Loading...
Secure coding training platforms and resources for developers to learn application security best practices and vulnerability prevention.
Explore 14 curated cybersecurity tools, with 15,426 visitors searching for solutions
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to build security programs
Feature your product and reach thousands of professionals.
Application security training course for software developers covering SDL
Application security training course for software developers covering SDL
AI-powered coding assistant for automated code generation and development
AI-powered coding assistant for automated code generation and development
Secure code training platform for developers with personalized learning paths
Secure code training platform for developers with personalized learning paths
Post-quantum cryptography library with NIST-standardized algorithms
Post-quantum cryptography library with NIST-standardized algorithms
Real-time AI-powered code security tool for IDE vulnerability detection & fix
Real-time AI-powered code security tool for IDE vulnerability detection & fix
A guide to secure Ruby development, providing guidelines and recommendations for secure coding practices.
A guide to secure Ruby development, providing guidelines and recommendations for secure coding practices.
A free book providing design and implementation guidelines for writing secure programs in various languages.
A free book providing design and implementation guidelines for writing secure programs in various languages.
The best security training environment for Developers and AppSec Professionals.
The best security training environment for Developers and AppSec Professionals.
Guidelines for secure coding in Java SE to avoid bugs that could weaken security and open holes in Java's security features.
Guidelines for secure coding in Java SE to avoid bugs that could weaken security and open holes in Java's security features.
A set of 48 practical programming exercises in cryptography and application security
A set of 48 practical programming exercises in cryptography and application security
OWASP WrongSecrets is an educational game that teaches proper secrets management by demonstrating common mistakes through interactive challenges across various deployment platforms.
OWASP WrongSecrets is an educational game that teaches proper secrets management by demonstrating common mistakes through interactive challenges across various deployment platforms.
Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.
Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.
NodeGoat provides an environment to learn and address OWASP Top 10 security risks in Node.js web applications.
NodeGoat provides an environment to learn and address OWASP Top 10 security risks in Node.js web applications.
Utilize the kernel's CSPRNG for generating crypto keys instead of userspace CSPRNGs to avoid randomness failures.
Utilize the kernel's CSPRNG for generating crypto keys instead of userspace CSPRNGs to avoid randomness failures.
Common questions about Secure Code Training tools including selection guides, pricing, and comparisons.
Secure coding training platforms and resources for developers to learn application security best practices and vulnerability prevention.
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to build security programs