search
Join or Log In

CyberSecurity

Browse 143 cybersecurity tools tagged with "CyberSecurity"

Centre Systems Group

Centre Systems Group

United Arab Emirates flag
⭐ Editor's Choice

AI Security

Centre Systems Group is a globally recognized Disruptive Technology Consulting Firm headquartered in UAE with RHQ in KSA and branches in Australia, and Bahrain, specializing in cybersecurity, AI, clou

4.5(1)
H3 Secure

H3 Secure

United Arab Emirates flag
⭐ Editor's Choice

GRC

H3 Secure focuses on providing secure data erasure solutions, secure mobile device management, and information technology security expertise.

4.5(1)
Corsica Technologies Security Consulting Services

Corsica Technologies Security

language

Penetration Testing

Corsica Technologies Security Consulting Services on SecurityListing: A cybersecurity consulting service that provides security assessments, compliance guidance, and strategic planning across multiple industries with flexible engagement models.

4.8(3)
Women in CyberSecurity (WiCyS)

Women in CyberSecurity

United States flag

Security Operations

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field. WiCyS connects employers and recruiters with W

4.8(3)
CSIR Information & Cybersecurity Research Centre

CSIR Information &

South Africa flag

Security Operations

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of cyber and information security solutions and approaches to securely protect people and systems

4.8(3)
Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center

AZ flag

Security Awareness Training

Dive into an immersive learning environment, train with the latest cyber technologies in the market and leave as a cyber specialist.

4.7(2)
Aiuken Cybersecurity

Aiuken Cybersecurity

Spain flag

Compliance Consulting

Aiuken is an international IT Security company, focused on communications and IT technologies, specialised in Security and Cloud Services solutions with high added value. - Managed Security Services-

4.7(2)
Airbus Cybersecurity

Airbus Cybersecurity

France flag

Compliance Consulting

We provide a global cyber defence approach that dynamically aims to protect, detect and respond to cyber threats with a portfolio including managed security services, industrial control system offerin

4.7(2)
Fireware

Fireware

United Arab Emirates flag

Network Security

Fireware is a cybersecurity-focused company operating in the Middle East, providing information security solutions, data center and connectivity capabilities, and security platform partnerships. The c

4.7(2)
Nomoreransom

Nomoreransom

language

Digital Forensics and Incident Response

Nomoreransom on SecurityListing: No More Ransom is a collaborative project to combat ransomware attacks by providing decryption tools and prevention advice.

4.7(2)
Cybrary

Cybrary

language

Penetration Testing

Cybrary on SecurityListing: Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.

4.7(2)
Naked Security and Sophos News

Naked Security and

language

Threat Intelligence Platforms

Naked Security and Sophos News on SecurityListing: Naked Security by Sophos offers expert insights and practical advice on cybersecurity threats and protection strategies.

4.7(2)
2024 Data Breach Investigations Report

2024 Data Breach

language

Industry Reports

2024 Data Breach Investigations Report on SecurityListing: Get insights into the latest cybersecurity trends and expert advice on enhancing organizational security.

4.7(2)
BadCyber

BadCyber

language

Blogs and News

BadCyber on SecurityListing: A curated list of important security news, helping readers stay up-to-date with the latest developments in cybersecurity.

4.7(2)
Elektrotek Middle East

Elektrotek Middle East

United Arab Emirates flag

Data Protection

Elektrotek Middle East, a division of Elektrotek LLC based in California, specializes in IT security services, products, and solutions in the Middle East. Established to tap into emerging markets, the

4.7(2)
Saturn Gulf

Saturn Gulf

United Arab Emirates flag

Network Security

Saturn Gulf FZE is a part of Saturn Group, which operates in various areas including Cloud Computing, Telecom & Networking, Energy Saving Solutions, Automation, Car Care Products, and Sustainable Ener

4.7(2)
BlackSand

BlackSand

United Arab Emirates flag

Data Protection

BlackSand provides cybersecurity services, including virtual CISO, cybersecurity consulting, cybersecurity assessments, and compliance security services, to help organizations achieve their compliance

4.7(2)
Hemaya IT

Hemaya IT

EG flag

Data Protection

Hemaya IT Security is a cybersecurity company delivering trusted security solutions and digital transformation support for enterprises across the Middle East and North Africa. The company emphasizes c

4.7(2)
Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative

UN flag

Security Operations

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies. Mission - To provide awareness of and advocacy for vendor-

4.7(2)
Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for

Argentina flag

Security Operations

The Critical Infrastructures for Information and Cybersecurity ((ICIC) program is aimed at addressing the demand for cybersecurity to the National Public Sector, interjurisdictional organizations and

4.7(2)
Cybersecurity & Infrastructure Security Agency (CISA) - USA

Cybersecurity & Infrastructure

United States flag

Security Operations

CISA leads the national effort to defend critical infrastructure against the threats of today, while working with partners across all levels of government and in the private sector to secure against t

4.7(2)
GreHack 2018 Conference Videos

GreHack 2018 Conference

language

Guides

GreHack 2018 Conference Videos on SecurityListing: Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.

4.5(3)
ParrotSec

ParrotSec

language

Offensive Security

ParrotSec on SecurityListing: Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.

4.5(3)
Crypto Drainer Attack

Crypto Drainer Attack

language

Write-ups

Crypto Drainer Attack on SecurityListing: A deep dive into the Ledger connect-kit compromise decryption process.

4.5(3)
AMR CyberSecurity

AMR CyberSecurity

United Kingdom flag

Compliance Consulting

AMR CyberSecurity delivers next generation cyber security services to assist organisations across a wide variety of sectors in understanding potential threats and effectively countering them. We also

4.5(3)
Apura Cybersecurity Intelligence

Apura Cybersecurity Intelligence

Brazil flag

Compliance Consulting

Apura is a Brazilian company that develops advanced products and provides specialized services in information security and cyber defense. We provide open source threat intelligence, managed detection

4.5(3)
Grep App

Grep App

language

Threat Hunting

Grep App on SecurityListing: Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.

4.5(1)
Cybersecurity Ventures

Cybersecurity Ventures

language

Industry Reports

Cybersecurity Ventures on SecurityListing: Cybersecurity Ventures is a leading research and market intelligence firm providing insights, news, and analysis on the cybersecurity industry.

4.5(1)
LICSTER

LICSTER

language

Industrial Control System Security

LICSTER on SecurityListing: A Low-cost ICS Security Testbed for Education and Research

4.5(1)
Sacrosys

Sacrosys

United Arab Emirates flag

Services

Sacrosys is a Middle East–based information security and IT solutions provider founded in 2001, offering expertise in IT/IS consultation, advanced cybersecurity, robotics AI/ML solutions, and robust i

4.5(1)
AEI Cybersecurity

AEI Cybersecurity

Spain flag

Security Operations

The Spanish Cybersecurity Innovation Cluster (AEI Ciberseguridad y Tecnologías Avanzadas) brings together companies, Research Centres, Universities,  public and other private organizations interested

4.5(1)
Cybersecurity Collaboration Forum

Cybersecurity Collaboration Forum

United States flag

Security Operations

The mission of the Cybersecurity Collaboration Forum is to foster information security communication and idea sharing across the C-Suite, enabling leaders to better defend, preserve and protect local

4.5(1)
UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for

Ireland flag

Security Operations

UCD Centre for Cybersecurity and Cybercrime Investigation (CCI) is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

4.5(1)
Cybersecurity Collaborative

Cybersecurity Collaborative

United States flag

Security Operations

CISOs working with CISOs for "real-time" security solutions. The bad guys are more connected than ever, and that has to change. The Cybersecurity Collaborative is led by a seasoned group of Founding M

4.5(1)
Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

Spain flag

Security Operations

The main objective of Cybersecurity Innovation Hub is to bring cybersecurity and other advanced technologies closer to companies and, with the adoption of technology within their business processes, t

4.5(1)
Positive Hack Days Fest

Positive Hack Days

language

Cyber Range Training

Positive Hack Days Fest on SecurityListing: International cybersecurity festival for all, who wants to dive into the world of cyber security and have a great time.

4.5(1)
PrivSec

PrivSec

EG flag

Data Protection

PrivSec is an IT Solutions company specialized in the security field, providing services in securing and protecting information and data privacy for companies and institutions.

4.5(1)
PROW ME

PROW ME

United Arab Emirates flag

Application Security

PROW ME is a UAE-based cybersecurity and information management company with offices across the MENA region and Central Asia. The firm offers cybersecurity consultancy and a range of managed security

4.5(1)
Future Data Me

Future Data Me

United Arab Emirates flag

Data Protection

Future Data Me appears to be a cybersecurity-focused company offering data security and cyber security expertise, with services spanning security and digital marketing as part of its offerings. The ho

4.5(1)
Graham Cluley

Graham Cluley

language

Blogs and News

Graham Cluley on SecurityListing: Graham Cluley offers expert cybersecurity insights and commentary through various media including podcasts and speaking engagements.

4.5(1)
Emphasis Technologies

Emphasis Technologies

United Arab Emirates flag

Application Security

Emphasis Technologies, located in Dubai Silicon Oasis, specializes in digital transformation and cybersecurity solutions. They serve as an analytics partner, providing services that include descriptiv

4.5(1)
Vconn

Vconn

United Arab Emirates flag

Cloud Security

Vconn is a cybersecurity-centric managed services provider with a focus on helping organizations enhance digital transformation and security posture. The company offers cybersecurity, devsecops, manag

4.5(1)
BlackBerry Cybersecurity

BlackBerry Cybersecurity

Canada flag

Compliance Consulting

The BlackBerry can help you to secure your environment and handle whatever cybersecurity challenges that you face.  Our team can assist you, no matter what you have in your environment, and no-matter

4.5(1)
Arab Security Consultants

Arab Security Consultants

EG flag

Data Protection

Arab Security Consultants (ASC) is a leading information security firm based in Egypt, specializing in providing integrated solutions to safeguard systems handling confidential data across the Middle

4.5(1)
Intelligence-Driven Incident Response

Intelligence-Driven Incident Response

language

Digital Forensics and Incident Response

Intelligence-Driven Incident Response on SecurityListing: ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.

4.5(1)
CAPEC

CAPEC

language

Threat Intelligence Platforms

CAPEC on SecurityListing: CAPEC™ is a comprehensive dictionary of known attack patterns used by adversaries to exploit weaknesses in cyber-enabled capabilities.

4.5(1)
IronNet Cybersecurity

IronNet Cybersecurity

United States flag

Security Operations

IronNet Cybersecurity is different. Built by elite offensive and defensive cyber operators with experience at the highest levels of the U.S. military and intelligence community, our patented IronDefen

4.5(1)
Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation

United States flag

Industrial Control System Security

The Cybersecurity Manufacturing Innovation Institute (CyManII) was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital

4.5(1)
MUlliNER.ORG/NET/DE

MUlliNER.ORG/NET/DE

language

Blogs and News

MUlliNER.ORG/NET/DE on SecurityListing: Personal website of Collin R. Mulliner with a focus on security research and mobile platforms.

4.5(1)
CYGEN

CYGEN

EG flag

Cloud Security

CYGEN is a cybersecurity company offering data-driven, customized security solutions to protect digital assets and ensure business continuity. With five years in operation, they serve clients across E

4.5(1)
McAfee Blogs

McAfee Blogs

language

Blogs and News

McAfee Blogs on SecurityListing: Explore cybersecurity insights and tips on McAfee Blogs to stay safe online.

4.5(1)
Nmap Cheat Sheet v1.0

Nmap Cheat Sheet

language

Penetration Testing

Nmap Cheat Sheet v1.0 on SecurityListing: A comprehensive reference guide to Nmap's scripting engine and its various options, scripts, and target specifications.

4.5(1)
Cyberscoop

Cyberscoop

language

Blogs and News

Cyberscoop on SecurityListing: CyberScoop is a leading media brand providing news and event coverage to top cybersecurity leaders through its website, newsletter, events, radio, and TV.

4.5(1)
RuCTFE 2020 Conference

RuCTFE 2020 Conference

language

Blogs and News

RuCTFE 2020 Conference on SecurityListing: Online cybersecurity conference with speakers' talks and interactive Q&A sessions.

4.5(1)
Cybersecurity News

Cybersecurity News

language

Blogs and News

Cybersecurity News on SecurityListing: A cybersecurity news platform providing updates on threats, vulnerabilities, and breaches.

4.5(1)
Incident Response Flowchart

Incident Response Flowchart

language

Guides

Incident Response Flowchart on SecurityListing: A structured approach to managing and responding to suspected security events or incidents.

4.5(1)
CybersecNews Weekly

CybersecNews Weekly

language

Blogs and News

CybersecNews Weekly on SecurityListing: A weekly newsletter covering computer security news and tutorials

4.5(1)
Open Security Training

Open Security Training

language

Certifications

Open Security Training on SecurityListing: Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.

4.5(1)
Enterprise Detection & Response: A Simple Hunting Maturity Model

Enterprise Detection &

language

Threat Hunting

Enterprise Detection & Response: A Simple Hunting Maturity Model on SecurityListing: A simple maturity model for enterprise detection and response

4.5(1)
CPO Magazine

CPO Magazine

language

Blogs and News

CPO Magazine on SecurityListing: CPO Magazine is a cybersecurity news and information website providing articles, news, and insights on cybersecurity, privacy, and technology.

4.5(1)
Anxinsec

Anxinsec

United Arab Emirates flag

Services

Anxinsec is a company that provides information security services, specializing in advanced threat protection, memory detection and protection, security operations center, and mobile device management

4.5(1)
GBHackers

GBHackers

language

Blogs and News

GBHackers on SecurityListing: GBHackers offers up-to-date cybersecurity news and insights, focusing on threats, vulnerabilities, and innovative defense strategies.

4.5(1)
ISO2HANDLE

ISO2HANDLE

language

Compliance Management

ISO2HANDLE on SecurityListing: ISO2HANDLE is a powerful software that provides a total solution for Q&R professionals, trusted by over 50,000 users and 750+ organizations worldwide.

4.5(1)
ExploitDB

ExploitDB

language

Penetration Testing

ExploitDB on SecurityListing: A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.

4.5(1)
Krebs on Security

Krebs on Security

language

Blogs and News

Krebs on Security on SecurityListing: Brian Krebs is a cybersecurity journalist and blogger, known for his in-depth reporting on cybercrime and cybersecurity issues.

4.3(2)
FutureFeed

FutureFeed

language

Compliance Management

FutureFeed on SecurityListing: A tool for achieving and proving compliance with NIST 800-171 and CMMC cybersecurity requirements

4.3(2)
Caldera

Caldera

language

Offensive Security

Caldera on SecurityListing: Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.

4.3(2)
Google Security Blog

Google Security Blog

language

Blogs and News

Google Security Blog on SecurityListing: Google's Security Blog provides the latest news and insights on security and safety on the Internet.

4.3(2)
FEDIS

FEDIS

EG flag

GRC

FEDIS, also known as Fixed Egypt, is a provider of digital solutions and information security services with a focus on sectors such as gas and oil, utilities, telecom, enterprise, and government. The

4.3(2)
ZIUR Industrial Cybersecurity Center

ZIUR Industrial Cybersecurity

Spain flag

Industrial Control System Security

4.3(2)
Cybersecurity Business Network (CBN

Cybersecurity Business Network

UN flag

Security Operations

CBN (fomerly Transatlantic Cyber Security Business Network) is a network of cybersecurity organisations in the UK advocating for and shaping cyber policy and regulation to encourage a more secure, res

4.3(2)
dfir.org

dfir.org

language

Digital Forensics and Incident Response

dfir.org on SecurityListing: Andrew Case's personal page for research, software projects, and speaking events

4.3(2)
ITplus ARAB

ITplus ARAB

EG flag

Services

ITplus ARAB is an information technology firm offering digital transformation, security, and growth services for businesses. It focuses on tailored IT solutions including web development, mobile app d

4.2(3)
Paul's Security Weekly

Paul's Security Weekly

language

Blogs and News

Paul's Security Weekly on SecurityListing: A leading cybersecurity podcast network offering in-depth discussions on current security trends and insights.

3.9(2)
Meisst

Meisst

EG flag

Services

MEISST, or Middle East Information Systems Security & Technology, is a specialized information security company founded in 2016. Based in the Middle East, the company aims to lead the market in provid

3.9(2)
CVE

CVE

language

Vulnerability Assessment

CVE on SecurityListing: The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.

3.9(2)
ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

United States flag

Data Loss Prevention

ARIA Cybersecurity Solutions are designed and manufactured by the High Performance Products Division of CSP Inc.

3.8(1)
YoungHackers

YoungHackers

EG flag

Data Protection

YoungHackers is an organization focused on providing cybersecurity services and solutions to startups, helping them maintain a secure environment while handling confidential data. They also offer trai

3.8(1)
FortiServ

FortiServ

EG flag

Network Security

FortiServ is an Egyptian company specializing in information security solutions across the Middle East and Africa. As a partner of leading cybersecurity and networking vendors including Fortinet, F5,

3.8(1)
Ackcent Cybersecurity

Ackcent Cybersecurity

Spain flag

Compliance Consulting

Our mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services. Ackcent's professional services are designed to ach

3.8(1)
Cybersecurity Dubai

Cybersecurity Dubai

United Arab Emirates flag

Compliance Consulting

Welcome to our cybersecurity company in Dubai! We are a leading provider of top-notch cybersecurity consultant solutions to businesses of all sizes. Our team of experienced professionals is dedicated

3.8(1)
IM Security Global

IM Security Global

EG flag

Cloud Security

IM Security Global is a cybersecurity and IT security company serving the MENA region with a focus on enterprise security solutions. The company offers services across cyber security, networking, and

3.8(1)
Breadcrumb Cybersecurity

Breadcrumb Cybersecurity

United States flag

Compliance Consulting

Breadcrumb Cybersecurity is a cybersecurity and advisory firm. We specialize in penetration testing, threat hunting, incident response, regulatory compliance, and employee training services. Our miss

3.8(1)
Canadian Institute for Cybersecurity (CIC)

Canadian Institute for

Canada flag

Security Operations

The Canadian Institute for Cybersecurity (CIC) is a comprehensive multidisciplinary training, research and development, and entrepreneurial unit that draws on the expertise of researchers in the socia

3.8(1)
Digital Companion

Digital Companion

AD flag

AI Security

Digital Companion is a cybersecurity firm specializing in operational security and Governance, Risk, and Compliance (GRC). They operate in research, investigations, and development, focusing on buildi

3.8(1)
Cybersecurity Competence Center (C3)

Cybersecurity Competence Center

LU flag

Security Operations

The Cybersecurity Competence Center (C3) was created to further strengthen the Luxembourg economy in the field of cybersecurity. C3 is the missing piece in helping Business to face cyber risks Luxembo

3.8(1)
CSO Online

CSO Online

language

Blogs and News

CSO Online on SecurityListing: A leading online publication providing news, analysis, and insights on cybersecurity, IT leadership, and technology trends.

3.8(1)
Bad Sector Labs Blog - Last Week in Security (LWiS)

Bad Sector Labs

language

Blogs and News

Bad Sector Labs Blog - Last Week in Security (LWiS) on SecurityListing: Weekly summary of cybersecurity news and exploits.

3.8(1)
Mirai Tracker

Mirai Tracker

language

Threat Intelligence Platforms

Mirai Tracker on SecurityListing: A tracker that detects and logs SYN packets with a specific signature generated by the Mirai malware, providing real-time information on Mirai-based campaigns.

3.8(1)
OpenPhish

OpenPhish

language

Anti-Phishing

OpenPhish on SecurityListing: OpenPhish provides real-time phishing trends, detecting new phishing URLs and targeting various brands.

3.8(1)
ENISA Training Resources

ENISA Training Resources

language

Guides

ENISA Training Resources on SecurityListing: ENISA Training Resources offers online training material for cybersecurity specialists, covering technical and artefact analysis fundamentals.

3.8(1)
Billington CyberSecurity

Billington CyberSecurity

United States flag

Security Awareness Training

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity. The company's flagship event is the Annual Billington CyberSecurity Summit. Since 2010,

3.8(1)
Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for

United States flag

Industrial Control System Security

The goal of the Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS) is to conduct research and develop innovative cybersecurity technologies, tools, and methodologies that advanc

3.8(1)
Aujas Cybersecurity

Aujas Cybersecurity

India flag

Compliance Consulting

Aujas Cybersecurity, an NSEIT Company, is an enterprise security service provider for organizations across North America, Asia Pacific, and EMEA regions. Aujas has deep expertise and capabilities in

3.8(1)
International Cybersecurity Forum (FIC)

International Cybersecurity Forum

France flag

Security Operations

The International Cybersecurity Forum (FIC) has established itself as the benchmark event in Europe in terms of digital security and trust. Its originality is to combine: a FORUM promoting reflection

3.8(1)
AT&T Cybersecurity

AT&T Cybersecurity

United States flag

Compliance Consulting

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business. Cybersecurity Consulting ServicesM

3.8(1)
Enigma

Enigma

language

Guides

Enigma on SecurityListing: A comprehensive guide to navigating the world of secure messaging apps, providing insights and recommendations to help you make an informed decision.

3.8(1)
Innvikta Cybersecurity

Innvikta Cybersecurity

language

Security Awareness Training

Innvikta Cybersecurity on SecurityListing: Security awareness training provider focused on cybersecurity education

3.8(1)
The Pyramid of Pain

The Pyramid of

language

Threat Intelligence Platforms

The Pyramid of Pain on SecurityListing: A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.

3.8(1)
Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute

United States flag

Security Operations

3.8(1)
HTB Academy

HTB Academy

language

Threat Intelligence Platforms

HTB Academy on SecurityListing: HTB Academy offers guided cybersecurity training with industry certifications to help you become a market-ready professional.

3.8(1)
ATHENE National Research Center For Applied Cybersecurity

ATHENE National Research

Germany flag

Security Operations

3.8(1)
FirstStep Middle East & Africa

FirstStep Middle East

United Arab Emirates flag

Services

FirstStep MEA is a dynamic distribution and consulting company specializing in cybersecurity and forensics. Focused on the Middle East and African markets, the company identifies and markets niche tec

3.8(1)
Block Harbor Cybersecurity

Block Harbor Cybersecurity

United States flag

Industrial Control System Security

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity. Now, we’re applying nearly a decade of service by building the Vehicle Security Engineer

3.8(1)
Cybersecurity Coalition

Cybersecurity Coalition

United States flag

Security Operations

The mission of the Cybersecurity Coalition is to bring together leading companies to help policymakers develop consensus-driven policy solutions to achieve improvements in cybersecurity. Guided by it

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute

United States flag

Security Operations

The California Cybersecurity Institute (CCI) is a multi-agency effort to protect California through enhanced cybercrime forensics and statewide tactical response training. Our partners are the Califor

Crossword Cybersecurity

Crossword Cybersecurity

United Kingdom flag

Security Operations

Crossword Cybersecurity is a technology commercialisation company focusing exclusively on the cyber security sector. We work with research intensive European university partners to identify promising

Blackfoot Cybersecurity

Blackfoot Cybersecurity

United Kingdom flag

Compliance Consulting

At Blackfoot, we work in partnership with you to deliver on-demand cyber security expertise and assurance, keeping you one step ahead of threats & compliant with regulations. Since 2008, we’ve contin

Blue Networks

Blue Networks

United Arab Emirates flag

Services

Blue Networks is an Information Technology company focused on providing specialized solutions and services in information security, network optimization, and critical infrastructure protection. Their

Absa Cybersecurity Academy

Absa Cybersecurity Academy

South Africa flag

Security Awareness Training

Absa Cybersecurity Academy is an externally focused, corporate social responsibility initiative aimed at empowering marginalised South African youths to become certified cybersecurity specialists. Ad

Framework for Cybersecurity Info Sharing

Framework for Cybersecurity

language

Threat Intelligence Platforms

Framework for Cybersecurity Info Sharing on SecurityListing: A Microsoft framework for secure and efficient sharing of cybersecurity information between trusted parties to reduce cybersecurity risks.

Net Desire Technologies

Net Desire Technologies

United Arab Emirates flag

Data Protection

Net Desire Technologies is a UAE-based cybersecurity and IT solutions provider focusing on data protection, networking, backup and storage, and related infrastructure services. They position themselve

ZoomEye

ZoomEye

language

External Attack Surface Management

ZoomEye on SecurityListing: ZoomEye is an advanced cyberspace search engine that provides detailed information on cyberspace assets, including server software and version information, for cybersecurity experts, researchers, and enterprises.

YouTube

YouTube

language

Guides

YouTube on SecurityListing: A video-sharing platform for creators to share their content and for users to discover new content, with a focus on cybersecurity.

The Practice of Network Security Monitoring

The Practice of

language

Threat Intelligence Platforms

The Practice of Network Security Monitoring on SecurityListing: A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.

Project Honey Pot

Project Honey Pot

language

Security Operations

Project Honey Pot on SecurityListing: The Web's Largest Community Tracking Online Fraud & Abuse

The SOC Academy (VirusTotal)

The SOC Academy

language

Certifications

The SOC Academy (VirusTotal) on SecurityListing: The SOC Academy offers official VirusTotal certification courses to help cybersecurity professionals maximize its functionalities and advance their careers.

Slavehack 2

Slavehack 2

language

Cyber Range Training

Slavehack 2 on SecurityListing: Online hacking game with realistic hacking experience and player interaction.

Teaching Security

Teaching Security

language

Guides

Teaching Security on SecurityListing: Teaching Security provides educational resources and lessons for teaching cybersecurity concepts to high school students.

Ranges – Cyber Warfare Range LLC

Ranges – Cyber

language

Cyber Range Training

Ranges – Cyber Warfare Range LLC on SecurityListing: A network of physical and online cyber warfare ranges for training and testing

Security Week

Security Week

language

Blogs and News

Security Week on SecurityListing: A general cybersecurity news site providing discussions and news on various cybersecurity topics.

SMB Access from Linux Cheat Sheet

SMB Access from

language

Cheat Sheets

SMB Access from Linux Cheat Sheet on SecurityListing: A comprehensive cheat sheet for accessing Windows systems from Linux hosts using smbclient and rpcclient tools, covering password management, user and group enumeration, and more.

Securelist by Kaspersky Lab

Securelist by Kaspersky

language

Blogs and News

Securelist by Kaspersky Lab on SecurityListing: Securelist by Kaspersky Lab provides in-depth cybersecurity research and solutions across multiple industries.

