Loading...
Browse 17 security framework tools
Guide for scoping and planning SOC 2 compliance examinations
Guide for scoping and planning SOC 2 compliance examinations
Security program assessment service based on documentary evidence review
Security program assessment service based on documentary evidence review
Vendor-agnostic framework with 243 controls for secure cloud-based AI systems
Vendor-agnostic framework with 243 controls for secure cloud-based AI systems
Cybersecurity control framework for cloud computing with 197 control objectives
Cybersecurity control framework for cloud computing with 197 control objectives
Cloud security guidance document covering critical focus areas for cloud computing
Cloud security guidance document covering critical focus areas for cloud computing
HITRUST certification consulting services for healthcare organizations
HITRUST certification consulting services for healthcare organizations
NIST Cybersecurity Framework implementation and compliance consulting services
NIST Cybersecurity Framework implementation and compliance consulting services
NIST compliance resource hub with guides, templates, and checklists
NIST compliance resource hub with guides, templates, and checklists
Security policy and procedure development consulting services
Security policy and procedure development consulting services
Cyber security toolkit for SMBs with health checks, risk dashboard & templates
Cyber security toolkit for SMBs with health checks, risk dashboard & templates
Curated cybersecurity frameworks, templates & guides for security programs
Curated cybersecurity frameworks, templates & guides for security programs
An open-source incident response case management tool that provides visualization, threat intelligence lookups, and security framework mapping in a unified workspace.
An open-source incident response case management tool that provides visualization, threat intelligence lookups, and security framework mapping in a unified workspace.
A Microsoft Word template library for implementing industrial information security management systems with documentation for policy, risk management, business continuity, and incident handling.
A Microsoft Word template library for implementing industrial information security management systems with documentation for policy, risk management, business continuity, and incident handling.
A collection of structured incident response playbook battle cards providing prescriptive guidance and countermeasures for cybersecurity incident response operations.
A collection of structured incident response playbook battle cards providing prescriptive guidance and countermeasures for cybersecurity incident response operations.
An open source honeypot for NoSQL databases with support for Redis and additional features for detecting attackers and logging attack incidents.
An open source honeypot for NoSQL databases with support for Redis and additional features for detecting attackers and logging attack incidents.
A scalable python framework for security research and development teams.
A scalable python framework for security research and development teams.
A security framework for process isolation and sandboxing based on capability-based security principles.
A security framework for process isolation and sandboxing based on capability-based security principles.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance