Applied Crypto Hardening is a comprehensive guide covering best practices for securing various systems including webservers, SSH, mailservers, VPNs, PGP/GPG, instant messaging systems, databases, proxy solutions, and Kerberos.
FEATURES
SIMILAR TOOLS
Cybersecurity conference featuring talks on various hacking topics by industry experts.
Top 15 recommendations to protect your business from email-borne threats with Security Gateway.
A company that helps organizations create security-aware teams and produce bug-free software.
A platform for version control and collaboration in software development projects.
Utility that exposes TLS certificate expiry as Prometheus metrics.
CLI program for cybersecurity solution management with multiple functionalities and authentication methods.
Recorded talks from the Hardwear.io Conference 2018 covering various hardware security topics.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.