SANS Institute

SANS Institute

language

Certifications

SANS Institute on SecurityListing: Leading provider of free cybersecurity training resources

SANS Cyber Aces

SANS Cyber Aces

language

Certifications

SANS Cyber Aces on SecurityListing: Free cyber security training and resources for career development.

Schneier on Security

Schneier on Security

language

Blogs and News

Schneier on Security on SecurityListing: Schneier on Security provides expert analysis and commentary on a wide range of security issues.

Security Affairs

Security Affairs

language

Blogs and News

Security Affairs on SecurityListing: Security Affairs provides comprehensive insights into global cybersecurity threats and protective measures.

Cybersecurity Advisors Network (CyAN)

Cybersecurity Advisors Network

France flag

Security Operations

CyAN is the Cybersecurity and cybercrime Advisors Network : whether you seek support to protect and develop your organisation, or whether you want to contribute to increase cybersecurity and the fight

SCADA HoneyNet Project

SCADA HoneyNet Project

language

Network Security

SCADA HoneyNet Project on SecurityListing: Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.

WYBOT Cybersecurity

WYBOT Cybersecurity

France flag

Security Operations

WYBOT provides a solution that monitors the security of your network and information systems in real time. The system triggers alerts by SMS, e-mail and notification if any threats are detected. WYBO

Risk Cognizance Customizable Policies and Controls

Risk Cognizance Customizable

language

Policy Management

Risk Cognizance Customizable Policies and Controls on SecurityListing: Platform for creating and managing customizable compliance policies and controls

Reverse Engineering for Beginners

Reverse Engineering for

language

Guides

Reverse Engineering for Beginners on SecurityListing: A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.

Thomas Murray Orbit Risk

Thomas Murray Orbit

language

Risk Assessment

Thomas Murray Orbit Risk on SecurityListing: Third-party risk mgmt platform for monitoring operational & cyber risks

SANS

SANS

language

Certifications

SANS on SecurityListing: SANS Institute provides cyber security training, certifications, and degrees to empower cyber security practitioners and teams.

EG-CERT

EG-CERT

EG flag

Services

EG-CERT is charged with providing computer and information security incident response, support, defense and analysis against cyber attacks and collaboration with governmental, financial entities and a

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

Cybersecurity Maturity Model

United States flag

Security Operations

CMMC COE is an IT-AAC sponsored and hosted public–private partnership that will be the focal point for coordination, communication, and collaboration in support of entities seeking to achieve the Cybe

Cybersecurity Tech Accord

Cybersecurity Tech Accord

UN flag

Security Operations

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies committed to protecting their customers and users and helping them defend again

American Cybersecurity Institute

American Cybersecurity Institute

United States flag

Security Awareness Training

The American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy. The Institute was

Phosphorus Cybersecurity

Phosphorus Cybersecurity

United States flag

Industrial Control System Security

Connected Things have already far exceeeded the number of PC's and Servers combined globally. New techniques and technology are necessary to secure them. Phosphorus has fully automated remediation of

Precise Technologies

Precise Technologies

United Arab Emirates flag

Data Protection

Precise Technologies is a value-added distributor focusing on disruptive and emerging technologies, with emphasis on cyber security, information security, AI-based analytics solutions, and digital and

Cybersecurity Professionals

Cybersecurity Professionals

United Kingdom flag

Security Operations

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms. Professionals - R

Arsen Cybersecurity

Arsen Cybersecurity

France flag

Security Awareness Training

On one hand, theoretical knowledge does not translate into practice when the employee is manipulated. On the other hand, threats continually evolve, and one cannot rely on occasional awareness operati

Cybersecurity Association of Maryland (CAMI)

Cybersecurity Association of

United States flag

Security Operations

The Cybersecurity Association of Maryland, Inc. (CAMI) is a statewide, 501(c)(6) nonprofit organization formed in 2015 to identify Maryland’s cybersecurity product and service companies and facilitate