Security

Security

40 bookmarks
Custom sorting
Bishop Fox
Bishop Fox
Bishop Fox, the leader in offensive security, continuous pen testing, red teaming, attack surface management, and traditional security assessments.
·bishopfox.com·
Bishop Fox
Wazuh
Wazuh
Wazuh is a free and open source security platform that unifies XDR and SIEM protection for endpoints and cloud workloads.
·wazuh.com·
Wazuh
Twingate
Twingate
Twingate makes Zero Trust Network Access easy to deploy, even easier to use, and always secure.
·twingate.com·
Twingate
Mullvad
Mullvad
Mullvad is a VPN service that helps keep your online activity, identity, and location private. Only €5/month - We accept Bitcoin, cash, bank wire, credit card, PayPal, and Swish.
·mullvad.net·
Mullvad
Tailscale
Tailscale
Tailscale is a zero config VPN for building secure networks. Install on any device in minutes. Remote access from any network or physical location.
·tailscale.com·
Tailscale
Minimum Viable Secure Product
Minimum Viable Secure Product
Minimum Viable Secure Product (MVSP) is a minimum security baseline for enterprise-ready products and services.
·mvsp.dev·
Minimum Viable Secure Product
Secfix
Secfix
Secfix ist the fastest way to get ISO 27001 compliant ✓ Automated security controls ✓ Trained and certified auditors ✓ Save time and resources
·secfix.com·
Secfix
Dazz
Dazz
Dazz Cloud Security Remediation maps code-to-cloud pipelines, reduces security alerts to key root causes, and remediates issues in the developer’s workflow.
·dazz.io·
Dazz
BucketAV
BucketAV
Scan your S3 buckets for viruses, worms, and trojans. bucketAV detects malware in real-time, on-access, scheduled, or on-demand.
·bucketav.com·
BucketAV
RegScale
RegScale
It’s Time to Shift Compliance Left Bridge the divide between security and compliance. Start and stay compliant with your ongoing regulatory obligations. Show Me Trusted by Local and Global Organizations RegScale is the only solution that holistically manages your compliance program—both manual and automated assessments—at scale. Digitize Save time and reduce risk by moving your […]
·regscale.com·
RegScale
Vanta
Vanta
Vanta automates the complex and time-consuming process of SOC 2, HIPAA, ISO 27001, PCI, and GDPR compliance certification. Automate your security monitoring in weeks instead of months.
·vanta.com·
Vanta
Veracode
Veracode
This simple and scalable solution enables you to create more secure software so that you can boost your business and reduce risk without hindering innovation.
·veracode.com·
Veracode
Bridgecrew
Bridgecrew
Built to be simple- Protecting infrastructure in the public cloud is a software engineering challenge. We solve it like one.
·bridgecrew.io·
Bridgecrew
CheckShortURL
CheckShortURL
CheckShortURL is an expand link facility: it allows you to retrieve the original URL from a shortened link before clicking on it and visiting the destination. Get information about unshortened URL: title, description, keywords and author of the page. You can also check if the original URL is on search engines, Twitter, and lets you know if the hidden link is safe or not.
·checkshorturl.com·
CheckShortURL
Fun Captcha
Fun Captcha
See why the world’s leading enterprises trust Arkose Labs’ proprietary challenge–response mechanism and decision platform to protect web and mobile apps.
·funcaptcha.com·
Fun Captcha
Net Aware: Your guide to social networks, apps and games
Net Aware: Your guide to social networks, apps and games
Net Aware brings together the NSPCC’s expertise in protecting children and O2’s tech know-how, we’ve got everything you need to help you keep your kids safe online. Whether you’re an online expert or you’re unsure of where to start, we’re here to help.
·net-aware.org.uk·
Net Aware: Your guide to social networks, apps and games
OpenVPN
OpenVPN
OpenVPN - The Open Source VPN. Your private path to access network resources and services securely for cloud, business & consumer. © 2002-2018
·openvpn.net·
OpenVPN
Synack
Synack
Helping secure companies through a hacker-powered platform with crowdsourced penetration testing, vulnerability orchestration, managed bug bounty, analytics and risk reporting.
·synack.com·
Synack
Hacker One
Hacker One
HackerOne develops bug bounty solutions to help organizations reduce the risk of a security incident by working with the world’s largest community of ethical hackers to conduct discreet penetration tests, and operate a vulnerability disclosure or bug bounty program.
·hackerone.com·
Hacker One
SyncStop
SyncStop
USB Condoms - Protect your mobile phone from accidental syncing and malware!
·syncstop.com·
SyncStop
Home
Home
Secure, scalable, and highly available authentication and user management for any app.
·developer.okta.com·
Home
The Security Institute
The Security Institute
Welcome to the Security Institute. We are the UK’s largest professional membership body for security professionals. Since 2000 we have been working to promote the highest possible standards of integrity and professional competence in the business of security.
·security-institute.org·
The Security Institute