CyberSecurity
Browse 143 cybersecurity tools tagged with "CyberSecurity"
Centre Systems Group

AI Security
Centre Systems Group is a globally recognized Disruptive Technology Consulting Firm headquartered in UAE with RHQ in KSA and branches in Australia, and Bahrain, specializing in cybersecurity, AI, clou
H3 Secure

GRC
H3 Secure focuses on providing secure data erasure solutions, secure mobile device management, and information technology security expertise.

Corsica Technologies Security
Penetration Testing
Corsica Technologies Security Consulting Services on SecurityListing: A cybersecurity consulting service that provides security assessments, compliance guidance, and strategic planning across multiple industries with flexible engagement models.

Women in CyberSecurity

Security Operations
Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field. WiCyS connects employers and recruiters with W

CSIR Information &

Security Operations
The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of cyber and information security solutions and approaches to securely protect people and systems

Azerbaijan Cybersecurity Center

Security Awareness Training
Dive into an immersive learning environment, train with the latest cyber technologies in the market and leave as a cyber specialist.

Aiuken Cybersecurity

Compliance Consulting
Aiuken is an international IT Security company, focused on communications and IT technologies, specialised in Security and Cloud Services solutions with high added value. - Managed Security Services-

Airbus Cybersecurity

Compliance Consulting
We provide a global cyber defence approach that dynamically aims to protect, detect and respond to cyber threats with a portfolio including managed security services, industrial control system offerin
Fireware

Network Security
Fireware is a cybersecurity-focused company operating in the Middle East, providing information security solutions, data center and connectivity capabilities, and security platform partnerships. The c

Nomoreransom
Digital Forensics and Incident Response
Nomoreransom on SecurityListing: No More Ransom is a collaborative project to combat ransomware attacks by providing decryption tools and prevention advice.

Cybrary
Penetration Testing
Cybrary on SecurityListing: Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.

Naked Security and
Threat Intelligence Platforms
Naked Security and Sophos News on SecurityListing: Naked Security by Sophos offers expert insights and practical advice on cybersecurity threats and protection strategies.

2024 Data Breach
Industry Reports
2024 Data Breach Investigations Report on SecurityListing: Get insights into the latest cybersecurity trends and expert advice on enhancing organizational security.

BadCyber
Blogs and News
BadCyber on SecurityListing: A curated list of important security news, helping readers stay up-to-date with the latest developments in cybersecurity.
Elektrotek Middle East

Data Protection
Elektrotek Middle East, a division of Elektrotek LLC based in California, specializes in IT security services, products, and solutions in the Middle East. Established to tap into emerging markets, the
Saturn Gulf

Network Security
Saturn Gulf FZE is a part of Saturn Group, which operates in various areas including Cloud Computing, Telecom & Networking, Energy Saving Solutions, Automation, Car Care Products, and Sustainable Ener
BlackSand

Data Protection
BlackSand provides cybersecurity services, including virtual CISO, cybersecurity consulting, cybersecurity assessments, and compliance security services, to help organizations achieve their compliance
Hemaya IT

Data Protection
Hemaya IT Security is a cybersecurity company delivering trusted security solutions and digital transformation support for enterprises across the Middle East and North Africa. The company emphasizes c

Cybersecurity Credentials Collaborative

Security Operations
C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies. Mission - To provide awareness of and advocacy for vendor-

Critical Infrastructures for

Security Operations
The Critical Infrastructures for Information and Cybersecurity ((ICIC) program is aimed at addressing the demand for cybersecurity to the National Public Sector, interjurisdictional organizations and

Cybersecurity & Infrastructure

Security Operations
CISA leads the national effort to defend critical infrastructure against the threats of today, while working with partners across all levels of government and in the private sector to secure against t

GreHack 2018 Conference
Guides
GreHack 2018 Conference Videos on SecurityListing: Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.

ParrotSec
Offensive Security
ParrotSec on SecurityListing: Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.

Crypto Drainer Attack
Write-ups
Crypto Drainer Attack on SecurityListing: A deep dive into the Ledger connect-kit compromise decryption process.

AMR CyberSecurity

Compliance Consulting
AMR CyberSecurity delivers next generation cyber security services to assist organisations across a wide variety of sectors in understanding potential threats and effectively countering them. We also

Apura Cybersecurity Intelligence

Compliance Consulting
Apura is a Brazilian company that develops advanced products and provides specialized services in information security and cyber defense. We provide open source threat intelligence, managed detection

Grep App
Threat Hunting
Grep App on SecurityListing: Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.

Cybersecurity Ventures
Industry Reports
Cybersecurity Ventures on SecurityListing: Cybersecurity Ventures is a leading research and market intelligence firm providing insights, news, and analysis on the cybersecurity industry.

LICSTER
Industrial Control System Security
LICSTER on SecurityListing: A Low-cost ICS Security Testbed for Education and Research
Sacrosys

Services
Sacrosys is a Middle East–based information security and IT solutions provider founded in 2001, offering expertise in IT/IS consultation, advanced cybersecurity, robotics AI/ML solutions, and robust i

AEI Cybersecurity

Security Operations
The Spanish Cybersecurity Innovation Cluster (AEI Ciberseguridad y Tecnologías Avanzadas) brings together companies, Research Centres, Universities, public and other private organizations interested

Cybersecurity Collaboration Forum

Security Operations
The mission of the Cybersecurity Collaboration Forum is to foster information security communication and idea sharing across the C-Suite, enabling leaders to better defend, preserve and protect local

UCD Centre for

Security Operations
UCD Centre for Cybersecurity and Cybercrime Investigation (CCI) is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

Cybersecurity Collaborative

Security Operations
CISOs working with CISOs for "real-time" security solutions. The bad guys are more connected than ever, and that has to change. The Cybersecurity Collaborative is led by a seasoned group of Founding M

Cybersecurity Innovation Hub

Security Operations
The main objective of Cybersecurity Innovation Hub is to bring cybersecurity and other advanced technologies closer to companies and, with the adoption of technology within their business processes, t

Positive Hack Days
Cyber Range Training
Positive Hack Days Fest on SecurityListing: International cybersecurity festival for all, who wants to dive into the world of cyber security and have a great time.
PrivSec

Data Protection
PrivSec is an IT Solutions company specialized in the security field, providing services in securing and protecting information and data privacy for companies and institutions.
PROW ME

Application Security
PROW ME is a UAE-based cybersecurity and information management company with offices across the MENA region and Central Asia. The firm offers cybersecurity consultancy and a range of managed security
Future Data Me

Data Protection
Future Data Me appears to be a cybersecurity-focused company offering data security and cyber security expertise, with services spanning security and digital marketing as part of its offerings. The ho

Graham Cluley
Blogs and News
Graham Cluley on SecurityListing: Graham Cluley offers expert cybersecurity insights and commentary through various media including podcasts and speaking engagements.
Emphasis Technologies

Application Security
Emphasis Technologies, located in Dubai Silicon Oasis, specializes in digital transformation and cybersecurity solutions. They serve as an analytics partner, providing services that include descriptiv
Vconn

Cloud Security
Vconn is a cybersecurity-centric managed services provider with a focus on helping organizations enhance digital transformation and security posture. The company offers cybersecurity, devsecops, manag

BlackBerry Cybersecurity

Compliance Consulting
The BlackBerry can help you to secure your environment and handle whatever cybersecurity challenges that you face. Our team can assist you, no matter what you have in your environment, and no-matter
Arab Security Consultants

Data Protection
Arab Security Consultants (ASC) is a leading information security firm based in Egypt, specializing in providing integrated solutions to safeguard systems handling confidential data across the Middle

Intelligence-Driven Incident Response
Digital Forensics and Incident Response
Intelligence-Driven Incident Response on SecurityListing: ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.

CAPEC
Threat Intelligence Platforms
CAPEC on SecurityListing: CAPEC™ is a comprehensive dictionary of known attack patterns used by adversaries to exploit weaknesses in cyber-enabled capabilities.

IronNet Cybersecurity

Security Operations
IronNet Cybersecurity is different. Built by elite offensive and defensive cyber operators with experience at the highest levels of the U.S. military and intelligence community, our patented IronDefen

Cybersecurity Manufacturing Innovation

Industrial Control System Security
The Cybersecurity Manufacturing Innovation Institute (CyManII) was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital

MUlliNER.ORG/NET/DE
Blogs and News
MUlliNER.ORG/NET/DE on SecurityListing: Personal website of Collin R. Mulliner with a focus on security research and mobile platforms.
CYGEN

Cloud Security
CYGEN is a cybersecurity company offering data-driven, customized security solutions to protect digital assets and ensure business continuity. With five years in operation, they serve clients across E

McAfee Blogs
Blogs and News
McAfee Blogs on SecurityListing: Explore cybersecurity insights and tips on McAfee Blogs to stay safe online.

Nmap Cheat Sheet
Penetration Testing
Nmap Cheat Sheet v1.0 on SecurityListing: A comprehensive reference guide to Nmap's scripting engine and its various options, scripts, and target specifications.

Cyberscoop
Blogs and News
Cyberscoop on SecurityListing: CyberScoop is a leading media brand providing news and event coverage to top cybersecurity leaders through its website, newsletter, events, radio, and TV.

RuCTFE 2020 Conference
Blogs and News
RuCTFE 2020 Conference on SecurityListing: Online cybersecurity conference with speakers' talks and interactive Q&A sessions.

Cybersecurity News
Blogs and News
Cybersecurity News on SecurityListing: A cybersecurity news platform providing updates on threats, vulnerabilities, and breaches.

Incident Response Flowchart
Guides
Incident Response Flowchart on SecurityListing: A structured approach to managing and responding to suspected security events or incidents.

CybersecNews Weekly
Blogs and News
CybersecNews Weekly on SecurityListing: A weekly newsletter covering computer security news and tutorials

Open Security Training
Certifications
Open Security Training on SecurityListing: Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.

Enterprise Detection &
Threat Hunting
Enterprise Detection & Response: A Simple Hunting Maturity Model on SecurityListing: A simple maturity model for enterprise detection and response

CPO Magazine
Blogs and News
CPO Magazine on SecurityListing: CPO Magazine is a cybersecurity news and information website providing articles, news, and insights on cybersecurity, privacy, and technology.
Anxinsec

Services
Anxinsec is a company that provides information security services, specializing in advanced threat protection, memory detection and protection, security operations center, and mobile device management

GBHackers
Blogs and News
GBHackers on SecurityListing: GBHackers offers up-to-date cybersecurity news and insights, focusing on threats, vulnerabilities, and innovative defense strategies.

ISO2HANDLE
Compliance Management
ISO2HANDLE on SecurityListing: ISO2HANDLE is a powerful software that provides a total solution for Q&R professionals, trusted by over 50,000 users and 750+ organizations worldwide.

ExploitDB
Penetration Testing
ExploitDB on SecurityListing: A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.

Krebs on Security
Blogs and News
Krebs on Security on SecurityListing: Brian Krebs is a cybersecurity journalist and blogger, known for his in-depth reporting on cybercrime and cybersecurity issues.

FutureFeed
Compliance Management
FutureFeed on SecurityListing: A tool for achieving and proving compliance with NIST 800-171 and CMMC cybersecurity requirements

Caldera
Offensive Security
Caldera on SecurityListing: Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.

Google Security Blog
Blogs and News
Google Security Blog on SecurityListing: Google's Security Blog provides the latest news and insights on security and safety on the Internet.
FEDIS

GRC
FEDIS, also known as Fixed Egypt, is a provider of digital solutions and information security services with a focus on sectors such as gas and oil, utilities, telecom, enterprise, and government. The

ZIUR Industrial Cybersecurity

Industrial Control System Security

Cybersecurity Business Network

Security Operations
CBN (fomerly Transatlantic Cyber Security Business Network) is a network of cybersecurity organisations in the UK advocating for and shaping cyber policy and regulation to encourage a more secure, res

dfir.org
Digital Forensics and Incident Response
dfir.org on SecurityListing: Andrew Case's personal page for research, software projects, and speaking events
ITplus ARAB

Services
ITplus ARAB is an information technology firm offering digital transformation, security, and growth services for businesses. It focuses on tailored IT solutions including web development, mobile app d

Paul's Security Weekly
Blogs and News
Paul's Security Weekly on SecurityListing: A leading cybersecurity podcast network offering in-depth discussions on current security trends and insights.
Meisst

Services
MEISST, or Middle East Information Systems Security & Technology, is a specialized information security company founded in 2016. Based in the Middle East, the company aims to lead the market in provid

CVE
Vulnerability Assessment
CVE on SecurityListing: The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.

ARIA Cybersecurity Solutions

Data Loss Prevention
ARIA Cybersecurity Solutions are designed and manufactured by the High Performance Products Division of CSP Inc.
YoungHackers

Data Protection
YoungHackers is an organization focused on providing cybersecurity services and solutions to startups, helping them maintain a secure environment while handling confidential data. They also offer trai
FortiServ

Network Security
FortiServ is an Egyptian company specializing in information security solutions across the Middle East and Africa. As a partner of leading cybersecurity and networking vendors including Fortinet, F5,

Ackcent Cybersecurity

Compliance Consulting
Our mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services. Ackcent's professional services are designed to ach

Cybersecurity Dubai

Compliance Consulting
Welcome to our cybersecurity company in Dubai! We are a leading provider of top-notch cybersecurity consultant solutions to businesses of all sizes. Our team of experienced professionals is dedicated
IM Security Global

Cloud Security
IM Security Global is a cybersecurity and IT security company serving the MENA region with a focus on enterprise security solutions. The company offers services across cyber security, networking, and

Breadcrumb Cybersecurity

Compliance Consulting
Breadcrumb Cybersecurity is a cybersecurity and advisory firm. We specialize in penetration testing, threat hunting, incident response, regulatory compliance, and employee training services. Our miss

Canadian Institute for

Security Operations
The Canadian Institute for Cybersecurity (CIC) is a comprehensive multidisciplinary training, research and development, and entrepreneurial unit that draws on the expertise of researchers in the socia
Digital Companion

AI Security
Digital Companion is a cybersecurity firm specializing in operational security and Governance, Risk, and Compliance (GRC). They operate in research, investigations, and development, focusing on buildi

Cybersecurity Competence Center

Security Operations
The Cybersecurity Competence Center (C3) was created to further strengthen the Luxembourg economy in the field of cybersecurity. C3 is the missing piece in helping Business to face cyber risks Luxembo

CSO Online
Blogs and News
CSO Online on SecurityListing: A leading online publication providing news, analysis, and insights on cybersecurity, IT leadership, and technology trends.

Bad Sector Labs
Blogs and News
Bad Sector Labs Blog - Last Week in Security (LWiS) on SecurityListing: Weekly summary of cybersecurity news and exploits.
Mirai Tracker
Threat Intelligence Platforms
Mirai Tracker on SecurityListing: A tracker that detects and logs SYN packets with a specific signature generated by the Mirai malware, providing real-time information on Mirai-based campaigns.

OpenPhish
Anti-Phishing
OpenPhish on SecurityListing: OpenPhish provides real-time phishing trends, detecting new phishing URLs and targeting various brands.

ENISA Training Resources
Guides
ENISA Training Resources on SecurityListing: ENISA Training Resources offers online training material for cybersecurity specialists, covering technical and artefact analysis fundamentals.

Billington CyberSecurity

Security Awareness Training
Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity. The company's flagship event is the Annual Billington CyberSecurity Summit. Since 2010,

Cybersecurity Center for

Industrial Control System Security
The goal of the Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS) is to conduct research and develop innovative cybersecurity technologies, tools, and methodologies that advanc

Aujas Cybersecurity

Compliance Consulting
Aujas Cybersecurity, an NSEIT Company, is an enterprise security service provider for organizations across North America, Asia Pacific, and EMEA regions. Aujas has deep expertise and capabilities in

International Cybersecurity Forum

Security Operations
The International Cybersecurity Forum (FIC) has established itself as the benchmark event in Europe in terms of digital security and trust. Its originality is to combine: a FORUM promoting reflection

AT&T Cybersecurity

Compliance Consulting
AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business. Cybersecurity Consulting ServicesM

Enigma
Guides
Enigma on SecurityListing: A comprehensive guide to navigating the world of secure messaging apps, providing insights and recommendations to help you make an informed decision.

Innvikta Cybersecurity
Security Awareness Training
Innvikta Cybersecurity on SecurityListing: Security awareness training provider focused on cybersecurity education

The Pyramid of
Threat Intelligence Platforms
The Pyramid of Pain on SecurityListing: A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.

Bace Cybersecurity Institute

Security Operations

HTB Academy
Threat Intelligence Platforms
HTB Academy on SecurityListing: HTB Academy offers guided cybersecurity training with industry certifications to help you become a market-ready professional.

ATHENE National Research

Security Operations
FirstStep Middle East

Services
FirstStep MEA is a dynamic distribution and consulting company specializing in cybersecurity and forensics. Focused on the Middle East and African markets, the company identifies and markets niche tec

Block Harbor Cybersecurity

Industrial Control System Security
Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity. Now, we’re applying nearly a decade of service by building the Vehicle Security Engineer

Cybersecurity Coalition

Security Operations
The mission of the Cybersecurity Coalition is to bring together leading companies to help policymakers develop consensus-driven policy solutions to achieve improvements in cybersecurity. Guided by it

California Cybersecurity Institute

Security Operations
The California Cybersecurity Institute (CCI) is a multi-agency effort to protect California through enhanced cybercrime forensics and statewide tactical response training. Our partners are the Califor

Crossword Cybersecurity

Security Operations
Crossword Cybersecurity is a technology commercialisation company focusing exclusively on the cyber security sector. We work with research intensive European university partners to identify promising

Blackfoot Cybersecurity

Compliance Consulting
At Blackfoot, we work in partnership with you to deliver on-demand cyber security expertise and assurance, keeping you one step ahead of threats & compliant with regulations. Since 2008, we’ve contin
Blue Networks

Services
Blue Networks is an Information Technology company focused on providing specialized solutions and services in information security, network optimization, and critical infrastructure protection. Their

Absa Cybersecurity Academy

Security Awareness Training
Absa Cybersecurity Academy is an externally focused, corporate social responsibility initiative aimed at empowering marginalised South African youths to become certified cybersecurity specialists. Ad

Framework for Cybersecurity
Threat Intelligence Platforms
Framework for Cybersecurity Info Sharing on SecurityListing: A Microsoft framework for secure and efficient sharing of cybersecurity information between trusted parties to reduce cybersecurity risks.
Net Desire Technologies

Data Protection
Net Desire Technologies is a UAE-based cybersecurity and IT solutions provider focusing on data protection, networking, backup and storage, and related infrastructure services. They position themselve

ZoomEye
External Attack Surface Management
ZoomEye on SecurityListing: ZoomEye is an advanced cyberspace search engine that provides detailed information on cyberspace assets, including server software and version information, for cybersecurity experts, researchers, and enterprises.

YouTube
Guides
YouTube on SecurityListing: A video-sharing platform for creators to share their content and for users to discover new content, with a focus on cybersecurity.

The Practice of
Threat Intelligence Platforms
The Practice of Network Security Monitoring on SecurityListing: A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.

Project Honey Pot
Security Operations
Project Honey Pot on SecurityListing: The Web's Largest Community Tracking Online Fraud & Abuse

The SOC Academy
Certifications
The SOC Academy (VirusTotal) on SecurityListing: The SOC Academy offers official VirusTotal certification courses to help cybersecurity professionals maximize its functionalities and advance their careers.

Slavehack 2
Cyber Range Training
Slavehack 2 on SecurityListing: Online hacking game with realistic hacking experience and player interaction.

Teaching Security
Guides
Teaching Security on SecurityListing: Teaching Security provides educational resources and lessons for teaching cybersecurity concepts to high school students.

Ranges – Cyber
Cyber Range Training
Ranges – Cyber Warfare Range LLC on SecurityListing: A network of physical and online cyber warfare ranges for training and testing

Security Week
Blogs and News
Security Week on SecurityListing: A general cybersecurity news site providing discussions and news on various cybersecurity topics.

SMB Access from
Cheat Sheets
SMB Access from Linux Cheat Sheet on SecurityListing: A comprehensive cheat sheet for accessing Windows systems from Linux hosts using smbclient and rpcclient tools, covering password management, user and group enumeration, and more.

Securelist by Kaspersky
Blogs and News
Securelist by Kaspersky Lab on SecurityListing: Securelist by Kaspersky Lab provides in-depth cybersecurity research and solutions across multiple industries.

SANS Institute
Certifications
SANS Institute on SecurityListing: Leading provider of free cybersecurity training resources

SANS Cyber Aces
Certifications
SANS Cyber Aces on SecurityListing: Free cyber security training and resources for career development.

Schneier on Security
Blogs and News
Schneier on Security on SecurityListing: Schneier on Security provides expert analysis and commentary on a wide range of security issues.

Security Affairs
Blogs and News
Security Affairs on SecurityListing: Security Affairs provides comprehensive insights into global cybersecurity threats and protective measures.

Cybersecurity Advisors Network

Security Operations
CyAN is the Cybersecurity and cybercrime Advisors Network : whether you seek support to protect and develop your organisation, or whether you want to contribute to increase cybersecurity and the fight

SCADA HoneyNet Project
Network Security
SCADA HoneyNet Project on SecurityListing: Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.

WYBOT Cybersecurity

Security Operations
WYBOT provides a solution that monitors the security of your network and information systems in real time. The system triggers alerts by SMS, e-mail and notification if any threats are detected. WYBO

Risk Cognizance Customizable
Policy Management
Risk Cognizance Customizable Policies and Controls on SecurityListing: Platform for creating and managing customizable compliance policies and controls

Reverse Engineering for
Guides
Reverse Engineering for Beginners on SecurityListing: A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.

Thomas Murray Orbit
Risk Assessment
Thomas Murray Orbit Risk on SecurityListing: Third-party risk mgmt platform for monitoring operational & cyber risks

SANS
Certifications
SANS on SecurityListing: SANS Institute provides cyber security training, certifications, and degrees to empower cyber security practitioners and teams.
EG-CERT

Services
EG-CERT is charged with providing computer and information security incident response, support, defense and analysis against cyber attacks and collaboration with governmental, financial entities and a

Cybersecurity Maturity Model

Security Operations
CMMC COE is an IT-AAC sponsored and hosted public–private partnership that will be the focal point for coordination, communication, and collaboration in support of entities seeking to achieve the Cybe

Cybersecurity Tech Accord

Security Operations
The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies committed to protecting their customers and users and helping them defend again

American Cybersecurity Institute

Security Awareness Training
The American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy. The Institute was

Phosphorus Cybersecurity

Industrial Control System Security
Connected Things have already far exceeeded the number of PC's and Servers combined globally. New techniques and technology are necessary to secure them. Phosphorus has fully automated remediation of
Precise Technologies

Data Protection
Precise Technologies is a value-added distributor focusing on disruptive and emerging technologies, with emphasis on cyber security, information security, AI-based analytics solutions, and digital and

Cybersecurity Professionals

Security Operations
Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms. Professionals - R

Arsen Cybersecurity

Security Awareness Training
On one hand, theoretical knowledge does not translate into practice when the employee is manipulated. On the other hand, threats continually evolve, and one cannot rely on occasional awareness operati

Cybersecurity Association of

Security Operations
The Cybersecurity Association of Maryland, Inc. (CAMI) is a statewide, 501(c)(6) nonprofit organization formed in 2015 to identify Maryland’s cybersecurity product and service companies and facilitate