Loading...
Explore 73 curated cybersecurity tools, with 15,161 visitors searching for solutions
CSPM tool for continuous vulnerability scanning across cloud providers
CSPM tool for continuous vulnerability scanning across cloud providers
Detects exposed Python history files that may leak sensitive information
Detects exposed Python history files that may leak sensitive information
Detects config disclosure vulnerabilities in Simple 301 Redirects plugin
Detects config disclosure vulnerabilities in Simple 301 Redirects plugin
IaC security scanning with contextual risk assessment and remediation guidance
IaC security scanning with contextual risk assessment and remediation guidance
CSPM platform for multi-cloud security monitoring and misconfiguration detection
CSPM platform for multi-cloud security monitoring and misconfiguration detection
IaC scanning tool that identifies misconfigurations before deployment
IaC scanning tool that identifies misconfigurations before deployment
CSPM tool for detecting and remediating cloud misconfigurations
CSPM tool for detecting and remediating cloud misconfigurations
App security testing platform with SAST, SCA, secrets detection, and IaC scanning
App security testing platform with SAST, SCA, secrets detection, and IaC scanning
Cloud security posture management platform for risk identification
Cloud security posture management platform for risk identification
External attack surface management platform for asset discovery and risk detection
External attack surface management platform for asset discovery and risk detection
DSPM platform for multi-cloud data security and compliance monitoring
DSPM platform for multi-cloud data security and compliance monitoring
CSPM tool for multi-cloud misconfiguration detection and compliance monitoring
CSPM tool for multi-cloud misconfiguration detection and compliance monitoring
AI-driven EASM platform for discovering and monitoring external-facing assets
AI-driven EASM platform for discovering and monitoring external-facing assets
IaC security scanner that detects misconfigurations in infrastructure code
IaC security scanner that detects misconfigurations in infrastructure code
Cloud security platform with CSPM, CIEM, vulnerability mgmt, and compliance
Cloud security platform with CSPM, CIEM, vulnerability mgmt, and compliance
Scans IaC templates for security misconfigurations before deployment
Scans IaC templates for security misconfigurations before deployment
Identity Security Posture Mgmt for hybrid envs with risk discovery & remediation
Identity Security Posture Mgmt for hybrid envs with risk discovery & remediation
IaC scanner for Terraform, CloudFormation, and Helm misconfigurations
IaC scanner for Terraform, CloudFormation, and Helm misconfigurations
IaC security scanner detecting vulnerabilities and misconfigurations in templates
IaC security scanner detecting vulnerabilities and misconfigurations in templates
IaC scanning tool for Terraform, CloudFormation, and Kubernetes configurations
IaC scanning tool for Terraform, CloudFormation, and Kubernetes configurations
AI-powered CSPM tool for AWS, GCP, and Azure misconfiguration detection
AI-powered CSPM tool for AWS, GCP, and Azure misconfiguration detection
Monitors and remediates Microsoft 365 email security misconfigurations
Monitors and remediates Microsoft 365 email security misconfigurations
Scans IaC files for misconfigurations before deployment to production.
Scans IaC files for misconfigurations before deployment to production.
IaC security scanning for Kubernetes, Terraform, CloudFormation, and ARM templates
IaC security scanning for Kubernetes, Terraform, CloudFormation, and ARM templates
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure