Explore 11 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
ScubaGear assesses Microsoft 365 tenant configurations against CISA Secure Configuration Baselines, using PowerShell and Open Policy Agent to compare settings and generate compliance reports.
Tool to disable vulnerable features in Windows and popular applications for enhanced security.
Community project for developing common guidelines and best practices for secure configurations.
Important security headers for Fastify with granular control over application routes.
A next-generation network scanner for identifying security configuration weaknesses in devices like routers, firewalls, and switches.
A tool to analyze and audit AWS environments for security issues and misconfigurations.
The official security guide for Red Hat Enterprise Linux 7, providing detailed information on securing the operating system.
A script and library for identifying risks in AWS IAM configuration
A quick and dirty dynamic redirect.rules generator for penetration testers and security professionals.
A command-line tool for managing and analyzing Microsoft Forefront TMG and UAG configurations.