Loading...
Cybersecurity educational resources including training materials, certifications, industry reports, and security documentation.
Browse 361 resources tools
Cybersecurity awareness research study and report by Cerebra
Cybersecurity awareness research study and report by Cerebra
Cybersecurity awareness study report by Cerebra (3rd edition)
Cybersecurity awareness study report by Cerebra (3rd edition)
Cybersecurity research blog covering threat intelligence and malware analysis
Cybersecurity research blog covering threat intelligence and malware analysis
Educational initiative promoting API security awareness through stages
Educational initiative promoting API security awareness through stages
Curated cybersecurity frameworks, templates & guides for security programs
Curated cybersecurity frameworks, templates & guides for security programs
SANS survey report on ICS/OT cybersecurity detection and response practices
SANS survey report on ICS/OT cybersecurity detection and response practices
Cybersecurity podcast covering threat analysis and security trends
Industry report on cyber and technology risks for 2024
Industry report on cyber and technology risks for 2024
Online cybersecurity training platform with 150+ courses and hands-on labs
Online cybersecurity training platform with 150+ courses and hands-on labs
Cybersecurity-themed apparel product (t-shirt) with Red Team branding
Cybersecurity-themed apparel product (t-shirt) with Red Team branding
Cybersecurity-themed apparel product (t-shirt) with red eagle design
Cybersecurity-themed apparel for blue team professionals
E-book guide for evaluating AI-powered pentesting solutions and guardrails
E-book guide for evaluating AI-powered pentesting solutions and guardrails
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
Cyber workforce intelligence platform for talent strategy and team development
Cyber workforce intelligence platform for talent strategy and team development
Broadband and TV service provider, not a cybersecurity product
Business intelligence platform providing expert insights and analysis
Business intelligence platform providing expert insights and analysis
Report tracking global cyber policy developments and regulatory changes
Report tracking global cyber policy developments and regulatory changes
A newsletter service that tracks and reports weekly changes in detection engineering rules and updates across multiple GitHub repositories.
A newsletter service that tracks and reports weekly changes in detection engineering rules and updates across multiple GitHub repositories.
SecTemplates provides free security program templates, runbooks, and documentation resources for information security professionals and engineering teams.
SecTemplates provides free security program templates, runbooks, and documentation resources for information security professionals and engineering teams.
A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.
A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.
A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.
A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.
A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.
A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.
Common questions about Resources tools including selection guides, pricing, and comparisons.
Cybersecurity educational resources including training materials, certifications, industry reports, and security documentation.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Get strategic cybersecurity insights in your inbox