Loading...
Explore 175 curated cybersecurity tools, with 14,275 visitors searching for solutions
Data security governance platform for data at rest, in motion, and GenAI apps
Data security governance platform for data at rest, in motion, and GenAI apps
AI-driven data classification platform for automated discovery & labeling
AI-driven data classification platform for automated discovery & labeling
Unified platform for data & AI security, governance, privacy & compliance
Unified platform for data & AI security, governance, privacy & compliance
Agentless data security platform for discovery, monitoring, and access control
Agentless data security platform for discovery, monitoring, and access control
Agentless CNAPP for multi-cloud security, compliance, and risk management
Agentless CNAPP for multi-cloud security, compliance, and risk management
Protocol-aware reverse proxy for datastores & APIs enforcing access policies
Protocol-aware reverse proxy for datastores & APIs enforcing access policies
DLP platform securing sensitive data in AI assistants via sanitization & E2EE
DLP platform securing sensitive data in AI assistants via sanitization & E2EE
AI-native data security platform for DSPM, DLP, and AI data protection
AI-native data security platform for DSPM, DLP, and AI data protection
Scans files and databases for unencrypted PII like SSN, names, and addresses
Scans files and databases for unencrypted PII like SSN, names, and addresses
On-premises tool for discovering, analyzing, and remediating PII/PCI/PHI data
On-premises tool for discovering, analyzing, and remediating PII/PCI/PHI data
A storage exploration tool that provides unified access to view publicly accessible Amazon S3 buckets, Azure Blob storage, FTP servers, and HTTP directory listings.
A storage exploration tool that provides unified access to view publicly accessible Amazon S3 buckets, Azure Blob storage, FTP servers, and HTTP directory listings.
A security toolkit for Amazon S3 that provides bucket scanning, policy validation, ACL management, and encryption features to identify and remediate S3 security vulnerabilities.
A security toolkit for Amazon S3 that provides bucket scanning, policy validation, ACL management, and encryption features to identify and remediate S3 security vulnerabilities.
A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.
A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.
Log management appliance for collecting, storing, searching, and auditing logs
Log management appliance for collecting, storing, searching, and auditing logs
A PHP library that provides secure data encryption capabilities using keys or passwords, designed to minimize implementation errors.
A PHP library that provides secure data encryption capabilities using keys or passwords, designed to minimize implementation errors.
A database protection suite that provides field-level encryption, access control, and intrusion detection for distributed applications storing sensitive data.
A database protection suite that provides field-level encryption, access control, and intrusion detection for distributed applications storing sensitive data.
A configurable data destruction toolkit that securely erases sensitive virtual data, temporary files, and swap memory using customizable overwrite methods.
A configurable data destruction toolkit that securely erases sensitive virtual data, temporary files, and swap memory using customizable overwrite methods.
Tang is a network-based server that binds encrypted data access to network presence, allowing data decryption only when clients are connected to the specific network where the Tang server operates.
Tang is a network-based server that binds encrypted data access to network presence, allowing data decryption only when clients are connected to the specific network where the Tang server operates.
Deep learning-based cloud data security for Amazon S3 buckets
Deep learning-based cloud data security for Amazon S3 buckets
A deep dive into the Ledger connect-kit compromise decryption process.
A deep dive into the Ledger connect-kit compromise decryption process.
A tool that removes Exif metadata from images stored in AWS S3 buckets to protect privacy and eliminate sensitive embedded information.
A tool that removes Exif metadata from images stored in AWS S3 buckets to protect privacy and eliminate sensitive embedded information.
A security checklist based on OWASP standards that provides comprehensive guidelines for designing, testing, and releasing secure Android applications.
A security checklist based on OWASP standards that provides comprehensive guidelines for designing, testing, and releasing secure Android applications.
An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.
An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.
BleachBit is an open-source system cleaning utility that removes temporary files and system artifacts to free disk space and protect user privacy.
BleachBit is an open-source system cleaning utility that removes temporary files and system artifacts to free disk space and protect user privacy.
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure