️ Enterprise Software
·gitguardian.com·
GitGuardian: Git Security Scanning & Secrets Detection
Cobalt Strike | Adversary Simulation and Red Team Operations
Cobalt Strike | Adversary Simulation and Red Team Operations
Cobalt Strike in an adversary simulation tool that can emulate the tactics and techniques of a quiet long-term embedded threat actor in an IT network using Beacon, a post-exploitation agent and covert channels.
·cobaltstrike.com·
Cobalt Strike | Adversary Simulation and Red Team Operations
Copperhead
Copperhead
Copperhead is a cyber-security firm located in Toronto, Canada. We specialize in secure Android devices, providing encryption communication methods and developing robust security solutions.
·copperhead.co·
Copperhead
Black Hat
Black Hat
·blackhat.com·
Black Hat
Cybercrime Intelligence | Fight Cyber Threats
Cybercrime Intelligence | Fight Cyber Threats
Intel 471 empowers cybersecurity teams worldwide to be proactive with its TITAN platform and comprehensive coverage into the criminal underground.
·intel471.com·
Cybercrime Intelligence | Fight Cyber Threats
TuxCare
TuxCare
TuxCare helps businesses automate faster security patching for Linux systems and open source software.
·tuxcare.com·
TuxCare
Telefónica Tech ​Cyber Security & Cloud
Telefónica Tech ​Cyber Security & Cloud
Aceleramos la transformación digital con Ciberseguridad, Cloud, IoT, Big Data, IA y Blockchain.
·cybersecuritycloud.telefonicatech.com·
Telefónica Tech ​Cyber Security & Cloud
Mitnick Security Consulting
Mitnick Security Consulting
Kevin Mitnick and the Global Ghost team are leaders in cybersecurity at events and keynotes and behind the scenes, penetration testing top organizations.
·mitnicksecurity.com·
Mitnick Security Consulting
Snyk
Snyk
Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.
·snyk.io·
Snyk
LGTM - Continuous security analysis
LGTM - Continuous security analysis
Find zero-days and prevent vulnerabilities with LGTM's code analysis platform, powered by the purpose-built QL query language. Get continuous security analysis and automated code review. Free for open-source projects.
·lgtm.com·
LGTM - Continuous security analysis
Pentest Limited
Pentest Limited
Information Security Assurance
·pentest.co.uk·
Pentest Limited
CryptoTrust
CryptoTrust
CryptoTrust builds innovative products like OnlyKey and provides a comprehensive suite of information security services.
·crp.to·
CryptoTrust
Defuse Security
Defuse Security
Defuse Security. Home of PIE Bin, TRENT, and more...
·defuse.ca·
Defuse Security
Sucuri
Sucuri
A website security & protection platform that delivers peace of mind. Stop worrying about website security threats and get back to building your online brand.
·sucuri.net·
Sucuri
Tenable
Tenable
Welcome to the modern era of cyber exposure. Join the movement.
·tenable.com·
Tenable
Allot
Allot
Allot is a leading, global provider of leading innovative network intelligence and security solutions for Communications Service Providers and Enterprises worldwide.
·allot.com·
Allot
Edge Security
Edge Security
Edge Security is an information security research and consulting firm of expert hackers, specializing in security assessments, code reviews, application security, reverse engineering, exploit development, hardened development, physical security, and secure networking. With fifteen years of experience and industry-wide recognition, we are extremely capable.
·edgesecurity.com·
Edge Security
RSA
RSA
See why RSA is the market leader for cybersecurity and digital risk management solutions – get research and best practices for managing digital risk.
·rsa.com·
RSA
SSH.com
SSH.com
SSH.COM is one of the most trusted brands in cyber security. We help enterprises and government agencies protect critical data.
·ssh.com·
SSH.com
Fraud Labs Pro
Fraud Labs Pro
FraudLabs Pro performs a comprehensive fraud validation on all elements such as geolocation, proxy, email, credit card, transaction velocity and others to unveil fraud orders accurately.
·fraudlabspro.com·
Fraud Labs Pro
ElevenPaths
ElevenPaths
We are Telefónica Techs Cyber Security Team. We are the hub of the digital talent in cyber security and we seek to make the world a more cybersecure place.
·elevenpaths.com·
ElevenPaths
Webroot
Webroot
Webroot delivers multi-vector protection for endpoints and networks and threat intelligence services to protect businesses and individuals in a connected world.
·webroot.com·
Webroot