Publications tagged `SECURITY`
Name Followers
Faraday Faraday Platform helps you perform security engineering by maximizing your team’s resources, increasing risk visibility by converting all your data into valuable information https://www.faradaysec.com/ 62
Auth0 Design Simplifying the complexity of identity design. 58
Gradiant Talks Gradiant: Galician ICT R&D Center 55
ShallVhack An Open community of professionally skilled Cyber Security Experts which has a highly efficient Team with on ground practical skills for providing you the best end to end Cyber Security Solutions.Our motives are beyond commercial, which is evident by our Services. 53
CryptoGen Nepal CryptoGen Nepal consists of professional team members who are devoted to providing professional-grade cyber security solutions such as IS audit, VAPT, End-Point Threat Analysis, Forensics & Malware Analysis, Incident Response, Server Assessment, and Hardening. 53
neXenio Engineering the digital workplace 51
Cloud Security Review The best content about today’s cloud security, including AWS, and more. Curated by Beacon Cloud Security. 49
Tales from a Security Professional Is a secure and therefore a security incident-free environment really a utopia? Let’s analyze this question and identify what we should do to create a secure environment and while also trying to prevent the analyst/alert fatigue issue. 48
BidiPass The secure, easy-to-use ID verification solution that the whole digital economy has been waiting for. 47
ConsenSys Diligence Working on the front lines of best practices and software security auditing in the Ethereum ecosystem. To request auditing services, contact diligence@consensys.net 46
HelmSecure Helm 42
Cybereason Combine managed endpoint prevention, detection, and response to secure your organization against cyber threats. Defend it all with Cybereason. 41
Tech Learnings Everything about Tech learnings — Coding,Design, tutorials and more learnings 41
ZeroGuard ZeroGuard 38
The RangeForce CyberSecurity Blog Learn more about how to bring security into your systems, anticipate and fend off attacks on business critical assets. 36