50 Similar Sites like Cybersmartdefence.com

Cyber Smart Defence | Penetration Test Ethical Hacking GDPR

Let us hack you before the bad guys do ! Let us identify how attackers could exploit your vulnerabilities - and guidance on how to stop them - with our pen testing services.

Site Popularity:
4 points

Language: English

Cyber Security Training | SANS Courses, Certifications & Research sans.org

SANS Institute is the most trusted resource for cybersecurity training, certifications and research. Offering more than 60 courses across all practice areas, SANS trains over 40, 000 cybersecurity professionals annually.

Tags: PenetrationSecurityAuditCyberTraining
Similarity:
67%

Cybersecurity News, Awards, Webinars, eSummits, Research | SC Media scmagazine.com

The essential resource for cybersecurity professionals, delivering in-depth, unbiased news, analysis and perspective to keep the community informed, educated and enlightened about the market.

Tags: TestVulnerabilitySecurityCyber
Similarity:
60%

InformationWeek, News & Analysis Tech Leaders Trust informationweek.com

InformationWeek.com: News analysis and commentary on information technology strategy, including IT management, artificial intelligence, cyber resilience, data management, data privacy, sustainability, cloud computing, IT infrastructure, software & services, and more.

Tags: SecurityAuditCyberIntelligence
Similarity:
55%

Cybersecurity Degree and Certificate Programs | SANS Technology Institute sans.edu

The SANS Technology Institute (SANS.edu) offers career-focused undergraduate and graduate cyber security programs on the cutting edge of cybersecurity.

Tags: VulnerabilityAssessmentSecurityCyber
Similarity:
53%

Schneier on Security schneier.com

Tags: VulnerabilitySecurityCyber
Similarity:
49%

eSecurity Planet: Latest Cybersecurity News for IT Professionals esecurityplanet.com

eSecurity Planet provides the latest cybersecurity news, trends, and software reviews for IT leaders. Browse our buyer's guides and analysis now.

Tags: VulnerabilitySecurityCyber
Similarity:
49%

Core Security | Cyber Threat Prevention & Identity Governance coresecurity.com

Tags: PenetrationVulnerabilityAssessmentSecurityIntelligence
Similarity:
49%

Securelist | Kaspersky's threat research and reports securelist.com

The Securelist blog houses Kaspersky's threat intelligence reports, malware research, APT analysis and statistics

Tags: VulnerabilitySecurityCyber
Similarity:
49%

National Security Agency | Central Security Service nsa.gov

The National Security Agency/Central Security Service leads the U.S. Government in cryptology that encompasses both signals intelligence insights and cybersecurity products and services that enables computer network operations to gain a decisive advantage for the nation and our allies.

Tags: SecurityCyberIntelligence
Similarity:
49%

GSA Advantage gsaadvantage.gov

GSA Advantage is an online shopping and ordering system that provides access to thousands of contractors with millions of products and services.

Tags: TestAssessmentSecurityAuditTraining
Similarity:
48%

Welcome! gsnmagazine.com

Tags: AssessmentSecurityCyber
Similarity:
47%

Tripwire | Security and Integrity Management Solutions tripwire.com

Detect and neutralize threats on-site and in the cloud with superior security and continuous compliance. Solutions for Security Configuration Management, File Integrity Monitoring and Vulnerability Management.

Tags: VulnerabilityCyberIntelligence
Similarity:
46%

Audit My PC auditmypc.com

Free Web tools include firewall test and speed test plus sitemap generator and other online tools for webmasters and home users.

Tags: TestVulnerabilitySecurityAudit
Similarity:
45%

Cybersecurity Courses Online | Best Cybersecurity Training eccouncil.org

Enroll in the best cybersecurity courses online by EC-Council. Boost your career with one of the best cybersecurity courses and training. Get certified now!

Tags: PenetrationVulnerabilityAssessmentSecurity
Similarity:
44%

PCI | HIPAA | Credit Card Compliance | SecurityMetrics securitymetrics.com

Protect your network and your customers with PCI and HIPAA compliance assessments from SecurityMetrics. We offer a full line of data security solutions.

Tags: PenetrationVulnerabilityAssessmentSecurity
Similarity:
44%

Janes | The trusted source for defence and security intelligence janes.com

Janes | The trusted source for defence intelligence - Unrivalled defence and security analysis - Military platforms - Threat intelligence - Industry awareness and advisory services

Tags: AssessmentSecurityIntelligenceDefence
Similarity:
41%

nccgroup.com nccgroup.com

Tags: PenetrationSecurityAudit
Similarity:
41%

Leading Managed Detection and Response | Trustwave trustwave.com

Trustwave is a leading cybersecurity and managed security services provider focused on managed detection and response.

Tags: VulnerabilityAssessmentSecurityIntelligence
Similarity:
38%

IDC: The premier global market intelligence firm. idc.com

IDC examines consumer markets by devices, applications, networks, and services to provide complete solutions for succeeding in these expanding markets.

Tags: AssessmentIntelligenceSmart
Similarity:
36%

Cyber Security Certifications | GIAC Certifications giac.org

GIAC Certifications develops and administers premier, professional information security certifications. More than 30 certifications align with SANS training and ensure mastery in critical, specialized InfoSec domains. GIAC certifications provide the highest and most rigorous assurance of cyber security knowledge and skill available to industry, government, and military clients across the world.

Tags: PenetrationSecurity
Similarity:
35%

Facebook - log in or sign up facebook.com

Log into Facebook to start sharing and connecting with your friends, family, and people you know.

Tags: TestSecurity
Similarity:
34%

PAY360 Security Settings Test Page e-paycapita.com

Tags: TestSecurity
Similarity:
34%

PHP: Hypertext Preprocessor php.net

PHP is a popular general-purpose scripting language that powers everything from your blog to the most popular websites in the world.

Tags: VulnerabilitySecurityTraining
Similarity:
34%

Acunetix | Web Application Security Scanner acunetix.com

Acunetix is an end-to-end web security scanner that offers a 360 view of an organization's security. Allowing you to take control of the security of all you web applications, web services, and APIs to ensure long-term protection. Acunetix's scanning engine is globally known and trusted for its unbeatable speed and precision.

Tags: VulnerabilitySecurityAudit
Similarity:
34%

Threatpost | The first stop for security news threatpost.com

Threatpost, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.

Tags: VulnerabilitySecurityAudit
Similarity:
34%

Man Vs WebApp manvswebapp.com

Web Application Security Blog and Podcast

Tags: TestSecurity
Similarity:
34%

IT Audit, Integrated Audit, Governance Audit, SDLC, GDPR Implementation, GDPR Seminars, Social Engineering and Penetration Test Consulting & Training services provided by Audit Serve, Inc. auditserve.com

IT Audit, Integrated Audit, Governance Audit, SDLC, GDPR, Pre-Imp, Social Engineering and Penetration Test Consulting & Training services provided by Audit Serve, Inc.

Tags: PenetrationAudit
Similarity:
32%

Cybersecurity Testing internetbankingaudits.com

Tags: PenetrationVulnerability
Similarity:
32%

Dionach – Real Security in a Virtual World dionach.com

Tags: PenetrationVulnerability
Similarity:
32%

Circulation Verification Council - CVC | The Experts in Publication Audits cvcaudit.com

The CVC is a third-party audit company specializing in community newspapers, shoppers and magazines, with FREE access to media buyers. We perform printing, distribution, circulation and website audits as well as readership studies.

Tags: PenetrationAudit
Similarity:
32%

CYBER GATES - Information Security Consulting, Testing and Research Company cybergates.org

CYBER GATES has a broad range of world class security testing and consultancy services that can deliver a real return on investment for your business.

Tags: PenetrationVulnerability
Similarity:
32%

Safe Breaker is Tech 101 safebreaker.org

Tags: PenetrationVulnerability
Similarity:
32%

Verisign is a global provider of domain name registry services and internet infrastructure - Verisign verisign.com

Verisign enables the security, stability and resiliency of key internet infrastructure and services, including the .com and .net domains. The domains that define the internet are Powered by Verisign.

Tags: VulnerabilityAssessmentSecurity
Similarity:
32%

Proso | proVM Auditor - Vulnerability Data Aggregator proso.com

Tags: PenetrationVulnerability
Similarity:
32%

Vulnerability Security Testing & DAST | Fortra's Beyond Security beyondsecurity.com

Secure your applications and networks with the industry's only network vulnerability scanner to combine SAST, DAST and mobile security.

Tags: VulnerabilityAssessmentSecurity
Similarity:
32%

Tenable® - The Exposure Management Company tenable.com

Tenable is a leading Cybersecurity Exposure Management Company. With Tenable's products, we can help you understand and reduce your cybersecurity exposure. ost. From IT to the cloud, gain full visibility of the modern attack surface.

Tags: VulnerabilityAssessmentSecurity
Similarity:
32%

ControlCase | Global Provider of Compliance as a Service (CaaS) controlcase.com

ControlCase is a global provider of certification, cybersecurity, and continuous compliance services. PCI DSS, HITRUST, SOC2, ISO 27001, CMMC, FedRAMP, GDPR, HIPAA

Tags: PenetrationVulnerability
Similarity:
32%

Safecity - Safecity Services Pty Ltd safecity.com.au

Safecity Services Pty Ltd

Tags: AssessmentSecurityTraining
Similarity:
32%

The Website Security And Monitoring Leader | SiteLock sitelock.com

SiteLock is the website security and monitoring leader. Our website security products eliminate cyber threats keeping your site safe and secure.

Tags: VulnerabilitySecurity
Similarity:
29%

The H: Open Source, Security and Development h-online.com

The H brings you the in-depth coverage of the world of IT, communications, data security and the politics of technology.

Tags: VulnerabilitySecurity
Similarity:
29%

Endpoint Detection and Response, Free - What is EDR Security? comodo.com

Endpoint Detection and Response (EDR) is a Free open source platform to detect threats and investigate the entire lifecycle of the threat.

Tags: VulnerabilitySecurity
Similarity:
29%

Global Leader of Cybersecurity Solutions and Services | Fortinet fortinet.com

Fortinet delivers cybersecurity everywhere you need it. We secure the entire digital attack surface from devices, data, and apps and from data center to home office.

Tags: VulnerabilitySecurity
Similarity:
29%

ETS | Global education and talent solutions ets.org

We are a global education and talent solutions organization enabling lifelong learners to be future ready. We advance the science of measurement to build the benchmarks for fair and valid skill assessment.

Tags: TestAssessment
Similarity:
29%

british-assessment.co.uk british-assessment.co.uk

Tags: AssessmentAuditTraining
Similarity:
29%

Home - Security Risk Analysis security-risk-analysis.com

Tags: AssessmentSecurity
Similarity:
27%

Safety Training & Certification | British Safety Council britsafe.org

Make your workplace safer and improve business performance with training and accreditation from one of the world's leading safety organisations.

Tags: AssessmentAudit
Similarity:
24%

U.S. Government Accountability Office (U.S. GAO) gao.gov

GAO provides fact-based, nonpartisan information to Congress. Often called the "congressional watchdog, " GAO investigates federal spending and performance.

Tags: AssessmentAudit
Similarity:
24%

IPCC - Intergovernmental Panel on Climate Change ipcc.ch

Tags: VulnerabilityAssessment
Similarity:
24%

RedirectorPage ambest.com

Tags: VulnerabilityAssessment
Similarity:
24%

Pennsylvania Treasury, Stacy Garrity - State Treasurer patreasury.gov

The Pennsylvania Office of the State Treasurer serves as the custodian of more than $100 billion in Commonwealth funds, and is responsible for the receipt and deposit of state monies, investment management and oversight of all withdrawals and deposits from state agencies. Treasury also administers several programs that provide an opportunity for financial empowerment for families, municipal governments, and non-profit groups across the state. Here you can learn more about all of Treasury's programs and

Tags: AssessmentAudit
Similarity:
24%
Analyzed Keywords
Vul­nerabi­lity Vul­nerabili­ties Training Toggle Test Team Smart Sis­teme­lor Security Read Ran­som­wa­re Perform Penet­ra­tion Met­hodo­logy Mai In­telli­gen­ce Infrastructu­res Human Ha­cker­vil­le Hack Defence Cybersmartdefen­ce Cyber Csd Cea Audit Attacks As­sessment Adress Acolo