Loading...
The highest-rated security solutions chosen by enterprise security teams and professionals.
Browse 132 popular cybersecurity tools tools
Connect and learn from experts and peers in the Microsoft Community Hub.
Connect and learn from experts and peers in the Microsoft Community Hub.
A practical security handbook for .NET developers covering essential security controls, cryptographic functions, and secure coding practices.
A practical security handbook for .NET developers covering essential security controls, cryptographic functions, and secure coding practices.
The best security training environment for Developers and AppSec Professionals.
The best security training environment for Developers and AppSec Professionals.
A specification/framework for extending default C2 communication channels in Cobalt Strike
A specification/framework for extending default C2 communication channels in Cobalt Strike
Stay up-to-date on the latest trends and developments in AWS Cloud Security with this weekly digest newsletter.
Stay up-to-date on the latest trends and developments in AWS Cloud Security with this weekly digest newsletter.
Live and on-demand cybersecurity training programs for all levels.
Live and on-demand cybersecurity training programs for all levels.
IT certification training for CompTIA exams with free resources.
IT certification training for CompTIA exams with free resources.
Interactive malware hunting service with live access to the heart of an incident.
Interactive malware hunting service with live access to the heart of an incident.
A platform offering hacking missions to test and enhance skills.
A non-profit organization providing live-fire cyber warfare ranges for training and up-skilling cybersecurity professionals.
A non-profit organization providing live-fire cyber warfare ranges for training and up-skilling cybersecurity professionals.
Community project for developing common guidelines and best practices for secure configurations.
Community project for developing common guidelines and best practices for secure configurations.
A comprehensive guide providing step-by-step instructions for hardening GNU/Linux systems using industry standards like CIS, STIG, NIST, and PCI-DSS.
A comprehensive guide providing step-by-step instructions for hardening GNU/Linux systems using industry standards like CIS, STIG, NIST, and PCI-DSS.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs