search
Join or Log In

Consulting

Browse 2223 cybersecurity tools tagged with "Consulting"

Aura

Aura

United States flag

Threat Intelligence Platforms

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We believe that people should be able to live with the peace of mind that their identity, online accou

4.8(3)
Nixon Peabody LLP

Nixon Peabody LLP

United States flag

Security Operations

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security. Our Data Privacy and Cyber Security team provides

4.8(3)
Ibento Global

Ibento Global

India flag

Security Operations

Ibento is a global firm with a novel approach in organizing conferences, events, exhibitions, round-tables and awards. A platform that brings together industry game changers, seasoned entrepreneurs, n

4.8(3)
Cyphershield

Cyphershield

UN flag

Security Operations

Cypershield is a Security and Smart Contract audit company providing professional smart contract auditing services for varied Crypto projects. We collaborate with crypto projects and startups, big an

4.8(3)
CyberEdBoard

CyberEdBoard

United States flag

Security Operations

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management. Members are focused on information security, in

4.8(3)
Crypto Quantique

Crypto Quantique

United Kingdom flag

Industrial Control System Security

Crypto Quantique are building the most secure end-to-end IoT security platform. Our quantum driven cybersecurity solution enables vertically integrated, highly secure IoT deployments based on unforgea

4.8(3)
South East Cyber Resilience Centre (SECRC)

South East Cyber

United Kingdom flag

Governance Risk and Compliance Platforms

The South East Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime. Working with local Universities an

4.8(3)
Morgan Lewis

Morgan Lewis

United States flag

Security Operations

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity. Our cybersecurity, incident response and

4.8(3)
AtkinsRéalis

AtkinsRéalis

Canada flag

Compliance Consulting

AtkinsRealis is a market-leading design, engineering and project management consultancy operating in fields ranging from infrastructure, through energy and transport to cybersecurity. The digitalizat

4.8(3)
Assuria

Assuria

United Kingdom flag

Managed Security Service Providers

Assuria Cyber Security solutions provide protective monitoring of systems and user activity across the whole IT infrastructure. Assuria provides trusted software solutions and managed security servic

4.8(3)
Energia Ventures

Energia Ventures

Canada flag

Security Operations

Energia Ventures is a three-month intensive accelerator for entrepreneurs with an innovative business in the energy, smart grid, cleantech, and cybersecurity sectors. We provide funding, mentoring, an

4.8(3)
Dhound

Dhound

United Kingdom flag

Penetration Testing

Dhound is a cybersecurity company providing web application penetration testing, focused on manual approach and comprehensive delivery, helping IT companies be secure and compliant. We’ll find cracks

4.8(3)
Fasken

Fasken

Canada flag

Security Operations

Fasken is one of the largest business law firms in Canada and a recognized leader in privacy and cybersecurity law. Privacy and cybersecurity present unique opportunities and risks across your operat

4.8(3)
Elpha Secure

Elpha Secure

United States flag

Security Operations

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats. Cyber Assessment - We automatically analyze a client's security post

4.8(3)
BeyondTrust

BeyondTrust

United States flag

Security Operations

BeyondTrust is a worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised re

4.8(3)
Canary Technology Solutions (Canary IT)

Canary Technology Solutions

Australia flag

Cloud Security

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight. Tech is purely an enabler, that’

4.8(3)
Invicti Security

Invicti Security

United States flag

Security Operations

Invicti Security is an AppSec leader transforming the way web applications are secured. Dramatically reduce your risk of attacks. Get accurate, automated application security testing that scales like

4.8(3)
Accel

Accel

United States flag

Security Operations

Accel is a leading venture capital firm that invests in people and their companies from the earliest days through all phases of private company growth. Areas of focus include cybersecurity. The firm

4.8(3)
Blockchain Solutions

Blockchain Solutions

HK flag

Security Operations

Blockchain Solutions Limited is a technological One Stop Solution provider, for Blockchain technology. We specialize in delivering custom-made solution to different industry leaders. By leveraging di

4.8(3)
TES

TES

Singapore flag

Security Operations

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets. We understand the comm

4.8(3)
360 Total Security

360 Total Security

China flag

Threat Intelligence Platforms

360 company is the largest provider of Internet and mobile security products in China. Founded in 2005, the company is the pioneer of free Internet security. It launched 360 Total Security, 360 Mobil

4.8(3)
Detectify

Detectify

Sweden flag

Penetration Testing

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do. Starting from an idea of a group of security-in

4.8(3)
Adyta

Adyta

PT flag

Data Loss Prevention

ADYTA is a spin-off of the University of Porto providing specialized cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle informa

4.8(3)
Proofpoint

Proofpoint

United States flag

Brand Protection

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging. Proofpoint prot

4.8(3)
Applause

Applause

United States flag

Security Operations

Applause provides real-world (in-the-wild) software testing for functionality, usability, accessibility, load, localization and security. • The Applause Community is made up of 250,000+ experienced Q

4.8(3)
Avint

Avint

United States flag

Compliance Consulting

Avint delivers transformational cybersecurity solutions that help both commercial and government entities achieve mission success. Our vision is to harness the expertise of world class cyber and phys

4.8(3)
Coalition for Secure AI (CoSAI)

Coalition for Secure

United States flag

Security Operations

The Coalition for Secure AI (CoSAI) is an open ecosystem of AI and security experts from industry leading organizations dedicated to sharing best practices for secure AI deployment and collaborating o

4.8(3)
Bluink

Bluink

Canada flag

Security Operations

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store. Our mission is to empower people an

4.8(3)
Baffle

Baffle

United States flag

Data Loss Prevention

Baffle was founded to battle the increasing threats to enterprise assets in public and private clouds. Our team has strong backgrounds in encryption, security, cryptography, storage and enterprise inf

4.8(3)
Coalition

Coalition

United States flag

Security Operations

Coalition combines comprehensive insurance and proprietary security tools to help businesses manage and mitigate cyber risk. Backed by A+/A rated insurers Swiss Re Corporate Solutions and Argo Group,

4.8(3)
Nameshield Group

Nameshield Group

France flag

Brand Protection

4.8(3)
Linklaters LLP

Linklaters LLP

United Kingdom flag

Security Operations

Linklaters is an international law firm with a wide range of business and commercial practice areas including Information Management and Data Protection. We have one of the longest-standing privacy a

4.8(3)
Washington Technology Solutions (WaTech)

Washington Technology Solutions

United States flag

Security Operations

WaTech's state Office of Cybersecurity (OCS) team of cybersecurity experts, detect, block and respond to cyberattacks on state networks. The office helps prevent and mitigate threats before they can c

4.8(3)
UL Solutions

UL Solutions

United States flag

Industrial Control System Security

UL Solutions is a safety, security and compliance consulting and certification company. As a global safety science leader, UL Solutions helps companies to demonstrate safety, enhance sustainability, s

4.8(3)
Netlawgic Legal Services

Netlawgic Legal Services

India flag

Security Operations

4.8(3)
Backblaze

Backblaze

United States flag

Backup as a Service

The Backblaze Storage Cloud provides a foundation for businesses, developers, IT professionals, and individuals to build applications, host content, manage media, back up and archive data, and more.

4.8(3)
Latham & Watkins LLP

Latham & Watkins

United States flag

Security Operations

Latham & Watkins is an international law firm with leading transactional, litigation and regulatory practices. Practice areas include Data Privacy, Security and Cybercrime. Our highly ranked, interdi

4.8(3)
Bytes Technology Group

Bytes Technology Group

United Kingdom flag

Compliance Consulting

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services. Our highly-skilled t

4.8(3)
Private Machines

Private Machines

United States flag

Security Operations

Private Machines develops unique patent-pending technology protects cloud and data center workloads. ENFORCER SRX1 is the world’s first general-purpose secure server designed to NIST FIPS 140-2 Level

4.8(3)
Zurich

Zurich

Switzerland flag

Governance Risk and Compliance Platforms

Zurich is a leading multi-line insurer providing a wide range of property and casualty, and life insurance products and services in more than 210 countries and territories. Zurich Resilience Solution

4.8(3)
Eclypsium

Eclypsium

United States flag

Security Operations

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networking infrastruct

4.8(3)
Acumera

Acumera

United States flag

Managed Security Service Providers

Acumera is a leader in managed network security, visibility and automation services. Acumera fully secures single-site, multi-site, branch office and corporate office networks, point-of-sale (POS) sy

4.8(3)
Certes

Certes

United States flag

Data Loss Prevention

Certes is a pioneer in delivering cutting-edge security technology solutions, with a specific focus on Data Protection Risk Mitigation (DPRM). With over 20 years of expertise, our technology is deplo

4.8(3)
CyberSec Hub - The Kosciuszko Institute

CyberSec Hub -

Poland flag

Security Operations

4.8(3)
Securosys

Securosys

Switzerland flag

Data Loss Prevention

Securosys SA is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmiss

4.8(3)
Acoru

Acoru

Spain flag

Security Operations

Acoru redefines fraud detection by acting before fraud happens. Through continuous account analysis and classification, it identifies risk using pre-fraud signals across all channels, before any trans

4.8(3)
AAROH

AAROH

QA flag

Compliance Consulting

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & frauds arising due to misuse of digital & commu

4.8(3)
Fortify Experts

Fortify Experts

United States flag

Security Operations

Fortify Experts is a search and recruitment firm specializing in Cyber Security. From executives to strategists to security analysts, Fortify Experts can help pin point the right individuals that fit

4.8(3)
AusCERT

AusCERT

Australia flag

Security Operations

AusCERT is the premier Computer Emergency Response Team (CERT) in Australia and a leading CERT in the Asia/Pacific region. AusCERT operates within a worldwide network of information security experts

4.8(3)
HackCon Norway

HackCon Norway

Norway flag

Security Operations

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas. The purpose of HackCon is to give a clear view of

4.8(3)
TechInsurance

TechInsurance

United States flag

Security Operations

TechInsurance, an Insureon brand, is America's top technology insurance company offering a range of technology related products including Cyber Liability insurance. Our Cyber Liability coverage is de

4.8(3)
Trium Cyber

Trium Cyber

United States flag

Security Operations

Trium Cyber - Expert Cyber Underwriting and Claims Management. Based in the US and UK. Backed by Lloyd’s of London. Three distinct components tailored to support Trium’s Insureds, and more broadly, p

4.8(3)
WidePoint

WidePoint

United States flag

Security Operations

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions. Trusted Mobility Management converges at the intersection of WidePoint’s pioneering solutions: WidePoi

4.8(3)
AppOmni

AppOmni

United States flag

Cloud Security

AppOmni is the only SaaS CSPM solution that gives teams all the tools they need to be successful – from security posture management to monitoring and detection to continuous compliance. To properly s

4.8(3)
VMworld

VMworld

United States flag

Security Operations

VMworld is a global conference for virtualization and cloud computing, including associated security issues. Responding to today’s rapidly changing world with an innovative event on a globally divers

4.8(3)
Amiosec

Amiosec

United Kingdom flag

Compliance Consulting

Amiosec is a British cyber innovation business specialising in delivering simple-to-use solutions to the complex problems of the modern world. Working closely with government and defence organisation

4.8(3)
Armis

Armis

United States flag

Security Operations

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create. Armis Centrix, the cyber exposure management platform, is powe

4.8(3)
Women in CyberSecurity (WiCyS)

Women in CyberSecurity

United States flag

Security Operations

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field. WiCyS connects employers and recruiters with W

4.8(3)
AKS IT Services

AKS IT Services

India flag

Compliance Consulting

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider. AKS IT is a provider of wide range of IT Security Services including

4.8(3)
CSIR Information & Cybersecurity Research Centre

CSIR Information &

South Africa flag

Security Operations

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of cyber and information security solutions and approaches to securely protect people and systems

4.8(3)
BrandShield

BrandShield

United States flag

Brand Protection

BrandShield is an anti-counterfeiting, anti-phishing and online brand protection solution. BrandShield detects online threats and takes them down. We developed the most advanced AI and big-data based

4.8(3)
Zokyo

Zokyo

UA flag

Security Operations

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses. Zokyo provides access to skills ranging from blockchain engineering, blockchain security, token economics,

4.7(2)
Appvisory

Appvisory

Germany flag

Threat Intelligence Platforms

Appvisory by MediaTest Digital is the leading Mobile Application Management-Software in Europe and enables enterprises to work secure on smartphones and tablets. Appvisory scans applications through

4.7(2)
BB2 Technology Group

BB2 Technology Group

United States flag

Cloud Security

BB2 Technology Group provides managed IT services for businesses with reliable 24/7 support. We help companies across the US stay secure, productive, and connected. Our IT support and managed services

4.7(2)
African Cyber Security

African Cyber Security

BW flag

Compliance Consulting

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government. Our approach goes beyond audit, beyond penetration te

4.7(2)
Cado Security

Cado Security

United Kingdom flag

Digital Forensics and Incident Response

Cado Security is pushing digital forensics, and cyber incident response to the next level. Cado Response PlatformWe have built a software platform for responding to cyber-security incidents and perfo

4.7(2)
Zepo Intelligence

Zepo Intelligence

United States flag

Security Awareness Training

At Zepo Intelligence, we are redefining the future of cybersecurity through leadership in Social Intelligence. As a team of world-class experts in AI, threat detection, and organizational behavior, we

4.7(2)
Repello AI

Repello AI

United States flag

Security Operations

Repello - making AI safe to trust. We help you continuously red-team your GenAI applications against ever-evolving AI threat landscape. Repello ARTEMIS - Your AI faces new attacks every day. ARTEMIS

4.7(2)
Assetnote

Assetnote

Australia flag

Security Operations

The Assetnote platform enables organizations to effectively map and continuously monitor their external attack surface. Using advanced reconnaissance techniques across web and mobile channels paired w

4.7(2)
XFA

XFA

Belgium flag

Security Operations

XFA is a device security solution that seamlessly identifies every device used for work, increases user awareness, and verifies compliance with the security policy for each device during login — all w

4.7(2)
Allianz Commercial

Allianz Commercial

Germany flag

Security Operations

Allianz Commercial is the center of expertise of Allianz Group for insuring mid-sized businesses, large enterprises and specialist risks. Be it cyber-attacks, floating offshore wind parks or political

4.7(2)
TAG Cyber

TAG Cyber

United States flag

Compliance Consulting

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world. We provide a steady stream of original content,

4.7(2)
Cyrex

Cyrex

Ireland flag

Security Operations

Cyrex is a Web3 security and development company. Our mastery over decentralized applications, smart contracts and blockchain will keep you secure across Web3. While blockchain has proven to be a sec

4.7(2)
X80 Security

X80 Security

France flag

Security Operations

At X80, we’re reshaping the future of cybersecurity by taking an attacker’s perspective to protect your company and its ecosystem. Born from a simple question, “What’s in it for the attacker?” we focu

4.7(2)
Nexos.ai

Nexos.ai

LT flag

Security Operations

Nexos.ai is the unified AI platform that brings workspaces, AI model access, and governance together, so that your entire organization can turn AI potential into business results. Accelerate secure A

4.7(2)
Innovent Recycling

Innovent Recycling

United Kingdom flag

Security Operations

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK. Our recycling process exceeds legislation introduced in the WEEE Directive and

4.7(2)
8com

8com

Germany flag

Managed Security Service Providers

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries. Penetration TestingIT security checks from the attacker's point of view. Dur

4.7(2)
NetBlocks

NetBlocks

United Kingdom flag

Security Operations

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance. Independent and non-partisan, NetBlocks strives for an open and inclusive

4.7(2)
Absio

Absio

United States flag

Data Loss Prevention

Absio provides the technology you need to build data security directly into your software by default, and the design and development services you need to make it happen. Originally developed to secur

4.7(2)
Harrison Clarke

Harrison Clarke

United States flag

Security Operations

Harrison Clarke is a leading staffing and recruiting firm in the Cloud, Cybersecurity, Data & AI space.aHarrison Clarke is a trailblazer in the DevOps/SRE landscape. With a deep-rooted focus on foster

4.7(2)
Enterprise Ethereum Alliance (EEA)

Enterprise Ethereum Alliance

United States flag

Security Operations

4.7(2)
Biscom

Biscom

United States flag

Data Loss Prevention

Biscom offers expertise and solutions around secure file transfer, synchronization, file translation, and mobile devices, designed to deliver mission-critical reliability, streamline workflows and red

4.7(2)
Airia

Airia

United States flag

Security Operations

Airia is a leading Enterprise AI Orchestration Platform, empowering organizations to securely build, deploy, and manage AI solutions at scale. Our platform seamlessly integrates with existing systems

4.7(2)
Air Informatics

Air Informatics

United States flag

Compliance Consulting

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations. We also have experience in other industries with criti

4.7(2)
Guardz

Guardz

Israel flag

Managed Security Service Providers

Guardz are on a mission to provide accessible and effective cybersecurity. Now is the time for business owners and their IT managers to embrace cybersecurity that is designed for them. At Guardz, we

4.7(2)
Alpine Security

Alpine Security

United States flag

Penetration Testing

Alpine Security provides penetration testing, security assessments and cybersecurity training services. Alpine's goals are to help organizations reduce cybersecurity risk and empower cybersecurity pr

4.7(2)
ANS Group

ANS Group

United Kingdom flag

Managed Security Service Providers

ANS are a strong team of straight-talking tech and business experts. Our mission is to make digital transformation accessible to all. With our Security Centre of Excellence, you get access to our cer

4.7(2)
6cure

6cure

France flag

Threat Intelligence Platforms

6cure is an innovative company specializing in information systems security. Its experts are recognized for their R&D activities in the field of intrusion detection and cyberattack response systems.

4.7(2)
Robust Intelligence

Robust Intelligence

United States flag

Security Operations

Robust Intelligence enables enterprises to secure their AI transformation with an automated solution to protect against security and safety threats. Our platform includes an engine for detecting and

4.7(2)
Electus Recruitment Solutions

Electus Recruitment Solutions

United Kingdom flag

Security Operations

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors. Placing thousands of skilled candidates in permanent and contract jobs, our talented

4.7(2)
BUI

BUI

South Africa flag

Cloud Security

BUI is a global technology consultancy and Cloud Solution Provider specialising in cloud, security, and networking solutions for mid-market and enterprise-level business organisations across the world

4.7(2)
Blacksands

Blacksands

United States flag

Industrial Control System Security

Blacksands is a leader in network architecture, identity & services management, threat analysis, industrial IoT architecture, and invisible dynamic networks. Blacksands Secure Connection as a Service

4.7(2)
Zeta Sky

Zeta Sky

United States flag

Backup as a Service

Zeta Sky offers a full range of IT  and cyber-security services for your business. As an AWS consulting partner, our strength is in helping companies leverage Cloud based solutions to either augment t

4.7(2)
Binare

Binare

Finland flag

Industrial Control System Security

Binare empowers companies all over the world to improve their IIot/IoT/Embedded cybersecurity posture and digital privacy. Binaré offers both professional services and an automated platform to meet v

4.7(2)
CyberStream

CyberStream

United Kingdom flag

Security Operations

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider. Our business is dedicated to solving the increasing skills gap across the glob

4.7(2)
GulfTalent

GulfTalent

United Arab Emirates flag

Security Operations

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity. GulfTalent is the leading online recruitment

4.7(2)
Beauceron Security

Beauceron Security

Canada flag

Security Awareness Training

Beauceron's cloud-based platform gives employees a powerful personal cyber-risk coach empowering them to improve their cybersecurity practices and behaviours. We help organizations listen to their pe

4.7(2)
Yokogawa Electric

Yokogawa Electric

Japan flag

Industrial Control System Security

Yokogawa Electric Corp is an electrical engineering and software company providing measurement, control, and information technologies including industrial cyber security. Plant Security Consulting Se

4.7(2)
Amazon Web Services (AWS)

Amazon Web Services

United States flag

Managed Security Service Providers

Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally. Millions of customers—including the fastest

4.7(2)
CyberForce Global

CyberForce Global

United Kingdom flag

Security Operations

CyberForce Global are at the forefront of start-up technology recruitment in areas including cybersecurity, IT infrastructure, software, fintech, blockchain and more. CyberForce global are committed

4.7(2)
Cobwebs Technologies

Cobwebs Technologies

United States flag

Security Operations

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies. Neutralizing crime, terror, and cyber-attacks with toda

4.7(2)
Usenix

Usenix

United States flag

Security Operations

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing. Usenix conferences have become the essential meeting gr

4.7(2)
Aiuken Cybersecurity

Aiuken Cybersecurity

Spain flag

Compliance Consulting

Aiuken is an international IT Security company, focused on communications and IT technologies, specialised in Security and Cloud Services solutions with high added value. - Managed Security Services-

4.7(2)
BCS, The chartered Institute for IT

BCS, The chartered

United Kingdom flag

Security Operations

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget. We offer IT professionals a range of internationally rec

4.7(2)
Astute Technology Management

Astute Technology Management

United States flag

Backup as a Service

Astute Technology Management helps businesses take control of their technology and work with greater confidence. Our friendly engineers will help you stabilize and secure your entire network, from ser

4.7(2)
Cofrac

Cofrac

France flag

Security Operations

Cofrac is the national accreditation body for France, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration services.

4.7(2)
BIRD Cyber

BIRD Cyber

Israel flag

Industrial Control System Security

The U.S. Department of Homeland Security (DHS) and the Israel National Cyber Directorate (INCD) have established a new program to promote collaboration on cybersecurity and emerging technologies aimed

4.7(2)
CyberSource

CyberSource

United Kingdom flag

Security Operations

CyberSource was one of the pioneers in online payment and fraud management services for medium and large-sized merchants.Customers use our CyberSource and Authorize.Net brand solutions to process onli

4.7(2)
Cybergon

Cybergon

NG flag

Compliance Consulting

Cybergon is a trusted technical counter surveillance company in Nigeria, providing services to corporations and government agencies. We Detect, Deploy, Supply and train on cyber security, ethical hack

4.7(2)
Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative

UN flag

Security Operations

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies. Mission - To provide awareness of and advocacy for vendor-

4.7(2)
Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security

Australia flag

Security Operations

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services. AustCyber is an industry-led not-for-profit company responsible for delive

4.7(2)
Bangladesh Association of Software & Information Services (BASIS)

Bangladesh Association of

BD flag

Security Operations

Bangladesh Association of Software & Information Services (BASIS) is the national trade body for Software & IT Enabled Service industry of Bangladesh. Established in 1997, the association has been wor

4.7(2)
RPC

RPC

United Kingdom flag

Security Operations

RPC is a business law firm. Practice areas include technology and cyber risk. As a leading technology and cyber risk practice, we're acknowledged experts in defending technology companies. We specia

4.7(2)
Tokio Marine HCC

Tokio Marine HCC

United States flag

Security Operations

Tokio Marine HCC is a leading specialty insurance group with a Financial and Professional product line including Tech and Cyber.

4.7(2)
Wipe-Global

Wipe-Global

Germany flag

Security Operations

Wipe-Global is specialized in data erasure with an international established service partner network. Our goal is to enable all our service partners to supply our global customers locally with the be

4.7(2)
Liquid Technology

Liquid Technology

United States flag

Security Operations

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia. Liquid Technology’s specialists

4.7(2)
SC Media

SC Media

United States flag

Security Operations

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk manag

4.7(2)
British Assessment Bureau

British Assessment Bureau

United Kingdom flag

Security Operations

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001. Our UKAS accreditation is a key part of th

4.7(2)
Clari5

Clari5

India flag

Security Operations

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime. Harnessing the combined power of Automation, AI, Decisi

4.7(2)
CLUSIL

CLUSIL

LU flag

Security Operations

CLUSIL is an association for the information security industry in Luxembourg providing awareness, training, professional development and a forum for the exchange of information in information security

4.7(2)
Hackuity

Hackuity

France flag

Governance Risk and Compliance Platforms

Vulnerabilities in software development are still at the origin of the majority of security incidents. The volume of vulnerabilities has become so large that it is no longer manageable on a human scal

4.7(2)
Guardian Data Destruction

Guardian Data Destruction

United States flag

Security Operations

Guardian Data Destruction provides a comprehensive suite of onsite e-data destruction services, ranging from hard drive shredding, NSA degaussing and DOD erasure on desktop and data center equipment t

4.7(2)
Alacrinet

Alacrinet

United States flag

Compliance Consulting

Alacrinet is an IT and cyber security consultancy. From penetration testing to fully managed MSSP, our team is focused on knowing the latest threats, preventing vulnerabilities, and providing value.

4.7(2)
ITButler e-Services

ITButler e-Services

Saudi Arabia flag

Governance Risk and Compliance Platforms

4.7(2)
Abusix

Abusix

Germany flag

Threat Intelligence Platforms

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention. Our mission is to help ISPs & Internet companies solve the rapidly growing problem of outgoing spam and

4.7(2)
Ciena

Ciena

United States flag

Data Loss Prevention

Ciena is a global leader in optical and routing systems, services, and automation software. We build the world’s most adaptive networks to address ever-increasing digital demands for richer, more conn

4.7(2)
WeVerify

WeVerify

UN flag

Security Operations

WeVerify’s aim is to address the advanced content verification challenges through a participatory verification approach, open source algorithms, low-overhead human-in-the-loop machine learning and int

4.7(2)
UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber

United Kingdom flag

Security Operations

In the aftermath of the global pandemic, the 3rd UKsec Cyber Security Summit takes place online in a world in which every organisation has been forced to shift instantaneously to the digital realm and

4.7(2)
1Password

1Password

Canada flag

Security Operations

1Password combines industry-leading security with award-winning design to bring private, secure, and user-friendly password management to everyone. Millions of customers and more than 80,000 business

4.7(2)
Aberrant

Aberrant

United States flag

Governance Risk and Compliance Platforms

A radically new approach to managing information security.  Aberrant is the single pane of glass through which a security program can be viewed. Like an ERP, but for securityAberrant’s Information Se

4.7(2)
Acora

Acora

United Kingdom flag

Managed Security Service Providers

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy. Our service

4.7(2)
Bittnet Training

Bittnet Training

RO flag

Security Awareness Training

Bittnet Training is the leader in the IT Training market in Romania. Bittnet Training experts design dedicated learning programs to develop the IT skills of  IT professionals as well as for those who

4.7(2)
Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center

AZ flag

Security Awareness Training

Dive into an immersive learning environment, train with the latest cyber technologies in the market and leave as a cyber specialist.

4.7(2)
Seigur

Seigur

United Kingdom flag

Compliance Consulting

Seigur is an IT consultancy business providing flexible legal and cyber security services for IT and data privacy programmes. Privacy and Cyber Security can be like two tectonic plates moving indepen

4.7(2)
STMicroelectronics

STMicroelectronics

Switzerland flag

Industrial Control System Security

ST is a global semiconductor leader delivering intelligent and energy-efficient products and solutions that power the electronics at the heart of everyday life. We help our customers make these device

4.7(2)
TESTiLABS

TESTiLABS

Finland flag

Security Operations

TESTiLABS provides test and certification services for multiple industries including wireless, healthcare, telecommunications and automotive. TESTiLABS simplifies and streamlines the journey to EN 18

4.7(2)
XTN Cognitive Security

XTN Cognitive Security

Italy flag

Threat Intelligence Platforms

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions. Thanks to constant research and study of cybercrime attempts, XTN designs innovat

4.7(2)
Travelers

Travelers

United States flag

Security Operations

Travelers is a leading writer of US commercial property casualty insurance and one of the world’s largest global insurers for cyber insurance. Travelers CyberRisk is designed to protect businesses or

4.7(2)
ACCOTEQ

ACCOTEQ

United States flag

Managed Security Service Providers

ACCOTEQ is a leading provider of managed IT services, cloud solutions, cybersecurity, and IT consulting for small and mid-sized businesses across California. Headquartered in San Gabriel and serving

4.7(2)
Haleum AI

Haleum AI

United States flag

Threat Intelligence Platforms

The Future of Human Risk Intelligence. Behavioral analytics that understand your business. Respond faster with our deep research agents for security data. Haleum monitors cloud workloads, SaaS applic

4.7(2)
BrandProtections.Online

BrandProtections.Online

India flag

Brand Protection

BrandProtections.online offer end-to-end customer support solutions which help brand owners and businesses to keep an eye on the increasing attempt of Intellectual Property violations ranging from tra

4.7(2)
Bluefin Payment Systems

Bluefin Payment Systems

United States flag

Data Loss Prevention

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data.

4.7(2)
7Safe

7Safe

United Kingdom flag

Security Awareness Training

7Safe has been delivering hands-on digital security training courses since 2001 and we currently have a portfolio of 22 university and industry-accredited courses delivered from our cyber development

4.7(2)
Ambersail

Ambersail

United Kingdom flag

Governance Risk and Compliance Platforms

Ambersail provide Penetration Testing and Cyber Security Compliance services. Penetration Testing - Make your networks and applications secure. Best value penetration testing with results you can und

4.7(2)
Intel

Intel

United States flag

Security Operations

Intel products are engineered with built-in security technologies to help protect potential attack surfaces. Because these technologies are rooted in silicon, they can operate without being affected b

4.7(2)
Avancer Corporation

Avancer Corporation

United States flag

Compliance Consulting

4.7(2)
Arsenal Insurance Company

Arsenal Insurance Company

Russia flag

Security Operations

Arsenal is an insurance provider based in Moscow, Russia. Services offered include Cyber Risk insurance. Arsenal offers a wide range of unique insurance programs covering cyber risks, taking into acc

4.7(2)
Exeon Analytics

Exeon Analytics

Switzerland flag

Threat Intelligence Platforms

Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks. Our flagship product ExeonTrace uses machine learning and clusterin

4.7(2)
Incopro

Incopro

United Kingdom flag

Brand Protection

Incopro is an online IP and brand protection software provider that arms brand owners with actionable intelligence to combat online and offline intellectual property and copyright infringements. We b

4.7(2)
A-SIT Secure Information Technology Center

A-SIT Secure Information

Austria flag

Security Operations

Activities include technical evaluations, monitoring existing and emerging technologies, top level support for public bodies and promoting awareness of IT security. To maintain its expertise A-SIT ca

4.7(2)
Archipelo

Archipelo

United States flag

Security Operations

At Archipelo, we empower organizations with Developer Security - to increase software security and compliance throughout the development lifecycle. Our vision is to lead the way in securing the world

4.7(2)
Eurotech

Eurotech

Italy flag

Industrial Control System Security

Eurotech provides Edge Computers and IoT solutions. We help to connect your assets and make them smarter through secure and agnostic hardware and software technologies Certified CybersecurityWe provi

4.7(2)
Alpha Echo

Alpha Echo

Australia flag

Compliance Consulting

Specialising in security advice and enterprise-wide Cyberworthiness, Alpha Echo helps Australia deliver on cyber outcomes at a military grade level. We deliver realistic, comprehensive, tailored, thr

4.7(2)
UK Cyber Security Forum

UK Cyber Security

United Kingdom flag

Security Operations

UK Cyber Security Forum is a community interest group for cyber security companies in the UK. The forum helps to coordinate the setting up of local/regional cyber security industry clusters around th

4.7(2)
Clusit

Clusit

Italy flag

Security Operations

Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security, including awareness among IT specialists and the general

4.7(2)
Expeditions

Expeditions

Poland flag

Security Operations

Founded in 2021 by a team of early researchers and pioneers in the future of warfare, Expeditions invests in leading startups at the intersection of security and deep tech. It is a champion for innova

4.7(2)
CloudScale365

CloudScale365

United States flag

Backup as a Service

CloudScale365 offers state-of-the-art managed IT services and cloud, hosting, security, and business continuity solutions. As an extension of your IT team, we work hand-in-hand to plan, migrate, depl

4.7(2)
Cybernetic Global Intelligence (CGI)

Cybernetic Global Intelligence

Australia flag

Compliance Consulting

4.7(2)
HaystackID

HaystackID

United States flag

Digital Forensics and Incident Response

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help corporations and law firms find, understand and learn from data when facing complex, d

4.7(2)
Transpere

Transpere

United States flag

Security Operations

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services. We recognize the potential threat of stolen data and aim to protect our customers agai

4.7(2)
ACI Worldwide

ACI Worldwide

United States flag

Security Operations

ACI Worldwide powers electronic payments for more than 5,000 organizations around the world. More than 1,000 of the largest financial institutions and intermediaries as well as thousands of leading me

4.7(2)
Axiado

Axiado

United States flag

Security Operations

Axiado Corporation is a security processor company redefining hardware root of trust with hardware-based security technologies, including per-system AI. There are 150,000 security holes in current sy

4.7(2)
Roberts & Obradovic Law

Roberts & Obradovic

Canada flag

Security Operations

Roberts & Obradovic Law Group is a corporate, privacy, employment and litigation law firm. Our team of lawyers provide expert legal advice on complex legal matters for Canadian and international clien

4.7(2)
Ampliphae

Ampliphae

United Kingdom flag

Cloud Security

4.7(2)
BluBracket

BluBracket

United States flag

Security Operations

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night. BluBracket is the first enterprise secu

4.7(2)
Zynet Pty Ltd

Zynet Pty Ltd

Australia flag

Compliance Consulting

Zynet is an Australian cyber security and managed IT services provider based in Melbourne, supporting organisations with secure, reliable and well governed technology environments. With more than 25 y

4.7(2)
Calamu

Calamu

United States flag

Data Loss Prevention

Calamu is a software-defined storage security and resiliency platform that keeps your data secure and accessible wherever you choose to store it. Calamu Protect fragments data across multiple separat

4.7(2)
Validia

Validia

United States flag

Security Operations

Validia is a deepfake cybersecurity service that provides proactive and reactive defense to the deepfake threat enterprises increasingly face with the rapid growth of generative artificial intelligenc

4.7(2)
Tulpa AI

Tulpa AI

United Kingdom flag

Penetration Testing

Tulpa develops safe AI assistants (co-pilots) to support and enhance human performance in high-stakes, mission-critical decision-making environments. We enable high-performance, high-value, scalable w

4.7(2)
AI Security Institute (AISI)

AI Security Institute

United Kingdom flag

Security Operations

The AI Security Institute’s mission is to minimise surprise to the UK and humanity from rapid and unexpected advances in AI. AISI will advance the world’s knowledge of AI security by carefully examin

4.7(2)
AKS iQ

AKS iQ

PK flag

Governance Risk and Compliance Platforms

AKS iQ leads the RegTech sector with AI, automating regulatory compliance in the banking industry and ensuring paperless TBML and CFT adherence in finance. AKS iQ is a leading RegTech company special

4.7(2)
AKIPS

AKIPS

Australia flag

Security Operations

AKIPS develops the world's most scalable network and infrastructuremonitoring software, delivered as a turn-key software appliance. AKIPS Network Monitoring Software provides unmatched features, scal

4.7(2)
eShard

eShard

France flag

Penetration Testing

At eShard, we help industrial leaders and government agencies take control of chip security testing and binary analysis. Our platform provides a dedicated testing environment where teams can analyze

4.7(2)
Applaudo

Applaudo

SV flag

Compliance Consulting

Applaudo is a leading software development and technology company based in El Salvador. Applaudo specializes in helping the world’s most admired brands optimize their IT solutions, reduce delivery cos

4.7(2)
ZoobeTek

ZoobeTek

Taiwan flag

Data Loss Prevention

ZoobeTek are a company focused on preventing leaks related to the security of business information3. The members of our core team have been working at the Industrial Technology Research Institute sin

4.7(2)
Help Net Security

Help Net Security

HR flag

Security Operations

Help Net Security has been a prime resource for information security news and insight since 1998. We don’t cater just to people searching for breaking news. We explore a wide range of content and tac

4.7(2)
Airbus Cybersecurity

Airbus Cybersecurity

France flag

Compliance Consulting

We provide a global cyber defence approach that dynamically aims to protect, detect and respond to cyber threats with a portfolio including managed security services, industrial control system offerin

4.7(2)
Aeris

Aeris

United States flag

Industrial Control System Security

Aeris, the Intelligent IoT Network and Platform Provider Aeris is a leading global IoT solutions provider with a proven history of helping companies unlock the value of IoT. With Aeris cellular IoT pl

4.7(2)
Analog Devices Inc (ADI)

Analog Devices Inc

United States flag

Industrial Control System Security

Analog Devices is a leading high-performance analog technology company dedicated to solving the toughest engineering challenges. ADI’s cyber security defenses begin at the device level, where the dat

4.7(2)
Burges Salmon

Burges Salmon

United Kingdom flag

Security Operations

Burges Salmon is an independent UK law firm with a clear purpose to deliver the highest quality service and best experience, for our people and for you. We take time to understand what is required and

4.7(2)
Curatrix Technologies

Curatrix Technologies

United Kingdom flag

Backup as a Service

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015. Curatrix Technologies are strong advocates of Cyber

4.7(2)
Eleviant Tech (CTG Group)

Eleviant Tech (CTG

United States flag

Managed Security Service Providers

Eleviant Tech (CTG Group) is a USA based digital transformation company with expertise in Mobile, Cloud, Web, IoT, AR, RPA, Cyberseurity and AI Technologies, catering to industries like Manufacturing,

4.7(2)
Attura

Attura

Australia flag

Cloud Security

Atturra is one of Australia's leading advisory and IT solutions providers, focused on providing end-to-end transformation services to its clients. Managed IT SecurityGet a holistic approach to your I

4.7(2)
5S Technologies

5S Technologies

United States flag

Managed Security Service Providers

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas. IT SecureIdentify and protect against threats with complete managed security services fro

4.7(2)
AirEye

AirEye

Israel flag

Threat Intelligence Platforms

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace. AirEye Dome is the only soluti

4.7(2)
Verity Systems

Verity Systems

United States flag

Security Operations

VS Security Products has its roots in the defence and security industry. We design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all type

4.7(2)
Applicure Technologies

Applicure Technologies

Israel flag

Security Operations

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

4.7(2)
LogicalTrust

LogicalTrust

Poland flag

Penetration Testing

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security. Our offer covers security tests o

4.7(2)
Adsigo

Adsigo

Germany flag

Compliance Consulting

Adsigo AG is your reliable and professional partner for all topics concerning PCI certification, compliance and information security. Trust in our more than 15 years of audit experience, internationa

4.7(2)
Department of Justice & Equality - Cybercrime Division - Ireland

Department of Justice

Ireland flag

Security Operations

The Cybercrime division is responsible for developing policy in relation to the criminal use made of the internet and information technology generally, and coordinating a range of different cyber init

4.7(2)
Workz Group

Workz Group

United Arab Emirates flag

Industrial Control System Security

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices. Since our start

4.7(2)
Department of Justice - Office of Cybercrime (DOJ-OOC) - Philippines

Department of Justice

PH flag

Security Operations

The Office of Cybercrime (OOC) within the Philippines Department of Justice (DOJ) is the Central Authority in all matters relating to international mutual assistance and extradition for cybercrime and

4.7(2)
The CyberWire

The CyberWire

United States flag

Security Operations

The CyberWire gets people up to speed on cyber quickly and keeps them a step ahead in a continually changing industry. Situational awareness, continuing education, and professional development are th

4.7(2)
ACSG Corp

ACSG Corp

India flag

Security Operations

ACSG Corp is a Critical Infrastructure Protection Company with a multi-disciplinary focus on building analytics software for various industry sectors. Our broad portfolio of projects has helped us acc

4.7(2)
Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for

Argentina flag

Security Operations

The Critical Infrastructures for Information and Cybersecurity ((ICIC) program is aimed at addressing the demand for cybersecurity to the National Public Sector, interjurisdictional organizations and

4.7(2)
Debevoise & Plimpton

Debevoise & Plimpton

United States flag

Compliance Consulting

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security. The Debevoise Data Strategy & Security (DSS) practice is global and interdisc

4.7(2)
Zadara Storage

Zadara Storage

United States flag

Backup as a Service

4.7(2)
Halborn

Halborn

United States flag

Penetration Testing

Award-winning ethical blockchain hackers to secure your stack end-to-end. Far beyond smart contracts. Because smart contract audits are never enough to ensure your company is safe. Halborn brings awa

4.7(2)
Armilla AI

Armilla AI

Canada flag

Security Operations

We help our customers identify, protect against, and respond to AI risks. Through our world class technology we validate, govern and insure models - protecting the world from the downsides of AI. Usi

4.7(2)
Code Dx

Code Dx

United States flag

Security Operations

Code Dx is a software application vulnerability correlation and management system that consolidates and normalizes software vulnerabilities detected by multiple static application security testing (SA

4.7(2)
Amtivo Ireland

Amtivo Ireland

Ireland flag

Security Operations

Amtivo Ireland (formerly Certification Europe and EQA) offers a range of certifications and related services. Amtivo Group has acquired over a dozen certification bodies globally, and this rebrand is

4.7(2)
COcyber

COcyber

Belgium flag

Security Operations

The Coordination between the Cybersecurity Civilian and Defense Spheres (COcyber) project is an ambitious two-year initiative designed to enhance the exchange, coordination, and collaboration between

4.7(2)
PrivacySavvy

PrivacySavvy

UN flag

Security Operations

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

4.7(2)
Agile Underwriting

Agile Underwriting

Australia flag

Security Operations

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines. Our Cyber insurance is specifically

4.7(2)
Alarum Technologies

Alarum Technologies

Israel flag

Data Loss Prevention

Alarum Technologies (formerly Safe-T) is a  global provider of cyber security and privacy solutions to consumers and enterprises. Alarum's mission is to enable a secure network environment and protec

4.7(2)
Fortress Group

Fortress Group

Netherlands flag

Security Operations

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management. 1. IT Security: IT Security Managers, Ethical Hackers,

4.7(2)
Alea Consulting

Alea Consulting

India flag

Compliance Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns. Alea provides cyber risk consulting to audit vulne

4.7(2)
Apex

Apex

Israel flag

Security Operations

We are building Apex to empower you to securely drive your organisation towards AI adoption. We aspire to make the AI revolution run faster, securely, for the benefit of all. We are purposely built f

4.7(2)
Corona IT Solutions

Corona IT Solutions

United Kingdom flag

Backup as a Service

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.We believe that the best computer net

4.7(2)
Pillar Security

Pillar Security

Israel flag

Security Operations

Pillar Security are building the unified AI security platform to identify, assess, and mitigate security risks across your entire AI lifecycle. Seamlessly secure the entire AI lifecycle, from initial

4.7(2)
Alcyconie

Alcyconie

France flag

Security Operations

Alcyconie is a French company specializing in the management and communication of cyber and digital-origin crises. Alcyconie was born from the desire to provide a concrete and pragmatic response to o

4.7(2)
Axient

Axient

United States flag

Security Operations

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies. We partner with our cust

4.7(2)
Acreto

Acreto

United States flag

Security Operations

Acreto is an end-to-end security infrastructure that protects all your technologies with a single, simple cloud service. It goes beyond secure application access to provide a complete connectivity and

4.7(2)
ArmorX AI

ArmorX AI

United States flag

Data Loss Prevention

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers. The company's e

4.7(2)
Acceptto

Acceptto

United States flag

Security Operations

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.  Our passwordless authentication solution protects enterprise customers, workforce, and partn

4.7(2)
Intertek Group

Intertek Group

United Kingdom flag

Industrial Control System Security

Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cyber security testing and certification. We work to protect and secure sensitive data and the sa

4.7(2)
Wooxo

Wooxo

France flag

Backup as a Service

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes. Our solutions include local and cloud backup and disaster recovery. Wooxo offers busi

4.7(2)
AdaptiveMobile Security

AdaptiveMobile Security

Ireland flag

Security Operations

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide. AdaptiveMobile Security provides the industry’s most comprehensive mobile t

4.7(2)
Advantio

Advantio

Ireland flag

Governance Risk and Compliance Platforms

Advantio offers a unique combination of technologies and managed, advisory and testing services to increase your cyber resilience. We ensure you will achieve, keep and demonstrate compliance against t

4.7(2)
Acclaim Technical Services (ATS)

Acclaim Technical Services

United States flag

Governance Risk and Compliance Platforms

ATS provide operational products, services and solutions to the defense and intelligence communities for all types of critical mission needs. Our engineering and development expertise spans every pha

4.7(2)
Alset Technologies

Alset Technologies

United States flag

Governance Risk and Compliance Platforms

Alset Technologies provides a comprehensive solution to DISA STIG (Security Technical Implementation Guide) compliance - DASH.

4.7(2)
Amadeus Capital Partners

Amadeus Capital Partners

United Kingdom flag

Security Operations

Amadeus Capital Partners offers over 20 years’ experience in technology investment. We support innovation and entrepreneurship through accelerators, industry associations, government expert groups, m

4.7(2)
Honeywell Process Solutions (HPS)

Honeywell Process Solutions

United States flag

Industrial Control System Security

Honeywell's Industrial Cyber Security Solutions help plants and critical infrastructure sectors defend the availability, reliability and safety of their industrial control systems (ICS) and plant oper

4.7(2)
Exacom

Exacom

United States flag

Security Operations

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications. With thousands of recorders

4.7(2)
CyberForce Program - US Department of Energy

CyberForce Program -

United States flag

Security Awareness Training

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector through hands-on c

4.7(2)
FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical

United States flag

Security Operations

4.7(2)
Cybersecurity & Infrastructure Security Agency (CISA) - USA

Cybersecurity & Infrastructure

United States flag

Security Operations

CISA leads the national effort to defend critical infrastructure against the threats of today, while working with partners across all levels of government and in the private sector to secure against t

4.7(2)
BrainChip

BrainChip

United States flag

Security Operations

BrainChip is the leading provider of neuromorphic computing solutions, a type of artificial intelligence that is inspired by the biology of the human neuron - spiking neural networks. Neuromorphic co

4.7(2)
Cognyte

Cognyte

Israel flag

Threat Intelligence Platforms

Cognyte is a global leader in investigative analytics software that empowers a variety of government and other organizations with Actionable Intelligence for a Safer World. Hundreds of customers rely

4.5(3)
Asigra

Asigra

Canada flag

Backup as a Service

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup. Founded in 1986 and headquartered in Toronto, Canada, Asigra has always had a vision to cre

4.5(3)
Advent One

Advent One

Australia flag

Compliance Consulting

Advent One are recognised for solving intricate dilemmas, not only making technology work but building foundations that customers can grow upon in an effective and secure way. Advent One is helping c

4.5(3)
Cysec Resource Co (CRC)

Cysec Resource Co

United Kingdom flag

Security Operations

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector. Access to Expertise - We offer access

4.5(3)
EmberOT

EmberOT

United States flag

Industrial Control System Security

EmberOT’s pure software solution provides continuous insight into status, vulnerabilities, and threats, enabling teams across the organization to more effectively see, know, and take action to defend

4.5(3)
Chainlink

Chainlink

United States flag

Security Operations

Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology. Ch

4.5(3)
Borneo

Borneo

United States flag

Data Loss Prevention

Borneo is a Data Security Platform that helps organizations discover, classify, and remediate data and AI governance risks at scale while maintaining continuous compliance. Founded by security expert

4.5(3)
Acumen

Acumen

United Kingdom flag

Managed Security Service Providers

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most. Acumen delivers cyber security that goes beyond security software. Our service

4.5(3)
Astrix Security

Astrix Security

Israel flag

Security Operations

Astrix Security is the first access management solution for third-party app integrations. The rapid increase of app integrations and automation processes has reshaped the modern IT environment into a

4.5(3)
Acumin Recruitment

Acumin Recruitment

United Kingdom flag

Security Operations

Acumin is an internationally established Cyber Security recruitment specialist. Operating since 1998, Acumin consulting has been working exclusively in the cyber security landscape with the world’s le

4.5(3)
Arcanna.ai

Arcanna.ai

United States flag

Security Operations

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats. It also provides

4.5(3)
Irish National Accreditation Board (INAB)

Irish National Accreditation

Ireland flag

Security Operations

The Irish National Accreditation Board (INAB) is the national accreditation body for Ireland, responsible for assessing the competence and capability of organisations that provide certification, testi

4.5(3)
CUBE3 AI

CUBE3 AI

United States flag

Security Operations

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks. At CUBE3.AI, our team consis

4.5(3)
Advent IM

Advent IM

United Kingdom flag

Compliance Consulting

Advent IM is one of the UK’s leading independent cyber security specialists, with a unique approach to providing holistic security management solutions. We work with clients nationwide across both th

4.5(3)
Hunton Andrews Kurth

Hunton Andrews Kurth

United States flag

Security Operations

Hunton Andrews Kurth LLP serves clients across a broad range of complex transactional, litigation and regulatory matters. Practice areas include Privacy and Cybersecurity. Hunton Andrews Kurth LLP’s

4.5(3)
CBIT Digital Forensics Services (CDFS)

CBIT Digital Forensics

Australia flag

Digital Forensics and Incident Response

4.5(3)
ZecOps

ZecOps

United States flag

Threat Intelligence Platforms

ZecOps is a cybersecurity automation company headquartered in San Francisco with offices in Tel Aviv and London. ZecOps learns from attackers' mistakes with the goal of discovering the course of acti

4.5(3)
AiCULUS

AiCULUS

Singapore flag

Threat Intelligence Platforms

AiCULUS is a global technology company that specializes in API security and Risk Management products. Our API security solution Harambi™ is artificial intelligence driven and autonomously builds beha

4.5(3)
Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection

United States flag

Security Operations

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments. With the disappearance of the netw

4.5(3)
Axiomtek

Axiomtek

Taiwan flag

Industrial Control System Security

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

4.5(3)
Harbottle & Lewis

Harbottle & Lewis

United Kingdom flag

Security Operations

Harbottle & Lewis is a leading UK-based law firm focused on the Private Client and Technology, Media and Entertainment sectors. Our clients range from start-ups to multinational companies, from house

4.5(3)
Across Verticals

Across Verticals

MY flag

Compliance Consulting

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices. Our core

4.5(3)
Asia Data Destruction (ADD)

Asia Data Destruction

TH flag

Security Operations

ADD is a leader in secure, sustainable and responsible management of retired IT Asset Disposal (ITAD). We are currently operating in more than 35 countries and servicing around 500 clients. Our data

4.5(3)
Turkish Accreditation Agency (TURKAK)

Turkish Accreditation Agency

Turkey flag

Security Operations

TURKAK is the national accreditation body for Turkey, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration services.

4.5(3)
ANSecurity

ANSecurity

United Kingdom flag

Backup as a Service

ANSecurity is a specialist in securing networks and protecting data that helps some of the largest organisations in the UK and global brands to reduce risk and simplify operational management. ANSecu

4.5(3)
C11 Cyber Security & Digital Innovation Centre

C11 Cyber Security

United Kingdom flag

Security Operations

4.5(3)
Zentera Systems

Zentera Systems

United States flag

Cloud Security

4.5(3)
Condition Zebra

Condition Zebra

MY flag

Digital Forensics and Incident Response

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification provider in the field of cybersecurity. Condition Zebra provide Information Security and Risk Manage

4.5(3)
ARGOS Cloud Security

ARGOS Cloud Security

Australia flag

Cloud Security

ARGOS aims to simplify and strengthen cloud security, by creating a visual map of security vulnerabilities, to your priceless information stored in any cloud provider environment. While you struggle

4.5(3)
Association of anti Virus Asia Researchers (AVAR)

Association of anti

India flag

Security Operations

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia. AVAR is an independent and non-profit

4.5(3)
Zyston

Zyston

United States flag

Managed Security Service Providers

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most. Zyston’s approach is different. We are busin

4.5(3)
Synechron

Synechron

United States flag

Cloud Security

Synechron is a leading global digital consulting firm, providing innovative technology solutions for business. Our expertise in AI, Consulting, Data, Digital, Cloud & DevOps and Software Engineering,

4.5(3)
Eviden

Eviden

France flag

Compliance Consulting

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation. A next-gen

4.5(3)
Darkstrike / Qeros

Darkstrike / Qeros

United States flag

Data Loss Prevention

Protect against quantum & ransomware threats. Proactive data security with Q™ — the world’s most advanced unconditionally secure data platform to protect and empower your data. Complete your defense

4.5(3)
Greenberg Traurig (GT)

Greenberg Traurig (GT)

United States flag

Security Operations

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East. Greenberg Traurig's Data, Privacy & Cybersecurity

4.5(3)
Australian Cyber Security Centre (ACSC)

Australian Cyber Security

Australia flag

Security Operations

The Australian Cyber Security Centre (ACSC) brings cyber security capabilities from across the Australian Government together into a single location. It is the hub for private and public sector collab

4.5(3)
XRATOR

XRATOR

France flag

Governance Risk and Compliance Platforms

XRATOR combines advanced threat exposure management with practical business sense, delivering enterprise-grade cybersecurity that growing organizations can actually use. Act on your cyber exposure be

4.5(3)
Axis Capital

Axis Capital

Belgium flag

Security Operations

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe. Our AXIS TechPlus policy addresses liability exposure

4.5(3)
Zix

Zix

United States flag

Data Loss Prevention

Zix offers secure email encryption, threat protection, archiving, DLP and BYOD security for hospitals, financial services, government, and more. ZixEncrypt removes the hassle of encrypted email and g

4.5(3)
Airiam

Airiam

United States flag

Backup as a Service

Airiam provides cybersecurity, managed IT, consulting, incident response, and digital transformation services so you can focus on what matters most. The team at Airiam has a huge skill set and years

4.5(3)
H3Secure

H3Secure

United Arab Emirates flag

Compliance Consulting

H3 Secure, based in Dubai’s DMCC, is an Information Technology  Security Solutions company with special focus on Secure Data Erasure Solutions, Mobile Device Diagnostics as well as providing Informati

4.5(3)
xMatters

xMatters

United States flag

Security Operations

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems. Organizations around the world rely on x

4.5(3)
AFINE

AFINE

Poland flag

Penetration Testing

AFINE is a trusted advisor in the field of cybersecurity and pentesting. We have been operating since 2015. Our team consists of carefully selected experts in the field of software, hardware, cryptogr

4.5(3)
SpoofGuard

SpoofGuard

Switzerland flag

Brand Protection

Spoofguard shields organizations from online scams, automating the entire process from domain monitoring to takedown enforcement. Domain monitoring is crucial in protecting brands against threats lik

4.5(3)
Blumira

Blumira

United States flag

Cloud Security

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively. B

4.5(3)
BlueID

BlueID

Germany flag

Industrial Control System Security

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches. We created BlueID because we realise the importance

4.5(3)
3Lines Venture Capital

3Lines Venture Capital

United States flag

Security Operations

3Lines Venture Capital invests in exceptional founders and startups working on broad disruptive themes of Future of Work, AI enabled enterprises, and Industry 4.0. The confluence and exponential growt

4.5(3)
Zimperium

Zimperium

United States flag

Security Operations

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks. Zimperium is the first and only company to provide a complete mobile security s

4.5(3)
ASU Online - Information Technology Program

ASU Online -

United States flag

Security Awareness Training

With ASU Online, the information technology graduate can design and create effective solutions to today’s knowledge-based problems. Graduates have the ability to: create network architectures within a

4.5(3)
Agesic

Agesic

UY flag

Security Operations

Agesic is an institution that leads the development of the Digital Government and the Information and Knowledge Society in Uruguay. We are one of the institutions responsible for the development of t

4.5(3)
Allure Security

Allure Security

United States flag

Brand Protection

Allure Security online brand protection-as-a-service uses AI to automate the examination of more of the online world - scanning millions of assets daily including domains, social media posts, and mobi

4.5(3)
Aegis9

Aegis9

Australia flag

Compliance Consulting

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs. Aegis9 secu

4.5(3)
Auraya

Auraya

Australia flag

Security Operations

Auraya develops its next generation voice biometric AI to deliver easy-to-use and highly secure speaker recognition and fraud detection capabilities. Powered by Auraya’s ArmorVox AI, EVA is a voice bi

4.5(3)
CodeLock

CodeLock

United States flag

Security Operations

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics. Codeloc

4.5(3)
Antiy Labs

Antiy Labs

China flag

Threat Intelligence Platforms

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

4.5(3)
Analygence

Analygence

United States flag

Compliance Consulting

ANALYGENCE is the trusted partner for mission support, cyber solutions, and management services. Our services include a broad range of analytics, strategy development and implementation, and mission o

4.5(3)
Apura Cybersecurity Intelligence

Apura Cybersecurity Intelligence

Brazil flag

Compliance Consulting

Apura is a Brazilian company that develops advanced products and provides specialized services in information security and cyber defense. We provide open source threat intelligence, managed detection

4.5(3)
Advantage

Advantage

New Zealand flag

Data Loss Prevention

Advantage exists to provide peace of mind in an evolving technology reliant world. We were created by visionaries who for nearly 4-decades have been passionate about providing world-class solutions to

4.5(3)
NopSec

NopSec

United States flag

Penetration Testing

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches. The company's flagship SaaS product,

4.5(3)
44CON

44CON

United Kingdom flag

Security Operations

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional. 44CON is located i

4.5(3)
Akto

Akto

United States flag

Security Operations

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed. Run Akto, locally or in the cloud, and connect it to your traffi

4.5(3)
Agenci

Agenci

United Kingdom flag

Security Operations

Agenci are an international cyber security consultancy with offices in London and Yorkshire. We are specialists in cyber security and information security and deliver ISO 27001 Certification. Agenci

4.5(3)
Nubo Software

Nubo Software

United States flag

Security Operations

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Deliver any mobile app while keeping 100% of the data on your remote server. Enable un

4.5(3)
Intraframe US

Intraframe US

United States flag

Digital Forensics and Incident Response

Intraframe US is a premium cybersecurity consulting company. We support businesses throughout Memphis and the greater Mid-South with Managed IT services. We combine advanced cybersecurity protection

4.5(3)
Beachhead Solutions

Beachhead Solutions

United States flag

Security Operations

Beachhead's SimplySecure Management System is a single, configurable, web-based management tool allowing you to remotely secure the vulnerable mobile devices in your organization, including those devi

4.5(3)
Concordium

Concordium

Switzerland flag

Security Operations

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level. Concordium supports regulatory compliance, all

4.5(3)
URS Certification

URS Certification

United Kingdom flag

Security Operations

United Registrar of Systems (URS Certification) is an independent certification body operating in more than 30 countries within the multinational URS Holdings. High quality and guaranteed services ar

4.5(3)
Accelerynt

Accelerynt

United States flag

Compliance Consulting

Accelerynt was founded with a singular purpose: help teams like yours build cybersecurity resilience.  Whether you are building a new capability or maturing your team’s existing capabilities, Accelery

4.5(3)
CipherStash

CipherStash

Australia flag

Data Loss Prevention

CipherStash is a complete data governance and breach prevention platform. Traditional access controls are inconsistent. A single weak link can result in a data breach. With Cipherstash data is always

4.5(3)
AdronH

AdronH

LU flag

Compliance Consulting

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.

4.5(3)
4Secure

4Secure

United Kingdom flag

Data Loss Prevention

For over two decades, 4Secure has specialised in cyber security consultancy, safeguarding the worlds critical Infrastructure through securely bridging air gapped networks. 4Secure’s innovative cross-

4.5(3)
Avast Software

Avast Software

CZ flag

Threat Intelligence Platforms

Avast Software is a security software company that develops antivirus software and internet security services. Avast's portfolio includes a wider array of security-related products targeting both con

4.5(3)
Ensurity Technologies

Ensurity Technologies

India flag

Data Loss Prevention

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions. Ensurity is preparing for a world where a

4.5(3)
Ingenio Global

Ingenio Global

Ireland flag

Security Operations

Ingenio is a specialist recruitment business for SaaS companies. Our purpose is to source exceptional talent in areas including cyber security for leading SaaS companies in the UK and Ireland.

4.5(3)
AMR CyberSecurity

AMR CyberSecurity

United Kingdom flag

Compliance Consulting

AMR CyberSecurity delivers next generation cyber security services to assist organisations across a wide variety of sectors in understanding potential threats and effectively countering them. We also

4.5(3)
Watchdata Technologies

Watchdata Technologies

Singapore flag

Security Operations

Watchdata Technologies is a pioneer in digital authentication and transaction security. Watchdata offers a wide range of product line, including smart wearable device, smart mobile terminal, contact

4.5(3)
NSO Group

NSO Group

Israel flag

Security Operations

At NSO Group, a Q Cyber Technologies company, we develop technology that enables government intelligence and law enforcement agencies to prevent and investigate terrorism and crime. NSO Group is a gl

4.5(3)
Offensive Security Manager (OSM)

Offensive Security Manager

CZ flag

Security Operations

Offensive Security Manager is the ultimate AI software that will enforce offensive security automation, orchestration, coverage, ensure quality, and lets you manage whole process. Our mission is to t

4.5(3)
BooleBox

BooleBox

Italy flag

Data Loss Prevention

Our data protection company’s mission is to design and develop innovative software dedicated to the total protection of sensitive and confidential corporate information wherever it is, always guarante

4.5(3)
Advice Bytes

Advice Bytes

Ireland flag

Compliance Consulting

At Advice Bytes, we go beyond just advice, we deliver outcomes. We help businesses secure their digital and AI-powered operations with a clear focus on action, not just awareness. Our team combines de

4.5(3)
Winbond Electronics

Winbond Electronics

Taiwan flag

Security Operations

Winbond is a Specialty memory IC company. Product lines include Code Storage Flash Memory, TrustME® Secure Flash, Specialty DRAM and Mobile DRAM. Winbond TrustME® Secure Flash products strengthen rob

4.5(3)
TechRate

TechRate

Netherlands flag

Security Operations

Techrate is an analytics agency focused on blockchain technology and engineering. We are the team of professionals with wide experience on crypto market specialised on technology & business analytics.

4.5(3)
Akin Gump Strauss Hauer & Feld

Akin Gump Strauss

United States flag

Security Operations

Akin Gump Strauss Hauer & Feld LLP is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privac

4.5(1)
Pi-labs

Pi-labs

India flag

Security Operations

Pi-labs provides cybersecurity and intelligence solutions to governments and enterprises to prevent them from the new cyber threats coming from the mass adoption of AI. Pi-labs works at the intersect

4.5(1)
V2X

V2X

United States flag

Security Operations

The systems and networks that drive government missions forward ensure that decision-makers and operators are connected, all the way to the tactical edge. V2X delivers IT support, networking, and cybe

4.5(1)
Federal Bureau of Investigation (FBI) - USA

Federal Bureau of

United States flag

Security Operations

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services. Our priority is to help protect you, your childr

4.5(1)
Jscrambler

Jscrambler

United States flag

Security Operations

Jscrambler addresses all your JavaScript and Web application protection needs. Jscrambler works on highly innovative security products to protect Web and Mobile Applications. Its flagship product, Jsc

4.5(1)
Kasada

Kasada

Australia flag

Threat Intelligence Platforms

Kasada has developed a radical approach to defeating automated cyberthreats based on its unmatched understanding of the human minds behind them. The Kasada platform overcomes the shortcomings of trad

4.5(1)
Zorus

Zorus

United States flag

Security Operations

Zorus provides best-in-class cybersecurity products to MSP partners to help them grow their business and protect their clients. Today’s workers use multiple devices, and are on the move, presenting u

4.5(1)
Appdome

Appdome

United States flag

Security Operations

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security. Appdome’s Cyber Defense Automation platform comes

4.5(1)
Armata Cyber Security

Armata Cyber Security

South Africa flag

Compliance Consulting

Armata offers a holistic approach to Cyber Security with products and services to assist on the journey to Cyber Resilience. A service lead consultancy engagement can help the customer understand thei

4.5(1)
Blast Security

Blast Security

United States flag

Cloud Security

Blast Security marks the end of reactive cloud security, replacing after-the-fact response with continuous prevention. We believe the reactive era of cloud security is over. It’s time for an operatin

4.5(1)
EvoNexus

EvoNexus

United States flag

Security Operations

EvoNexus is a technology startup incubator with locations in San Diego, Orange County, and Silicon Valley. We enable motivated entrepreneurs to turn their transformative ideas into fundable, commerci

4.5(1)
Cybersecurity Collaboration Forum

Cybersecurity Collaboration Forum

United States flag

Security Operations

The mission of the Cybersecurity Collaboration Forum is to foster information security communication and idea sharing across the C-Suite, enabling leaders to better defend, preserve and protect local

4.5(1)
Huntr

Huntr

United States flag

Threat Intelligence Platforms

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications, including those powered by Open Source Software (OSS).

4.5(1)
31 Concept

31 Concept

United Arab Emirates flag

Security Operations

Led by a team of industry experts and innovators, we are on a mission to help organizations unlock the full potential of their network data. By creating a unifying intelligence layer across diverse ne

4.5(1)
Packet Storm

Packet Storm

UN flag

Security Operations

Packet Storm is a threat intelligence feed that encompasses a vast cross section of information related to vulnerabilities, and free tooling to better enable the information security industry. For se

4.5(1)
ISACA Conferences

ISACA Conferences

United States flag

Security Operations

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security. The ISACA Conference is a new and improved confere

4.5(1)
Fortinet

Fortinet

United States flag

Threat Intelligence Platforms

Fortinet is a worldwide leading provider of network security appliances. Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threa

4.5(1)
Crosspoint Capital Partners

Crosspoint Capital Partners

United States flag

Security Operations

Crosspoint Capital Partners is a private equity investment firm focused on the cybersecurity and privacy sectors. We have assembled a team of successful operators, technology visionaries and investors

4.5(1)
Veratad Technologies

Veratad Technologies

United States flag

Security Operations

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions. Our verification solutions are designed to

4.5(1)
aDolus Technology

aDolus Technology

United States flag

Security Operations

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems. aDolus works directly with equipment vendors to collect "fingerp

4.5(1)
TekSek Cyber Security

TekSek Cyber Security

LK flag

Governance Risk and Compliance Platforms

TekSek is the exclusive sales & marketing partner for Cyber Security Works in the Sri Lankan territory. We provide a wide range of cyber security solutions, from security audits to data security stand

4.5(1)
Breeze Security

Breeze Security

Israel flag

Threat Intelligence Platforms

Security leaders are overwhelmed with tools, data, and dashboards—yet still struggle to see where they're truly exposed, or whether the right risks are being addressed. We started Breeze to change tha

4.5(1)
BastionZero

BastionZero

United States flag

Data Loss Prevention

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments. Our cryp

4.5(1)
AI EdgeLabs

AI EdgeLabs

United States flag

Industrial Control System Security

AI EdgeLabs is a powerful and autonomous cybersecurity AI platform that helps security teams respond immediately to ongoing attacks and protect Edge/IoT infrastructures against malware, DDoS, botnets,

4.5(1)
Flare Systems

Flare Systems

Canada flag

Security Operations

Flare was founded to empower organizations to proactively detect and remediate exposure across the clear & dark web, providing organizations with the equivalent of an automated cyber reconnaissance te

4.5(1)
Cyabra

Cyabra

Israel flag

Security Operations

Cyabra is leading the fight against disinformation. Our AI shields companies and the public sector by uncovering malicious actors, bot networks, and GenAI content. Our proactive alerts system protect

4.5(1)
Guidewire

Guidewire

United States flag

Security Operations

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures. Leaders across the insurance industry use

4.5(1)
Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative

United States flag

Compliance Consulting

Beryllium InfoSec Collaborative is an information security and cyber security company with 40-plus years of experience across industry & government. We are National Institute of Standards and Technol

4.5(1)
PhishLabs

PhishLabs

United States flag

Brand Protection

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands. Using a powerful combination of proprietary tech

4.5(1)
Abertay cyberQuarter

Abertay cyberQuarter

United Kingdom flag

Security Operations

The Abertay cyberQuarter is a cybersecurity research and development centre housed within Abertay University. This initiative brings together students, academics, and organisations to help solve glob

4.5(1)
Anterix

Anterix

United States flag

Industrial Control System Security

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity. Recognizing the complexity facing utilities in addr

4.5(1)
Carbonite

Carbonite

United States flag

Backup as a Service

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters. From  automat

4.5(1)
Zaviant Consulting

Zaviant Consulting

United States flag

Compliance Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations. Pragmatic in our approac

4.5(1)
Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

Spain flag

Security Operations

The main objective of Cybersecurity Innovation Hub is to bring cybersecurity and other advanced technologies closer to companies and, with the adoption of technology within their business processes, t

4.5(1)
Crest International

Crest International

United Kingdom flag

Security Operations

Crest is focused on professionalizing the technical cyber security market whilst driving quality and standards of the organizations that operate within it. In collaboration with industry, Crest has b

4.5(1)
BakerHostetler

BakerHostetler

United States flag

Security Operations

BakerHostetler is one of the largest law firms in the USA and represents clients around the globe. We have five core practice groups: Litigation, Business, Employment, Intellectual Property, and Tax.

4.5(1)
ETSI

ETSI

France flag

Security Operations

ETSI is a European Standards Organization (ESO). We are the recognized regional standards body dealing with telecommunications, broadcasting and other electronic communications networks and services i

4.5(1)
eCapital

eCapital

Germany flag

Security Operations

eCAPITAL is a leading venture capital firm that provides early to growth stage funding to technology companies in the fields of software & information technology, cybersecurity, industry 4.0, new mate

4.5(1)
C5 Capital

C5 Capital

United Kingdom flag

Security Operations

4.5(1)
Ahope

Ahope

KO flag

Security Operations

Ahope is a mobile security solution provider in Korea with a long history of security solution development. Offerings include App Shield integrated mobile network security solutions as well as Securit

4.5(1)
BioID

BioID

Germany flag

Security Operations

BioID are a German company offering deepfake detection, liveness detection, facial authentication & identity verification as a Service. With 20 years of experience our special focus is on biometric a

4.5(1)
Alliance for Cyber Security (ACS)

Alliance for Cyber

Germany flag

Security Operations

The Alliance for Cyber Security (Allianz für Cybersicherheit) is an initiative of the Federal Office for Information Security (BSI) founded in cooperation with the Federal Association for Information

4.5(1)
Trustlook

Trustlook

United States flag

Threat Intelligence Platforms

Trustlook was founded in 2013 focusing on mobile and blockchain security. Aiming to become the global leader in next-generation cybersecurity products based on artificial intelligence, Trustlook has

4.5(1)
BehavioSec

BehavioSec

Sweden flag

Security Operations

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns. You can stop fraud, prevent account takeov

4.5(1)
Eversheds Sutherland

Eversheds Sutherland

United Kingdom flag

Security Operations

Eversheds Sutherland is a global multinational law practice offering a full range of commercial and IT law services including Privacy, Data Protection and Cyersecurity. With data firmly established a

4.5(1)
East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber

United Kingdom flag

Governance Risk and Compliance Platforms

The East Midlands Cyber Resilience Centre (EMCRC) is set up to support and help protect businesses across the region against cyber crime. By working in conjunction with local universities and the fiv

4.5(1)
CyPhyCon

CyPhyCon

Canada flag

Industrial Control System Security

CyPhyCon (Cyber-Physical Systems Security Conference) is an annual event exploring threats and solutions to cyber-kinetic attacks – cyber attacks on cyber-physical systems such as industrial control s

4.5(1)
Zeneth Technology Partners

Zeneth Technology Partners

United States flag

Compliance Consulting

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

4.5(1)
Coffee Cup Solutions

Coffee Cup Solutions

United Kingdom flag

Backup as a Service

Over the last 10 years Coffee Cup Solutions have built a large, strong team of IT experts, driving great user experiences for customers, dedicated to supporting and developing the IT function for many

4.5(1)
Cohesity

Cohesity

United States flag

Backup as a Service

Cohesity redefines data management to solve mass data fragmentation. Cohesity lowers TCO and radically simplifies the way businesses back up, manage, protect, and extract value from their data—in the

4.5(1)
Averlon

Averlon

United States flag

Cloud Security

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility,  Predictive Attack Intelligence and Rapid Remediation. Our purpose is to bring fresh perspectives to cloud secu

4.5(1)
Collins Aerospace

Collins Aerospace

United States flag

Managed Security Service Providers

Collins Aerospace has the unique ability to leverage technologies across different industries. Our exploration and ingenuity stretches beyond the boundaries of aerospace and defense to provide solutio

4.5(1)
Archon Secure

Archon Secure

United States flag

Data Loss Prevention

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet. Built with Commercial National Security A

4.5(1)
Authomize

Authomize

Israel flag

Security Operations

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users, s

4.5(1)
Inception Cyber

Inception Cyber

United States flag

Threat Intelligence Platforms

Inception Cyber, the inventors of intent-based security, is leading the next generation of threat prevention for an increasingly AI-driven world. Our patent-pending Neural Analysis and Correlation En

4.5(1)
Catalogic Software

Catalogic Software

United States flag

Backup as a Service

Catalogic DPX, The Smart Choice in Data ProtectionReliable, rapid, and low-cost backup and recovery. Protect and recover your data from human errors, disasters, and ransomware attacks. Fast recovery-i

4.5(1)
Aspiron Search

Aspiron Search

United States flag

Security Operations

Aspiron Search is a niche-focused Cybersecurity search firm that works exclusively with venture-backed Cybersecurity firms. Using our robust search methodology and established network, we work to attr

4.5(1)
Boxcryptor

Boxcryptor

Germany flag

Data Loss Prevention

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services. Boxcryptor encrypts your data on your device before it is synchronized to the cloud. Thereby, the highest pos

4.5(1)
Trail of Bits

Trail of Bits

United States flag

Security Operations

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code. We don’t just fix bugs, we fix software. When our research into the depths of cod

4.5(1)
Noetic Cyber

Noetic Cyber

United States flag

Governance Risk and Compliance Platforms

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture. Noetic breaks the cycle of dispara

4.5(1)
BlackhawkNest

BlackhawkNest

United States flag

Security Operations

Blackhawk is the only cyber security solution on the market that combines network monitoring and incident response into a cohesive appliance. A complete set of network and host products ensures all y

4.5(1)
InfoSight

InfoSight

United States flag

Compliance Consulting

InfoSight offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud. We are a Cyber Secu

4.5(1)
Interpres Security

Interpres Security

United States flag

Security Operations

Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure. The Interpres Threat Exp

4.5(1)
Arc4dia Labs

Arc4dia Labs

Canada flag

Threat Intelligence Platforms

Arc4dia have developed SNOW, a cyber security solution to combat the world’s most sophisticated cyber threats. SNOW is an endpoint detection/response solution in the form of a lightweight cross platf

4.5(1)
Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference

Canada flag

Security Operations

The Atlantic Security Conference (AtlSecCon) is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada. Established in 2011, our goal is to provide quality infor

4.5(1)
Huntsman Security

Huntsman Security

Australia flag

Governance Risk and Compliance Platforms

Huntsman Security is the operating name of Tier-3 Pty Ltd, a privately owned Australian cyber security developer. We have offices in Sydney, Canberra and London with operations in Tokyo and the Philip

4.5(1)
SHASAI

SHASAI

Belgium flag

Security Operations

SHASAI is an EU funded project focused on improving the security, resilience, and trustworthiness of AI-based and high-risk systems across hardware and software. It addresses vulnerabilities across t

4.5(1)
Blake, Cassels & Graydon (Blakes)

Blake, Cassels &

Canada flag

Security Operations

Blakes is one of Canada’s top business law firms serving national and international clients in specialist areas including cyber security. The Blakes Cybersecurity group is a multidisciplinary team of

4.5(1)
Genius Guard

Genius Guard

United Kingdom flag

Managed Security Service Providers

Genius Guard specializes in DDoS Protection, DDoS Protected Webhosting, HYIP Hosting, Bitcoin Hosting, Cryptocurrency Hosting. Genius Guard offer highly professional DDoS protected hosting packages.

4.5(1)
EasyDMARC

EasyDMARC

United States flag

Security Operations

EasyDMARC is building the world's largest DMARC ecosystem. We are committed to ensuring businesses' security in cyberspace. Our solution prevents companies from data leakage, protects them from financ

4.5(1)
Certification Authority Browser Forum (CA/Browser Forum)

Certification Authority Browser

UN flag

Security Operations

CA/Browser Forum is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates. Members of the CA/Browser Forum have worked c

4.5(1)
CipherPoint Software

CipherPoint Software

United States flag

Data Loss Prevention

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information in platforms such as SharePoint, Office 365, Google Drive, email, and file servers. O

4.5(1)
BaaSid

BaaSid

Singapore flag

Data Loss Prevention

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain. BaaSid’s technology splits all kinds of data and stores only fragments

4.5(1)
Databarracks

Databarracks

United Kingdom flag

Backup as a Service

Databarracks deliver award winning IT resilience and continuity services. We help organisations get the most out of the cloud and protect their data, wherever it lives. Databarracks keeps you operati

4.5(1)
MLSecOps Community

MLSecOps Community

United States flag

Security Operations

The MLSecOps Community is a collaborative space for machine learning security experts and industry leaders to connect and shape the future of AI/ML security through the growth and adoption of MLSecOps

4.5(1)
Wiser Market

Wiser Market

United Kingdom flag

Brand Protection

Wiser Market is a leading company in global online brand protection services, intellectual property protection, anti-Counterfeit & trademark infringements. Whether you wish to fight counterfeiting, p

4.5(1)
Venable

Venable

United States flag

Security Operations

Venable is an American Lawyer 100 law firm with nine offices across the USA, Practice areas include Cybersecurity. Venable has the cybersecurity risk management capabilities that businesses and organ

4.5(1)
Fairly AI

Fairly AI

Canada flag

Security Operations

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise. SafeAI and non-AI models need risk management and oversight. Fairly provides a continuous monitoring sys

4.5(1)
American International Group (AIG)

American International Group

United States flag

Security Operations

American International Group, also known as AIG, is an American multinational insurance corporation with more than 88 million customers in 130 countries. Commercial services include cyber risk insuran

4.5(1)
IEEE Cyber Science and Technology Congress (CyberSciTech)

IEEE Cyber Science

Canada flag

Security Operations

IEEE CyberSciTech provides a common platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and applicatio

4.5(1)
Factmata

Factmata

United Kingdom flag

Brand Protection

Factmata is an advanced social and news media monitoring and analytics product that uses AI to identify and track narratives online, highlighting the ones most likely to cause brand harm or misinform

4.5(1)
FIRST Conference

FIRST Conference

United States flag

Security Operations

Annual conference organised by the Forum of Incident Response and Security Teams (FIRST), a recognized global leader in computer incident response.

4.5(1)
Consensys

Consensys

United States flag

Security Operations

4.5(1)
Blockchain Reactor

Blockchain Reactor

RS flag

Security Operations

4.5(1)
CM Blockchain Security Center

CM Blockchain Security

China flag

Security Operations

4.5(1)
Great American Insurance Group

Great American Insurance

United States flag

Security Operations

4.5(1)
Dcode

Dcode

United States flag

Security Operations

4.5(1)
Cybool

Cybool

Israel flag

Governance Risk and Compliance Platforms

Cybool delivers Next-Gen Risk and Policy Management by transforming raw security data into actionable threat intel. Unlike traditional GRC solutions, Cybool integrates real-time threat intelligence d

4.5(1)
Bryan Cave LLP

Bryan Cave LLP

United States flag

Security Operations

Bryan Cave LLP is a global business and litigation law firm. We have over 1,100 lawyers located in 25 offices around the world. Practice areas include Data Privacy and Security.

4.5(1)
Anch.AI

Anch.AI

Sweden flag

Security Operations

Anch.AI is an Ethical AI Governance platform that helps you comply with EU regulations and avoid risks and penalties when developing and using AI as part of your business.

4.5(1)
Valiant Technologies

Valiant Technologies

India flag

Data Protection

Valiant Technologies Pvt Ltd is a leading provider of information security consulting and training solutions, established in 2003. Catering to a diverse range of sectors including commercial enterpris

4.5(1)
FAMOC

FAMOC

Ireland flag

Security Operations

FAMOC is an enterprise mobile management solution that makes your job safer and more productive by delivering comprehensive security and management for applications, documents, email, and mobile devic

4.5(1)
Advisera 27001Academy

Advisera 27001Academy

Switzerland flag

Security Operations

Advisera is a market leader in providing documentation and online support for the implementation of business standards including ISO 27001, ISO 22301 and EU GDPR. 27001Academy is one of the Academies

4.5(1)
CoverWallet

CoverWallet

United States flag

Security Operations

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability. Frustrated with how opaque, h

4.5(1)
Kirkland & Ellis

Kirkland & Ellis

United States flag

Security Operations

Kirkland & Ellis LLP is an international law firm with offices in the USA, Europe and Asia. Practice areas include Data Security & Privacy.

4.5(1)
CTERA Networks

CTERA Networks

Israel flag

Backup as a Service

4.5(1)
Comparitech

Comparitech

United Kingdom flag

Security Operations

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware. Comparitech is a pr

4.5(1)
Aegis Cyber Defense Systems

Aegis Cyber Defense

United States flag

Threat Intelligence Platforms

AEGIS is a powerful cybersecurity tool that can help protect your devices and networks from cyber threats, and increase performance. Aegis Defender Pro is a software and service that updates the Nati

4.5(1)
CHEQ

CHEQ

United States flag

Brand Protection

CHEQ is an AI-driven cybersecurity company disrupting the ad-verification space by introducing fully autonomous, preemptive technology for brand safety and ad-fraud prevention. CHEQ provides Autonomo

4.5(1)
Wadilona Cyber Securities

Wadilona Cyber Securities

NA flag

Backup as a Service

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

4.5(1)
Cloudbric

Cloudbric

KO flag

Security Operations

Cloudbric is a cloud-based web security service, offering award-winning WAF, DDoS protection, and SSL, all in a full-service package. • Web attacks: detect and block malicious activity such as vulner

4.5(1)
BTblock

BTblock

United States flag

Security Operations

4.5(1)
Neudomains

Neudomains

Spain flag

Brand Protection

4.5(1)
CyberPolicy

CyberPolicy

United States flag

Security Operations

CyberPolicy is a cyber protection solution for small businesses. It combines three important components against cyber threats - Cyber Plan, Cybersecurity and Cyber Insurance. Cyber Plan - Takes you t

4.5(1)
DataProof Communications

DataProof Communications

South Africa flag

Compliance Consulting

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies. DataProof’s objective is to provide compr

4.5(1)
Cyberwrite

Cyberwrite

Israel flag

Security Operations

Cyberwrite was founded to provide underwriters around the world a unique and innovative Cyber Underwriting platform.  We realize that Cyber underwriting is a complicated process which requires deep mu

4.5(1)
Emirates International Accreditation Center (EIAC)

Emirates International Accreditation

United Arab Emirates flag

Security Operations

EIACI is the national accreditation body for the United Arab Emirates, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and cali

4.5(1)
Zynap

Zynap

Spain flag

Threat Intelligence Platforms

Zynap is an Advanced AI-powered SaaS platform replicating cybercriminal tactics to predict, detect, and neutralize threats before they strike. Make Your Budget EfficientStreamline operations with aut

4.5(1)
Certo Software

Certo Software

United Kingdom flag

Security Operations

As mobile devices are now such an integral part of our daily lives the importance of protecting them has never been greater. Adapting traditional PC antivirus for mobile is no longer enough. At Certo

4.5(1)
Document Security Systems (DSS)

Document Security Systems

United States flag

Brand Protection

Document Security Systems, Inc. is an industry leader in providing dynamic solutions to protect corporations, financial institutions, and governments from sophisticated and costly counterfeiting and f

4.5(1)
Ecubel

Ecubel

Belgium flag

Security Operations

Ecubel is the market leader in Belgium in buying and selling used IT harware guaranteed by a certified data erasure. Ecubel specializes in buying your hardware, its cleanup and the erasure of your co

4.5(1)
Edgescan

Edgescan

Ireland flag

Penetration Testing

Edgescan offers a continuous security testing and unified exposure management SaaS platform that manages thousands of assets for businesses large and small in a wide variety of industries across the g

4.5(1)
CyXcel

CyXcel

United Kingdom flag

Compliance Consulting

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise across computer systems, digital networks, information and op

4.5(1)
Binalyze

Binalyze

EE flag

Digital Forensics and Incident Response

Binalyze is the world's fastest and most comprehensive enterprise forensics solution. Our software remotely, securely, and automatically collects more than 150 digital forensics artifacts in under 10

4.5(1)
Atempo

Atempo

France flag

Backup as a Service

Atempo is a leading independent European-based software vendor with a global presence. We provide solutions to protect, store, move and recover all your data.

4.5(1)
Engage Black

Engage Black

United States flag

Data Loss Prevention

Engage Black is the Security Business Unit of Engage Communication Inc. and focuses on providing advanced cryptographic products. In particular, solutions that secure and protect cryptographic keys, d

4.5(1)
Conix

Conix

France flag

Compliance Consulting

Conix cyber security offerings include Governance and Risk Management, Security Auditing and Penetration Testing, Incident Response and Digital Forensics, Managed Security Operations Centre (SOC). Co

4.5(1)
BLOCKO

BLOCKO

KO flag

Security Operations

BLOCKO is a blockchain specialized technology company that has experienced and achieved the largest amount of business in South Korea. Despite the fact that many people recognize the possibilities of

4.5(1)
LUCY Security

LUCY Security

Switzerland flag

Security Awareness Training

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

4.5(1)
WitnessAI

WitnessAI

United States flag

Security Operations

WitnessAI is the confidence layer for enterprise AI, providing the unified platform enterprises trust to observe, control, and protect all AI activity.

4.5(1)
VU Security

VU Security

Argentina flag

Security Operations

4.5(1)
Irregular

Irregular

UN flag

Security Operations

Irregular (formerly Pattern Labs) is the first frontier security lab, building defenses that uncover vulnerabilities and secure advanced AI before release. We build next-generation defenses through h

4.5(1)
TrustNXT

TrustNXT

Germany flag

Security Operations

TrustNXT provides innovative software solutions to safeguard digital photos and videos from manipulation. We are dedicated to being the catalyst for digital truth, empowering organizations and indivi

4.5(1)
KBE Information Security

KBE Information Security

Canada flag

Cloud Security

KBE Security Solutions and Consulting Services approach is comprehensive. We provide services that range from value added security implementation, risk and threats assessment, to security governance a

4.5(1)
Goldilock

Goldilock

United Kingdom flag

Security Operations

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured. Goldilock is based on the premise that your assets should not be physically connected to the

4.5(1)
At-Bay

At-Bay

United States flag

Security Operations

At-Bay is the world’s first InsurSec provider designed from the ground up to help businesses tackle cyber risk head on. By combining world-class technology with industry-leading insurance and cyber s

4.5(1)
Axiata Digital Labs

Axiata Digital Labs

LK flag

Governance Risk and Compliance Platforms

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia. Axiata Digital Labs is an innovative software service provid

4.5(1)
Beame.io

Beame.io

Israel flag

Security Operations

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption. This authentication infrastructure is used for the creation of credentials w

4.5(1)
Gorodissky IP Security

Gorodissky IP Security

Russia flag

Brand Protection

Gorodissky IP Security is a comprehensive approach to protecting your intellectual property on the Internet and beyond that is based on the best practices and solutions in detecting and combating the

4.5(1)
403Tech Inc.

403Tech Inc.

Canada flag

Backup as a Service

We help your business, with the use of technology, to be more efficient, more secure, and to put less worry on the IT side of things and more emphasis on the things you are passionate about.

4.5(1)
Amnet Technology Solutions (Amnet Systems)

Amnet Technology Solutions

United States flag

Backup as a Service

With a team of experienced technology experts, amnet delivers top-notch services to customers. Amnet continues to invest in new product offerings that provide innovative and best-in-class solutions to

4.5(1)
Kordia

Kordia

New Zealand flag

Cloud Security

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. Our expertise spans telecommunications, cyber security, field services, media and broadcast; and safety of

4.5(1)
Guy Carpenter

Guy Carpenter

United States flag

Security Operations

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics. Guy Carpenter has pioneered and expanded cyber liability solutions sin

4.5(1)
Celebrus

Celebrus

United Kingdom flag

Security Operations

D4t4 Solutions is focused on helping companies get the best possible value from all their data assets. We intend to lead digital disruption by powering artificial intelligence, machine learning, advan

4.5(1)
443ID

443ID

United States flag

Security Operations

443ID brings OSINT data to Identity Security professionals on any digital platform. Open Source Intelligence (OSINT) provides important, outside context about an identity which can be leveraged at key

4.5(1)
Blueskytec (BST)

Blueskytec (BST)

United Kingdom flag

Industrial Control System Security

Blueskytec has applied its experience of over three decades of working in the field of embedded systems and encryption to provide a scalable and appropriate technology for cyber-physical devices. Our

4.5(1)
_cyel

_cyel

Switzerland flag

Security Operations

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system. Moving

4.5(1)
CoinCover

CoinCover

United Kingdom flag

Security Operations

Blockchain technology is changing everything. However, it brings its own set of unique risks. Coincover ensures everyone is protected, enabling them to innovate freely, without constraints. We exist

4.5(1)
AXELOS

AXELOS

United Kingdom flag

Security Operations

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT service management, project, programme and portfolio management and cyber resilience.

4.5(1)
Heimdal Security

Heimdal Security

Denmark flag

Threat Intelligence Platforms

Heimdal Security provides proactive protection against cyber threats including ransomware, exploit kits and financial malware. Block cyber threats before they compromise your system - Through its tra

4.5(1)
Beacon Technology

Beacon Technology

United States flag

Threat Intelligence Platforms

Beacon Technology is a multinational cybersecurity company that offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools. This platform is delivered via a robust

4.5(1)
6WIND

6WIND

France flag

Security Operations

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN. We believe that sustainability, effic

4.5(1)
Inavate Consulting

Inavate Consulting

United Kingdom flag

Compliance Consulting

Inavate Consulting are experts in defining and implementing information assurance solutions and governance frameworks. Our ISO27001 consultants are the most experienced in the industry; they have a va

4.5(1)
SGCyberSecurity

SGCyberSecurity

Singapore flag

Security Operations

SGCyberSecurity is Singapore's No.1 Cyber Security portal. SGCyberSecurity provide the first ever ecosystem for security companies, businesses, security professionals and consumers to be connected on

4.5(1)
Homeland Security Investigations (HSI)

Homeland Security Investigations

United States flag

Security Operations

Homeland Security Investigations (HSI) is a premier federal law enforcement agency within the Department of Homeland Security (DHS). We shield our nation from global threats to ensure Americans are sa

4.5(1)
SOOHO

SOOHO

KO flag

Penetration Testing

4.5(1)
Intersistemi Italia

Intersistemi Italia

Italy flag

Compliance Consulting

Intersistemi is a leading Italian company in the field of information technology integration and digital transformation including cybersecurity. Cyber Defense ServicesOur services are designed to sup

4.5(1)
Five Tattva (5Tattva)

Five Tattva (5Tattva)

India flag

Compliance Consulting

At 5TATTVA, we stand at the forefront of cybersecurity, dedicated to providing comprehensive solutions that fortify your digital defences. With a commitment to excellence and a passion for security,

4.5(1)
Encova Insurance

Encova Insurance

United States flag

Security Operations

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data. We’ll monitor your customers’ identities if their information is compromised, and

4.5(1)
RecordPoint

RecordPoint

United States flag

Governance Risk and Compliance Platforms

RecordPoint is a unified data and AI governance platform. Understand your data. Simplify data management. Reduce data risk. RecordPoint brings calm to the chaotic world of data, letting organizations

4.5(1)
HUB Security

HUB Security

Israel flag

Security Operations

4.5(1)
Axcient

Axcient

United States flag

Backup as a Service

Axcient empowers MSPs and IT providers with its Business Availability Suite. Partner with us and bring resilience, mobility, and real value to your clients. Our solutions address the full spectrum of

4.5(1)
Inveo Group

Inveo Group

Italy flag

Governance Risk and Compliance Platforms

Inveo group is the Italian leader for the management of privacy and data protection issues. Through one to one assessments we provide customized solutions that fit the compliance and security needs of

4.5(1)
Aretum

Aretum

United States flag

Cloud Security

Aretum is a leading government contracting company specializing in technology-enabled mission support services for the Department of Defense, Department of Homeland Security, and Civilian agencies. A

4.5(1)
Nordic IT Security

Nordic IT Security

Sweden flag

Security Operations

Nordic IT Security has become the most recognized and influential cyber security business forum in Scandinavia. Seasoned industry experts and cutting edge technology providers get together to discuss

4.5(1)
BackupVault

BackupVault

United Kingdom flag

Backup as a Service

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide. We also offer Endpo

4.5(1)
APIsentry

APIsentry

Canada flag

Security Operations

APIsentry is a leading provider of comprehensive API security solutions, specializing in protecting organizations from a wide range of cyber threats targeting their Application Programming Interfaces.

4.5(1)
CloudOak

CloudOak

Canada flag

Backup as a Service

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

4.5(1)
MaskTech

MaskTech

Germany flag

Security Operations

Masktech is an independent supplier for highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

4.5(1)
Mesh Security

Mesh Security

Ireland flag

Security Operations

Perimeter protection with Mesh Gateway (MX based), mailbox protection with Mesh 365 (API based), or combine them both for complete protection with Mesh Unified - an email security solution that does b

4.5(1)
Swiss Cyber Storm

Swiss Cyber Storm

Switzerland flag

Security Operations

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges with a focus of identifying a

4.5(1)
AppSOC

AppSOC

United States flag

Security Operations

AppSOC is a leader in Application Security Posture Management (ASPM) and Code-to-Cloud Vulnerability Management. Our mission is to break through security silos, consolidate data across hundreds of to

4.5(1)
AdaCore

AdaCore

United States flag

Security Operations

Everything we do at AdaCore is centered around helping developers build safe, secure and reliable software. With over two decades of experience working with the most respected companies in industries

4.5(1)
Capy

Capy

Japan flag

Security Operations

Capy's SaaS-based security solutions will protect your website from bots, spam, humans and more. Our security lineup includes: Puzzle & Avatar CAPTCHA, Realtime IP Blacklist, & Riskbase Authentication

4.5(1)
Bluerydge

Bluerydge

Australia flag

Cloud Security

Bluerydge specialises in cyber security and technology, focusing on the delivery of innovative sovereign solutions through trusted, cleared and experienced professionals. We exist to disrupt the curre

4.5(1)
Brightsolid

Brightsolid

United Kingdom flag

Cloud Security

Brightsolid are experts in Hybrid Cloud. Our consultancy services help customers make the right decisions at every stage of their cloud journey. We design, build and manage secure, scalable cloud envi

4.5(1)
Available Infrastructure

Available Infrastructure

United States flag

Industrial Control System Security

As the digital and physical worlds merge, decision-making without AI support puts you at a disadvantage, whether against a nation-state adversary, criminal threat, or competitor. And AI without robust

4.5(1)
AVORD

AVORD

United Kingdom flag

Security Operations

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way. Our service enables small, medium and major si

4.5(1)
Proton Data Security

Proton Data Security

United States flag

Security Operations

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media. Our prod

4.5(1)
British Security Industry Association - CySPAG

British Security Industry

United Kingdom flag

Security Operations

The Cyber Security Product Assurance Group (CySPAG) is a special interest group within the British Security Industry Association (BSIA). The group is focused on reducing the risk of product related cy

4.5(1)
Codacy

Codacy

PT flag

Security Operations

Codacy is a developer-first, API-driven platform that provides a curated collection of best-in-class code analysis, security, coverage, and engineering performance tools. Codacy integrates seamlessly

4.5(1)
Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal

United States flag

Security Operations

The Inter-American Cooperation Portal on Cyber-Crime  was created primarily to facilitate and streamline cooperation and information exchange among government experts from OAS member states with respo

4.5(1)
Zerto

Zerto

United States flag

Backup as a Service

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments. Purpose-built for virtualized and cloud environmen

4.5(1)
Commonwealth Cybercrime Initiative (CCI)

Commonwealth Cybercrime Initiative

United Kingdom flag

Security Operations

The Commonwealth Cybercrime Initiative (CCI) unites 35 international organisations, including Interpol, OAS, Council of Europe (CoE), Commonwealth Telecommunications Organisation (CTO) and ITU, contri

4.5(1)
Crypto Valley Association

Crypto Valley Association

Switzerland flag

Security Operations

4.5(1)
Zorins Technologies

Zorins Technologies

Saudi Arabia flag

Backup as a Service

Zorins Technologies is a leading IT company providing IT networking Equipment and expertise in managed services, consulting, and cybersecurity. In the ever-evolving world of technology, businesses fa

4.5(1)
Verve Industrial

Verve Industrial

United States flag

Industrial Control System Security

Verve specialize in providing software and services to help protect and secure critical industrial control systems.

4.5(1)
Blockchains LLC

Blockchains LLC

United States flag

Security Operations

Blockchains is committed to changing the world for the better. Using blockchain and other innovative technologies, we’ll build new systems, new security, and new interactions. Blockchains is a compan

4.5(1)
Sendmarc

Sendmarc

South Africa flag

Brand Protection

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks. Protect employees from email fraud, and stop them receiving any phishing, spoofin

4.5(1)
CipherBlade

CipherBlade

United States flag

Digital Forensics and Incident Response

CipherBlade specializes in blockchain forensics, data science and transaction tracking. We have established partnerships with all leading vendors of professional blockchain forensics tools, and use a

4.5(1)
ImmuneBytes

ImmuneBytes

India flag

Security Operations

ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem. Starting our voyage in the middle of the 2020s, we aim to

4.5(1)
Bestman Solutions

Bestman Solutions

United Kingdom flag

Security Operations

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. The success of an organisation depends on hiring the right people, and this is where we come

4.5(1)
Informer

Informer

United Kingdom flag

Penetration Testing

Informer offers the unique benefits of combining live asset discovery, vulnerability scanning, and expert penetration testing in a single frictionless attack surface management platform. We continuou

4.5(1)
CYBAVO

CYBAVO

Singapore flag

Security Operations

CYBAVO is a cryptocurrency security company founded by experts from the cryptocurrency and security industries. CYBAVO’s mission is to provide cutting­edge security to companies managing digital asse

4.5(1)
Elliptic

Elliptic

United Kingdom flag

Digital Forensics and Incident Response

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity. We identify illicit activity on the bitcoin and ethereum block

4.5(1)
Haltdos

Haltdos

India flag

Security Operations

Haltdos is an AI driven website protection service that secures websites against today's cyber threats. Our comprehensive yet affordable offering provides DDoS protection, Web Application Firewall and

4.5(1)
Cybertekpro

Cybertekpro

United Kingdom flag

Security Operations

Cybertekpro is a specialist insurance broker providing Cyber Liability insurance and cyber risk assessment services. Our aim is to help our clients understand the risks they face from cyber-crime and

4.5(1)
Intracom Telecom

Intracom Telecom

GR flag

Compliance Consulting

Intracom Telecom is a global telecommunication systems & solutions vendor offering a complete range of  professional services and solutions including Information Security. Our Information Security Ma

4.5(1)
ADL Process

ADL Process

Canada flag

Security Operations

ADL Process is an electronics processing and recycling center. We offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institut

4.5(1)
WIRED

WIRED

United States flag

Security Operations

WIRED is the magazine about what's next – bringing you the people, the trends and the big ideas that will change our lives. Each month, through thought-provoking features and stunning photography, we

4.5(1)
GoPlus Security

GoPlus Security

Singapore flag

Security Operations

GoPlus is working as the "security infrastructure" for web3, by providing open, permissionless, user-driven Security Services. GoPlus security engine covers Multi-chain with Multidimensional risk dete

4.5(1)
DigiByte (DGB)

DigiByte (DGB)

UN flag

Security Operations

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications. DigiBytes are digital assets that cannot be destroyed, counterfe

4.5(1)
Automation Workz

Automation Workz

United States flag

Security Awareness Training

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma. Automation Workz can help you achieve your dream of becoming a tech professional with our Personal Cultu

4.5(1)
Alfa Group

Alfa Group

Italy flag

Managed Security Service Providers

Alfa Group supports organizations by helping them identify vulnerabilities, prevent cyberattacks, and develop effective cyber risk governance frameworks and remediation processes. We offer an integra

4.5(1)
CertifID

CertifID

United States flag

Security Operations

CertifID helps to create a world without wire fraud. We’re the only company dedicated to fighting fraud for the real estate industry with an identity verification SaaS platform, insurance, and proven

4.5(1)
Varutra Consulting

Varutra Consulting

India flag

Cloud Security

Varutra Consulting is an Information Security Consulting, Solutions and Training services firm, providing specialized security services for software, mobile and network. Varutra is a CERT-In Empanele

4.5(1)
VerifyMe

VerifyMe

United States flag

Brand Protection

VerifyMe is a global technology solutions company delivering brand protection offerings to mitigate counterfeiting, product diversion, and illicit trade. To stop counterfeiting and product diversion

4.5(1)
ICS Cyber Security Conference

ICS Cyber Security

United States flag

Industrial Control System Security

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity. Our events address the myriad cyber thre

4.5(1)
Elron Ventures

Elron Ventures

Israel flag

Security Operations

Elron Ventures helps promising companies with big ideas become global leaders. Whether in the enterprise software, cybersecurity, or healthcare industries, we identify transformative technologies, nur

4.5(1)
Clumio

Clumio

United States flag

Backup as a Service

Clumio provides autonomous backup and recovery for critical cloud data. At Clumio, we believe that modern IT teams should not have to worry about their backup and recovery posture. Backups should ope

4.5(1)
Infosecurity Europe

Infosecurity Europe

United Kingdom flag

Security Operations

Infosecurity Europe is Europe’s number one information security conference and exhibition. Featuring Europe’s largest, highly regarded and respected conference programme in the industry. Over 360 exhi

4.5(1)
ZX Security

ZX Security

New Zealand flag

Compliance Consulting

ZX Security is a New Zealand owned and operated cyber security consultancy. We are a CREST certified member company which means we have demonstrated our competency and consistency when it comes to th

4.5(1)
Zally

Zally

United Kingdom flag

Security Operations

Using advanced behavioural biometrics and AI, Zally is the world's answer to next-generation security. Zally has developed a powerful AI algorithm and advanced biometrics platform that are used to ve

4.5(1)
ZyberSafe

ZyberSafe

Denmark flag

Data Loss Prevention

ZyberSafe is an innovative Danish company specialized within building hardware encryption solutions. We focus on building security products that ensure the highest level of protection for data in mot

4.5(1)
Trenton Systems

Trenton Systems

United States flag

Security Operations

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries. We design

4.5(1)
Fieldfisher

Fieldfisher

United Kingdom flag

Security Operations

Fieldfisher is a European law firm with market leading practices in many of the world's most dynamic sectors. We are a forward-thinking organisation with a particular focus on technology, finance & fi

4.5(1)
AV Test

AV Test

Germany flag

Security Operations

The AV-TEST Institute is a leading international and independent service provider in the fields of anti-virus research and IT security. For more than 15 years, the experts from AV-TEST have guarantee

4.5(1)
ACL Digital

ACL Digital

United States flag

Cloud Security

ACL Digital, an ALTEN Group company, is a leader in design-led digital experience, innovation, enterprise modernization, and product engineering services converging to Technology, Media & Telecom. AC

4.5(1)
ATIS Systems

ATIS Systems

Germany flag

Digital Forensics and Incident Response

ATIS Systems offers first-class complete solutions for legal interception, mediation, data retention, and IT forensics. Investigating authorities turn to ATIS systems for lawful interception, IT fore

4.5(1)
ICS-CSR

ICS-CSR

United Kingdom flag

Industrial Control System Security

ICS-CSR is a research conference bringing together researchers with an interest in the security of industrial control systems. The topics of interests are broad, ranging from security for hardware/fi

4.5(1)
Wired Assurance

Wired Assurance

Canada flag

Security Operations

Wired Assurance is a testing and assurance company, specialized in software applications and blockchain smart contracts. We are a team of experts that help businesses test, review, and analyze their

4.5(1)
CASwell

CASwell

Taiwan flag

Security Operations

Caswell is an industry-leading OEM/ODM, providing end-to-end platform services, specializing in networking, security, SD-WAN, NFV, telecommunication and IoT (Internet of Things) applications.

4.5(1)
Actelis Networks

Actelis Networks

United States flag

Security Operations

Actelis Networks is a market leader in cyber-hardened, rapid deployment networking solutions for wide-area IoT including federal, state and local government, ITS, military, utility, rail, telecom and

4.5(1)
Advantex Network Solutions

Advantex Network Solutions

United Kingdom flag

Managed Security Service Providers

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance. With Advantex’s ACT (Advanced Cybersecurity Technologies) suite, we can educate, protect and

4.5(1)
c0c0n

c0c0n

India flag

Security Operations

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India. The Conference is organised by a Conglomerate of Government and the Industry consisting of  The Sta

4.5(1)
Ermes

Ermes

Italy flag

Threat Intelligence Platforms

Ermes – Intelligent Web Protection is an Italian company founded by a team of Web Security experts and Artificial Intelligence researchers that provides companies with a solution that effectively secu

4.5(1)
ENLIGHTENi

ENLIGHTENi

Canada flag

Security Operations

ENLIGHTENi are the platform to develop next-gen talent in Technology, Risk, and Cybersecurity. We empower you to achieve the best ROI for your career development via the challenge-based learning, prac

4.5(1)
Algoritha

Algoritha

India flag

Digital Forensics and Incident Response

Algoritha is a pioneering entity in the realm of security and forensic services. Our expertise encompasses a diverse range of offerings, including Banking Fraud Investigation, Insurance Fraud Investig

4.5(1)
Altospam

Altospam

France flag

Security Operations

Altospam is a full service corporate email protection, integrating multiple security levels for your emails. Altospam is an integrated SaaS software protecting your email from spams, viruses, scams a

4.5(1)
Credo AI

Credo AI

United States flag

Security Operations

Credo have pioneered a Responsible AI platform that enables context driven, comprehensive and continuous governance, oversight and accountability of AI. Credo AI is on a mission to empower enterprise

4.5(1)
Angoka

Angoka

United Kingdom flag

Industrial Control System Security

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks, used for Connected and Autonomous Vehicles, Industry 4.0, Smart Citi

4.5(1)
Apogee Global RMS

Apogee Global RMS

United States flag

Compliance Consulting

Get your cybersecurity plan today: Cybersecurity consulting management, cybersecurity risk management services, cybersecurity staffing & talent acquisition. Apogee Global RMS delivers comprehensive s

4.5(1)
Aquia

Aquia

United States flag

Compliance Consulting

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges. We are a Service-Disabled Veteran-Owned Small Busi

4.5(1)
Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation

United States flag

Industrial Control System Security

The Cybersecurity Manufacturing Innovation Institute (CyManII) was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital

4.5(1)
Securis

Securis

United States flag

Security Operations

Securis provides organizations and agencies with the highest level of professional, ultra-secure data destruction and IT recycling. Whether you need onsite e-waste removal, secure computer disposal or

4.5(1)
Aryon Security

Aryon Security

Israel flag

Cloud Security

Aryon Security is redefining cloud security with the ability to enforce cloud strategy with confidence, enabling organizations to prevent risks before they emerge in production environments and requir

4.5(1)
CDNetworks

CDNetworks

United States flag

Cloud Security

CDNetworks is a global content delivery network (CDN) with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web cont

4.5(1)
Augur Security

Augur Security

United States flag

Threat Intelligence Platforms

Augur Security (formerly SecLytics) is the only cybersecurity platform using AI-powered behavioral modeling and agentic automation to reliably predict, decide, and act — not waiting and watching for t

4.5(1)
Baffin Bay Networks

Baffin Bay Networks

Sweden flag

Threat Intelligence Platforms

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection via more than 11 Internet Exchange Points (IXP)

4.5(1)
Barikat Cyber Security

Barikat Cyber Security

Turkey flag

Compliance Consulting

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training. All our ef

4.5(1)
Nineteen Group

Nineteen Group

United Kingdom flag

Security Operations

Nineteen Group delivers major-scale exhibitions within the security, fire, emergency services, health and safety, facilities management and maintenance engineering sectors. We pride ourselves in crea

4.5(1)
Utility Cyber Security Forum

Utility Cyber Security

United States flag

Industrial Control System Security

The need to protect substations and distribution and transmission infrastructure from cyber attacks is of paramount importance to utilities, as grid SCADA and PLC grid control networks are inherently

4.5(1)
ABPSecurite

ABPSecurite

Singapore flag

Cloud Security

ABPSecurite is a leading value-added distributor and a network performance solutions provider. ABPSecurite has an unparalleled portfolio of cybersecurity products and services that meets every critic

4.5(1)
BCS Financial

BCS Financial

United States flag

Security Operations

BCS Financial delivers financial and insurance solutions. Specialty risk products include Cyber and Privacy Liability insurance. Commercial Cyber Liability provides comprehensive cyber security prote

4.5(1)
Bell Canada

Bell Canada

Canada flag

Cloud Security

Bell is the leading provider of network and communications services for Canadian businesses. We provide them end-to-end expertise, industry-leading solutions, and proactive relationship and service ma

4.5(1)
Acuity RM Group

Acuity RM Group

United Kingdom flag

Governance Risk and Compliance Platforms

Acuity RM Group helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience. Its powerful STREAM

4.5(1)
CWSI

CWSI

Ireland flag

Security Operations

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

4.5(1)
Armor

Armor

United States flag

Cloud Security

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments. Armor’s proprietary closed-loop system of intelligence, defense and control seeks to defea

4.5(1)
CYSEC Global

CYSEC Global

United Arab Emirates flag

Security Operations

CYSEC Global is a series of summits dedicated to tackle regional cyber security challenges. It is an exclusive networking and business platform for the Cyber & IT security industry to discuss pressing

4.5(1)
Carson McDowell

Carson McDowell

United Kingdom flag

Security Operations

Carson McDowell are one of Northern Ireland's leading law firms. We are the law firm of choice for many of Northern Ireland's Top 100 companies as well as international companies doing business here.

4.5(1)
Censornet

Censornet

United Kingdom flag

Cloud Security

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection. We protect millions of users across the globe and more

4.5(1)
CerraCap Ventures

CerraCap Ventures

United States flag

Security Operations

CerraCap Ventures invest globally into early-stage B2B companies in Healthcare, Enterprise AI and Cyber Security. We invest in disruptive companies with potential to dominate global markets. We look

4.5(1)
Charlton Networks

Charlton Networks

United Kingdom flag

Backup as a Service

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies. From system/data backup and recovery services, safeguarding and recovering your

4.5(1)
Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied

United States flag

Security Operations

The Conference on Applied Machine Learning in Information Security (CAMLIS) is a venue for discussing applied research on machine learning, deep learning and data science in information security. We

4.5(1)
Contechnet Deutschland

Contechnet Deutschland

Germany flag

Backup as a Service

Contechnet Deutschland GmbH is a German software manufacturer founded in 2007. Starting off as a specialist in the area of IT disaster recovery has broadened its portfolio by the areas of information

4.5(1)
Crypto Legal

Crypto Legal

United Kingdom flag

Security Operations

Crypto Legal is a leading UK-based law firm specialising in blockchain forensics and legal services related to cryptocurrencies. With a focus on claims, litigations, and asset recovery, we help client

4.5(1)
BeDefended

BeDefended

Italy flag

Cloud Security

BeDefended is an Italian company, operating in IT Security and specialized in Cloud and Application Security. Years of experience in penetration testing, consulting, training, and research are availab

4.5(1)
AnChain.AI

AnChain.AI

United States flag

Security Operations

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions. Our AI-power

4.5(1)
CyberInsureOne

CyberInsureOne

UN flag

Security Operations

At CyberInsureOne, we break down the complex world of cyber insurance, and connect you with providers that can give you and your company peace of mind. Despite all of the best efforts of any company,

4.5(1)
ArcRan Information Technology

ArcRan Information Technology

Taiwan flag

Industrial Control System Security

4.5(1)
Britive

Britive

United States flag

Cloud Security

The Britive Platform is a cloud-native security solution built for the most demanding cloud-forward enterprises. Privileged Access - Britive unlocks dynamic permissioning at scale across multi-cloud

4.5(1)
Cybertonica

Cybertonica

United Kingdom flag

Security Operations

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations. Cybertonica uses ML and AI to manage risk and fraud, increas

4.5(1)
Cybonet

Cybonet

Israel flag

Security Operations

Cybonet (formerly PineApp) provides easy to deploy, flexible and scalable security solutions that empower organizations of all sizes to actively safeguard their networks in the face of today’s evolvin

4.5(1)
aizoOn Technology & Consulting

aizoOn Technology &

Italy flag

Compliance Consulting

aizoOn is an independent, globally operating innovation technology and technology consulting company. Our Technology Divisions cover the entire chain of digital data acquisition and transformation, i

4.5(1)
Finlaw Associates

Finlaw Associates

India flag

Security Operations

Finlaw Associates is a trusted cybercrime law firm with international as well as domestic clients and providing a wide range of taxation, legal, advisory and regulatory services to the financial, comm

4.5(1)
EuraTechnologies

EuraTechnologies

France flag

Security Operations

EuraTechnologies, the French incubator and accelerator, is a centre of excellence and innovation for startups and entrepreneurs with a focus on Digital, Data, Cybersecurity and IoT. EuraTechnologies

4.5(1)
Eunetic

Eunetic

Germany flag

Security Operations

Eunetic IT security solutions - we secure your websites, emails, domains and data. Benefitting from over 15 years of experience in hosting and internet services with a specialization in online securi

4.5(1)
Reken

Reken

United States flag

Security Operations

Reken are building a new type of AI platform and products to protect against generative AI threats. Reken are building a layered platform defense combining elements of both zero trust and technologic

4.5(1)
RCMP Cybercrime Strategy

RCMP Cybercrime Strategy

Canada flag

Security Operations

The RCMP Cybercrime Strategy's vision is to reduce the threat, impact and victimization of cybercrime in Canada through law enforcement action. The following three pillars are identified within the st

4.5(1)
BJSS

BJSS

United Kingdom flag

Cloud Security

BJSS is an award-winning technology and engineering consultancy for business. We deliver complex enterprise software by aligning engineering, advanced technology, user-focused design and our collabora

4.5(1)
Asoftnet

Asoftnet

Germany flag

Compliance Consulting

Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions. From consulting to concept development to procurement and installation as well as the s

4.5(1)
Asymmetric Security

Asymmetric Security

United Kingdom flag

Digital Forensics and Incident Response

Asymmetric Security is the first full-stack AI Digital Forensics and Incident Response company. We respond to cyber incidents for our customers, using AI tools built in-house. Drawing on these real-w

4.5(1)
Nordic Cyber Summit

Nordic Cyber Summit

United Kingdom flag

Security Operations

The Virtual Nordic Cyber Security Summit not only addresses a wide range of technological issues from the IT Security spectrum but also breaks out beyond that, providing a wider perspective from all a

4.5(1)
Abion

Abion

Sweden flag

Brand Protection

At Abion (formerly BRANDIT), we empower your business by providing comprehensive brand protection and web security services. We enable you to concentrate on what truly matters, while we protect and s

4.5(1)
Blockaid

Blockaid

United States flag

Security Operations

Blockaid is the onchain security platform for monitoring, detecting, and responding to onchain and offchain threats. Blockaid provides an end-to-end solution that can help any company building in the

4.5(1)
Blueliv

Blueliv

Spain flag

Brand Protection

Blueliv is Europe’s leading cyberthreat intelligence provider. We look beyond your perimeter, scouring the open, deep and dark web to deliver fresh, automated and actionable threat intelligence to pro

4.5(1)
Heights Consulting Group

Heights Consulting Group

United States flag

Compliance Consulting

Heights Consulting Group is a cybersecurity consulting firm specializing in strategic guidance, risk governance, and regulatory readiness. Heights Consulting Group exists to empower executive leaders

4.5(1)
Hexens

Hexens

United Kingdom flag

Compliance Consulting

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create. We go above and beyond exp

4.5(1)
Hubble

Hubble

United States flag

Security Operations

Hubble grew from the idea that legacy solutions were failing to provide organizations with the asset visibility they needed to effectively secure and operate their businesses — while new, so-called CA

4.5(1)
IT Security Guru

IT Security Guru

United Kingdom flag

Security Operations

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor. Keep up-to-date with our news on cybersecurity,

4.5(1)
Hummingbird International

Hummingbird International

United States flag

Security Operations

Hummingbird International, LLC offers top quality e-waste management solutions to businesses, corporate groups, commercial entities and the residential sector. With over a decade of experience in the

4.5(1)
Internet Infrastructure Investigation

Internet Infrastructure Investigation

United Kingdom flag

Brand Protection

Internet Infrastructure Investigation offers a bespoke Internet Governance Solution to your brands online infringement problems. Tailoring online solutions to your individual brand needs and online th

4.5(1)
ZEST Security

ZEST Security

United States flag

Cloud Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible. The security industry is primarily structured to give organizations visibility into what’

4.5(1)
IronNet Cybersecurity

IronNet Cybersecurity

United States flag

Security Operations

IronNet Cybersecurity is different. Built by elite offensive and defensive cyber operators with experience at the highest levels of the U.S. military and intelligence community, our patented IronDefen

4.5(1)
Astrill VPN

Astrill VPN

SC flag

Data Loss Prevention

Astrill VPN is a Seychelles based Virtual Private Network(VPN) Company. We Offer VPN services. The supported technologies are OpenWEB, OpenVPN, L2TP\IPSec, PPTP and DD-WRT Support. All on fast 1Gbit

4.5(1)
London AI Safety Research (LASR)

London AI Safety

United Kingdom flag

Security Operations

London AI Safety Research Labs is a technical AI Safety research programme focussed on reducing the risk of loss of control to advanced AI. We focus on action-relevant questions tackling concrete thr

4.5(1)
Brimondo

Brimondo

Sweden flag

Brand Protection

4.5(1)
NSFOCUS Information Technology

NSFOCUS Information Technology

United States flag

Threat Intelligence Platforms

NSFOCUS is an internet and application security company with 25+ years of proven industry experience. NSFOCUS delivers holistic, carrier-grade, hybrid DDoS and web security powered by industry leadin

4.5(1)
Oz Forensics

Oz Forensics

United Arab Emirates flag

Security Operations

Oz Forensics is a global leader in preventing biometric and deepfake fraud. Our flagship products, Oz Liveness and Oz Biometry, play a critical role in helping the world’s best organizations defeat bi

4.5(1)
Chubb

Chubb

United States flag

Security Operations

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance. Data breaches, electronic theft and vandalism, denial of service attacks

4.5(1)
Abacus Group

Abacus Group

United States flag

Managed Security Service Providers

Abacus Group is a global IT services firm for alternative investment firms, providing an enterprise technology platform specifically designed to meet the unique needs of the financial services industr

4.5(1)
Bayshore Networks

Bayshore Networks

United States flag

Industrial Control System Security

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

4.5(1)
Project Moore

Project Moore

Netherlands flag

Security Operations

Project Moore is an Amsterdam law firm specialising in IT-law and privacy. Things move fast in IT. The ways to handle and share information change every day. Innovations offer exciting opportunities

4.5(1)
Prompt Security

Prompt Security

United States flag

Security Operations

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI. Prompt Security enables enterprises to benefit from the adoption of

4.5(1)
Apollo Information Systems

Apollo Information Systems

United States flag

Compliance Consulting

Apollo is a value-added reseller that provides our clients with the complete set of cybersecurity and networking services and solutions.

4.5(1)
British Insurance Brokers’ Association (BIBA)

British Insurance Brokers’

United Kingdom flag

Security Operations

The British Insurance Brokers’ Association (BIBA) is the UK’s leading general insurance intermediary organisation representing the interests of insurance brokers, intermediaries and their customers. B

4.5(1)
Founder Shield

Founder Shield

United States flag

Security Operations

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies. Our mission is to create the most seamless, intuitive, and responsive experience for

4.5(1)
Datastream Cyber Insurance

Datastream Cyber Insurance

United States flag

Security Operations

DataStream Cyber Insurance is designed to give SMB’s across the US greater confidence in the face of increasing cyber attacks against the small and medium business community. Cyber liability insuranc

4.5(1)
HDI Global SE

HDI Global SE

Germany flag

Security Operations

HDI Global SE provides customised insurance solutions for industrial and commercial clients worldwide including Cyber Liability insurance. Cyber Insurance from HDI Global SE and HDI Global Specialty

4.5(1)
2021.AI

2021.AI

Denmark flag

Security Operations

2021.AI serves the growing business need for full oversight and management of applied AI. Our expertise in data science combined with the AI platform GRACE is a business differentiator for clients an

4.5(1)
2Secure

2Secure

Sweden flag

Compliance Consulting

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security. IT Risk Management and Infromation Security - 2Se

4.5(1)
3i Infotech

3i Infotech

India flag

Compliance Consulting

3i Infotech offers consulting & professional services to assess, design and build next gen IT infrastructure, and managed services to operate, optimize and continuously improve.

4.5(1)
Harmony Intelligence

Harmony Intelligence

Australia flag

Threat Intelligence Platforms

Harmony builds cutting-edge defensive AI products that safeguard people and critical infrastructure around the world from AI-powered threats. We evaluate AI systems to understand their cyber capabili

4.5(1)
AVIANET

AVIANET

Germany flag

Compliance Consulting

AVIANET GmbH specialise in disruptive IT/OT Cybersecurity services, IoT and Industrial Automation solutions, corporate IT Strategy Consultancy, seamless Digital AI Integration, DevOps services, bespok

4.5(1)
ATIA

ATIA

BO flag

Compliance Consulting

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education. ATIA undertakes the design, imple

4.5(1)
Sitehop

Sitehop

United Kingdom flag

Security Operations

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for companies requiring the highest level of security available, which is not ava

4.5(1)
Akito

Akito

Italy flag

Cloud Security

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security. The company directs its services mainly to SME's or to all those com

4.5(1)
Stratus Technologies

Stratus Technologies

United States flag

Industrial Control System Security

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition. For customers considering a digital transformation wit

4.5(1)
Amvia

Amvia

United Kingdom flag

Cloud Security

Amvia is a fast-growing telecoms, Internet and Microsoft service provider. Established in 2016 Amvia has grown to provide business IT and Technology services to sole traders and start-ups all the way

4.5(1)
Entrust

Entrust

United States flag

Data Loss Prevention

Entrust is a global leader in digital security, identities, payments, and data protection. As a pioneer in the business of issuing identities and securing transactions, Entrust is actively involved i

4.5(1)
CS3STHLM

CS3STHLM

Sweden flag

Industrial Control System Security

CS3STHLM – the Stockholm international summit on Cyber Security in SCADA and Industrial Control Systems - is an annual summit that gather the most important stakeholders across critical processes and

4.5(1)
Arm

Arm

United Kingdom flag

Industrial Control System Security

Arm is the world leader in CPU technology. We architect, develop, and license high-performance, low-cost, and energy-efficient IP solutions for CPUs, GPUs, NPUs and interconnect technologies, relied o

4.5(1)
Kaymera Technologies

Kaymera Technologies

Israel flag

Security Operations

Get the highest protection available without compromising on functionality or your smartphone experience The best defense is laid out in layers. Kaymera deploys a unique three-layered defense approac

4.5(1)
Adarma Security

Adarma Security

United Kingdom flag

Managed Security Service Providers

Adarma, one of the largest independent security services companies in the UK. As a business formed and run by veteran senior security leaders, we know security and how to deliver real value in the rea

4.5(1)
CyberPrism

CyberPrism

United Kingdom flag

Industrial Control System Security

CyberPrism provides SaaS solutions using proprietary technology, underpinned by industry-leading technical practitioners to protect OT within Government, Maritime and Industrial markets. We are dedica

4.5(1)
BeOne Development

BeOne Development

Netherlands flag

Security Awareness Training

BeOne Development provide innovative training and learning solutions for information security and compliance. Our teams are continuously working on digital learning solutions: from creating strong co

4.5(1)
BGD E-GOV CIRT

BGD E-GOV CIRT

BD flag

Security Operations

BGD e-GOV CIRT's mission is to support government efforts to develop and amplify ICT programs by establishing incident management capabilities within Bangladesh, Main objectives of BGD E-GOV CIRT are

4.5(1)
Perkins Coie LLP

Perkins Coie LLP

United States flag

Security Operations

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

4.5(1)
Basis Technology

Basis Technology

United States flag

Digital Forensics and Incident Response

Basis Technology provides software solutions for text analytics, information retrieval, digital forensics, and identity resolution. Our language analysis and digital forensics software are widely use

4.5(1)
BlackBerry Cybersecurity

BlackBerry Cybersecurity

Canada flag

Compliance Consulting

The BlackBerry can help you to secure your environment and handle whatever cybersecurity challenges that you face.  Our team can assist you, no matter what you have in your environment, and no-matter

4.5(1)
Block Armour

Block Armour

India flag

Industrial Control System Security

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways. Block Armour was accelerated by Airbus a

4.5(1)
AllClear ID

AllClear ID

United States flag

Security Operations

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft. AllClear ID is led by technology and customer service teams

4.5(1)
Cynamics

Cynamics

United States flag

Security Operations

Cynamics is the only network monitoring solution built specifically for Smart City, Public Safety and Critical Infrastructure networks. We’re building the impossible: a scalable, cost-effective netwo

4.5(1)
US Digital Corps

US Digital Corps

United States flag

Security Operations

The U.S. Digital Corps is an early-career fellowship designed for the country’s top technology talent to serve in the federal government. We need skilled junior technologists with experiences and ide

4.5(1)
Brinqa

Brinqa

United States flag

Governance Risk and Compliance Platforms

Brinqa is a leading provider of unified risk management – enabling stakeholders, governance organizations, and infrastructure and security teams to effectively manage technology risk at the speed of b

4.5(1)
Secure IT Disposals

Secure IT Disposals

United Kingdom flag

Security Operations

Secure IT Disposals specialise in professional Computer Recycling, Computer Disposals, Computer Destruction, Data Erasure and end-of-lifecycle solutions and provide certified Data Wiping/Erasure and S

4.5(1)
Altron

Altron

South Africa flag

Compliance Consulting

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers. Altron combines technical expertise with in-depth customer understanding to provide end

4.5(1)
Dream

Dream

Israel flag

Security Operations

Dream is developing an AI platform that enables cyber resilience and protects nations from hostile nation-states cyber attacks. Dream’s advanced platform strengthens national security by providing go

4.5(1)
FutureCon Events

FutureCon Events

United States flag

Security Operations

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community; striving to bring together the best minds in the industry for a unique cybersecurity even

4.5(1)
Energy Sec

Energy Sec

United States flag

Security Operations

EnergySec is a United States 501(c)(3) non-profit corporation formed to support energy sector organizations with the security of their critical technology infrastructures. Our mission is to strengthe

4.5(1)
CYBERSEC Forum

CYBERSEC Forum

Poland flag

Security Operations

Cybersec Forum is an annual European Public Policy Conference dedicated to strategic aspects of cybersecurity. Our mission is to support and facilitate the development of strategic, cybersecurity-focu

4.5(1)
Enzen

Enzen

United Kingdom flag

Industrial Control System Security

Enzen is a global knowledge practice that provides consulting, technology, engineering, operating and innovation services to leading businesses, governments, non-governmental organisations and not-for

4.5(1)
Gilbert + Tobin

Gilbert + Tobin

Australia flag

Security Operations

Gilbert + Tobin is an Australian corporate law firm serving clients throughout Australia, and around the world, on a broad range of legal issues including cyber security. Gilbert + Tobin's cyber secu

4.5(1)
Custodia Continuity

Custodia Continuity

United Kingdom flag

Backup as a Service

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business. We want to level the playing field, security, ransomware proof backups, good business conti

4.5(1)
Wahaya IT

Wahaya IT

United States flag

Backup as a Service

Wahaya IT works to provide technology solutions that unify systems to reduce risk, improve performance, and control operating costs. We provide solutions and services to help small and mid-sized orga

4.5(1)
Advanced Resource Managers (ARM)

Advanced Resource Managers

United Kingdom flag

Security Operations

4.5(1)
Genua

Genua

Germany flag

Industrial Control System Security

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation. Our business activities range from securing

4.5(1)
CYSEC NG

CYSEC NG

NG flag

Security Awareness Training

Cyber Security Challenge Nigeria Initiative (CYSEC NG) is the first, and largest offensive premier Cyber Conference and Hacking event in Africa. CYSEC NG is an NGO with a focus on identifying Nigeria

4.5(1)
Haystax Technology

Haystax Technology

United States flag

Threat Intelligence Platforms

Haystax security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritizes risks in real time at scale for more efficient protection of critical a

4.5(1)
Canopius Group

Canopius Group

United Kingdom flag

Security Operations

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market. We insure businesses across the spectrum, in respect of their cy

4.5(1)
Vehere

Vehere

United States flag

Threat Intelligence Platforms

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems. Our systems analyse broad communications spectrum for patterns and anamolies and provide pro

4.5(1)
7 Elements

7 Elements

United Kingdom flag

Penetration Testing

7 Elements is an independent IT security testing company providing expertise in technical information assurance through security testing, incident response and consultancy. At 7 Elements our approach

4.5(1)
United Nations Office of Counter-Terrorism (UNOCT)

United Nations Office

United States flag

Security Operations

The Office of Counter-Terrorism provides UN Member States with the necessary policy support and spread in-depth knowledge of the United Nations Global Counter-Terrorism Strategy, and wherever necessar

4.5(1)
Zuul IoT

Zuul IoT

United States flag

Industrial Control System Security

Zuul provides a connected Industrial Operations Technology (OT) cybersecurity platform. We take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devic

4.5(1)
Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific &

Australia flag

Security Operations

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology. The complexity, density and distribution of digital products and networks is

4.5(1)
White Pearl Technology Group (WPTG)

White Pearl Technology

Sweden flag

Compliance Consulting

WPTG are a global group that delivers a broad spectrum of ICT solutions and services, guiding its customers through business and digital transformations. Our main focus is on driving sustainable grow

4.5(1)
Aucae

Aucae

France flag

Security Awareness Training

Aucae providers a simple, intuitive and resilient SaaS solution for sovereign cyber crisis management. AUCAE's customers include public institutions and businesses in France and Europe. Accelerate aw

4.5(1)
Campus cyber

Campus cyber

France flag

Security Operations

A project initiated by the President of the Republic, the Cyber Campus is the totem site of cybersecurity that brings together the main national and international players in the field.

4.5(1)
A1 Digital

A1 Digital

Austria flag

Compliance Consulting

A1 Digital specializes in: end-to-end IoT solutions, Cloud-based solutions for IT and communications, Cybersecurity and Network as a service. With a team of experienced IoT, cloud, network, and secur

4.5(1)
Xiarch Solutions

Xiarch Solutions

India flag

Compliance Consulting

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface digitally, physically

4.5(1)
AVL Mobile Security

AVL Mobile Security

China flag

Threat Intelligence Platforms

AVL Mobile Security is a market-leading mobile security company for anti-virus and threat intelligence in the mobile Internet.

4.5(1)
ABM Technology Group

ABM Technology Group

United States flag

Compliance Consulting

ABM Technology Group (formerly True IT) provide business information technology services, solutions, and consulting for small to mid-sized organizations. CybersecurityOur team stays one step ahead in

4.5(1)
Almond

Almond

France flag

Compliance Consulting

Almond is positioned as a key independent French player in audit and consulting in the fields of Cybersecurity, Cloud and Infrastructure. Our DNA is made up of strong values shared by its 150 employe

4.5(1)
DMARC360

DMARC360

BH flag

Brand Protection

DMARC (Domain-based Message Authentication, Reporting and Conformance) is an email authentication protocol. It is designed to give email domain owners the ability to protect their domain from unauthor

4.5(1)
achelos

achelos

Germany flag

Industrial Control System Security

achelos is an independent software development company. We deliver innovative technical solutions covering specification, development and testing for micro-processor chips / security chips and embedde

4.5(1)
CROW - University of Waikato

CROW - University

New Zealand flag

Security Operations

The Cyber Security Researchers of Waikato (CROW) aim to return the control of data to you, the data owner, by focusing on research addressing data security from a user-centric perspective. In 2013, C

4.5(1)
Collibra

Collibra

United States flag

Governance Risk and Compliance Platforms

Collibra delivers a complete platform for data and AI governance, giving teams the visibility, control and confidence to turn data into a trusted asset. At Collibra, we empower organizations to unloc

4.5(1)
Wall Street Technology Association (WSTA)

Wall Street Technology

United States flag

Security Operations

The Wall Street Technology Association (WSTA) provides financial industry technology professionals, vendors, service providers, and consultants with forums to learn from and connect with each other. T

4.5(1)
Advania UK

Advania UK

United Kingdom flag

Compliance Consulting

Advania (formerly Content+Cloud) are one of Microsoft’s leading partners in the UK, specialising in Azure, Security, Dynamics 365 and Microsoft 365. By aligning ourselves to the evolution of Microsof

4.5(1)
Devoteam

Devoteam

France flag

Cloud Security

Devoteam is a AI-driven tech consulting firm specialised in cloud platforms, cyber, data, and sustainability. Tech native for almost 30 years, Devoteam guides businesses through sustainable digital tr

4.5(1)
Vysk Communications

Vysk Communications

United States flag

Security Operations

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication. Vysk’s unique 3-pronged approach to privacy - True End-to-End Encryption - is

4.5(1)
APCERT

APCERT

UN flag

Security Operations

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation. APCERT maintains a trusted network of

4.5(1)
Affinity Technology Partners

Affinity Technology Partners

United States flag

Compliance Consulting

Affinity Technology Partners has been fueling the growth of Nashville, Tennessee businesses and nonprofits with reliable IT services since 2002. Our team of IT experts handles everything from CIO str

4.5(1)
Empiric

Empiric

United Kingdom flag

Security Operations

Empiric is a multi-award winning technology and transformation recruitment agency specialising in data, digital, cloud and security. We supply specialist tech and change recruitment services to busine

4.5(1)
Arqit Quantum

Arqit Quantum

United Kingdom flag

Data Loss Prevention

QuantumCloud™ allows organisations to simplify and strengthen their encryption on a global basis, appliance-free. We’re moving away from a complex PKI infrastructure, and the need to trust third parti

4.5(1)
Runlayer

Runlayer

United States flag

Security Operations

Runlayer securely connects AI to the enterprise stack with custom threat detection, fine-grained permissions, and complete observability for AI deployments. Runlayer is redefining how AI works. Movin

4.5(1)
Aeries Technology

Aeries Technology

India flag

Compliance Consulting

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management. Our specialized offshore outsourcing capabilities w

4.5(1)
Valtori

Valtori

Finland flag

Security Operations

Government ICT Centre Valtori provides sector-independent ICT services for the central government, while taking into account the special requirements related to security and preparedness. Valtori har

4.5(1)
Agility Networks

Agility Networks

Brazil flag

Compliance Consulting

Agility Networks is a technology company providing integrated services and solutions for Digital Transformation and Cyber Security. - Security Assessment- Identity Governance- Application Security Li

4.5(1)
Heidrick & Struggles International

Heidrick & Struggles

United States flag

Security Operations

4.5(1)
N2K Networks

N2K Networks

United States flag

Security Awareness Training

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world. Trusted, independent, and authentic, we a

4.5(1)
Promptfoo

Promptfoo

United States flag

Security Operations

Promptfoo helps developers and enterprises build secure, reliable AI applications. Promptfoo discovers and eliminates major LLM risks before they are shipped to production. Its founders have experien

4.5(1)
Straiker

Straiker

United States flag

Security Operations

Straiker offers the first AI-native security platform designed to protect enterprise AI applications and autonomous agents from evolving threats through automated assessment and runtime guardrails. A

4.5(1)
CalypsoAI

CalypsoAI

United States flag

Security Operations

CalypsoAI build software products that solve complex AI risks for national security and highly-regulated industries. As AI expands into mission critical systems, there remain capability gaps in the a

4.5(1)
CIRT.GY

CIRT.GY

GY flag

Security Operations

CIRT.GY seeks to provide technical assistance to public and private agencies, and individuals to prevent and respond effectively to information security incidents of national importance.

4.5(1)
Cristie Data

Cristie Data

United Kingdom flag

Backup as a Service

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years. Our focused data storage, backup

4.5(1)
AKATI Sekurity

AKATI Sekurity

MY flag

Compliance Consulting

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics. With its extensive experience and capabilities in Information S

4.5(1)
Accolite Digital

Accolite Digital

United States flag

Compliance Consulting

Accolite is an innovative, design thinking software company that guarantees seamless digital experiences with maximum results. Backed by the best technical minds in the industry, and only the best cut

4.5(1)
Appranix

Appranix

United States flag

Backup as a Service

Appranix cloud application resilience makes your cloud applications significantly more reliable with an application environment level backup, cross-zone, cross-region, and cross-cloud disaster recover

4.5(1)
Experian

Experian

United Kingdom flag

Security Operations

Experian provide software solutions to help organizations prevent identity fraud and crime. Whether you are looking for an anti-money laundering solution, fraud prevention, age verification or want t

4.5(1)
Haechi Audit

Haechi Audit

KO flag

Security Operations

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients. Trusted by the in

4.5(1)
Allendevaux & Company

Allendevaux & Company

United States flag

Compliance Consulting

Allendevaux & Company is a full-service agency that helps organizations globally with their Cybersecurity, Data Protection, and Compliance requirements. We offer full-service cybersecurity solutions

4.5(1)
CANVAS Consortium

CANVAS Consortium

Switzerland flag

Security Operations

The CANVAS Consortium – Constructing an Alliance for Value-driven Cybersecurity – aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenge how

4.5(1)
Arcitura Education

Arcitura Education

Canada flag

Security Awareness Training

Arcitura™ Education Inc. is a leading global provider of progressive, vendor-neutral IT training and certification programs. Arcitura has been responsible for certifying IT professionals in over 60 c

4.5(1)
Assured Data Protection

Assured Data Protection

United Kingdom flag

Backup as a Service

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations. Assured DP has built a fully managed service overlay around their core

4.5(1)
Hellenic Accreditation System (ESYD)

Hellenic Accreditation System

GR flag

Security Operations

ESYD is the national accreditation body for Greece, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration services.

4.5(1)
FraudWatch International

FraudWatch International

Australia flag

Brand Protection

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation. FraudWatch

4.5(1)
Archivo

Archivo

United Kingdom flag

Backup as a Service

Archivo is a value added reseller focused on Disaster Recovery as a Service (DRaaS), backup, hyper-convergence, hybrid storage and Cyber security. We help our customers to protect themselves against

4.5(1)
SOC-E

SOC-E

Spain flag

Industrial Control System Security

SOC-E is a leading technology provider for high-availability and deterministic networking, sub-microsecond synchronization and cybersecurity solutions for critical sectors. With one of the most compr

4.5(1)
Ensconce Data Technology (EDT)

Ensconce Data Technology

United States flag

Security Operations

Ensconce Data Technology's focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed. All EDT products are manufac

4.5(1)
City Security Magazine

City Security Magazine

United Kingdom flag

Security Operations

City Security magazine helps promote best security practices and keep businesses informed on a wide variety of security-related issues with articles written by well-respected leaders in the security i

4.5(1)
Bird & Bird

Bird & Bird

United Kingdom flag

Security Operations

Bird & Bird is an international law firm with a focus on helping organisations being changed by technology and the digital world. Areas of expertise include cyber security. Our cybersecurity team has

4.5(1)
Gorilla Technology Group

Gorilla Technology Group

Taiwan flag

Industrial Control System Security

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes. Gorilla offers robust cyberse

4.5(1)
Cobalt Iron

Cobalt Iron

United States flag

Backup as a Service

Cobalt Iron is a global leader in SaaS-based enterprise backup and data protection technology. With Cobalt Iron’s backup SaaS solution, you can eliminate complexity, dramatically reduce the time you

4.5(1)
NDAY Security

NDAY Security

United States flag

Penetration Testing

NDAY Security provide a continuous exploitability platform designed to identify critical vulnerabilities in seconds. Continuous Threat Exposure Management (CTEM)More robust attack surface coverage (t

4.5(1)
Acronis

Acronis

Switzerland flag

Backup as a Service

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors. We empow

4.5(1)
Benchmark IT Services (BITS)

Benchmark IT Services

Australia flag

Backup as a Service

BITS is a leading cyber security company in Australia. Our certified professionals work with you to keep your data assets safe and secure. BITS provides comprehensive cyber security solutions to prot

4.5(1)
MAXXeGUARD Data Safety

MAXXeGUARD Data Safety

Netherlands flag

Security Operations

MAXXeGUARD easily destroys hard disks (hard drives) up to the highest security levels as well as other digital data carriers like SSD’s, LTO’s, USB’s, CD’s, PDA’s etc . With the MAXXeGUARD you can var

4.5(1)
Noerr

Noerr

Germany flag

Security Operations

Noerr is one of the top European law firms with 500 professionals in Germany, Europe and the USA. We deliver real value to our clients by devising and handling the right solutions to complex and sophi

4.5(1)
Celare

Celare

Israel flag

Threat Intelligence Platforms

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection, helping security professionals to better visibility of their networks

4.5(1)
MCPc

MCPc

United States flag

Governance Risk and Compliance Platforms

MCPc is a global data protection company that improves the security and well-being of our clients. We protect data, manage the complexity and sustainability of technology, empower employee performance

4.5(1)
42Gears

42Gears

India flag

Security Operations

42Gears is a leading Unified Endpoint Management provider. Secure, monitor and manage tablets, phones, desktops and wearables. Supported on Android, iOS and Windows platforms. We offer MDM, BYOD & Se

4.5(1)
SafeCipher

SafeCipher

United Kingdom flag

Data Loss Prevention

At SafeCipher, we pride ourselves on being your single vendor-neutral resource for navigating the complexities of cryptographic data encryption. Our expertise empowers businesses and institutions to s

4.5(1)
Association for Uncrewed Vehicle Systems International (AUVSI)

Association for Uncrewed

United States flag

Industrial Control System Security

The Association for Uncrewed Vehicle Systems International (AUVSI), the world's largest nonprofit organization dedicated to the advancement of uncrewed systems and robotics, represents corporations an

4.5(1)
AirCUVE

AirCUVE

KO flag

Security Operations

AirCUVE provide authentication and access control solutions for networks and mobile security. AirCUVE is a small giant venture business with a share of over 60% in the domestic (Korea) wireless secur

4.5(1)
Calero Software

Calero Software

United States flag

Security Operations

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services and

4.5(1)
Wisetek

Wisetek

Ireland flag

Security Operations

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers. L

4.5(1)
InstaSafe Technologies

InstaSafe Technologies

India flag

Security Operations

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

4.5(1)
YouWipe

YouWipe

Finland flag

Security Operations

Scandinavian Data Erasure Leader YouWipe is the number one choice of European Ministries, European Central Banks, Swiss Pharmaceuticals and Major Electronics Retail Chains. Our headquarters is located

4.5(1)
Frenos

Frenos

United States flag

Industrial Control System Security

The Frenos Platform is an AI-driven adversarial attack path simulation platform  focused on identifying the most probable successful adversary tactics, techniques, and procedures for the purpose of he

4.5(1)
Myntex

Myntex

Canada flag

Data Loss Prevention

Myntex is a leader in the development of end-to-end mobile security solutions, serving large and small enterprises, and high net worth individuals. Myntex owns and operates a Canadian Data Center, bo

4.5(1)
Zitec

Zitec

RO flag

Compliance Consulting

One of Europe's largest and most prominent full-cycle software development services companies, Zitec is the digital transformation partner to companies across many geographies, including the USA, Cana

4.5(1)
Liverton Security

Liverton Security

New Zealand flag

Compliance Consulting

Liverton Security is a New Zealand-owned cyber security provider who offers SEEMail, SmartGate, MailAdviser and other security-related products to government and commercial customers throughout New Ze

4.5(1)
GeoEdge

GeoEdge

United States flag

Brand Protection

GeoEdge is the premier provider of ad security and quality solutions for the online and mobile advertising ecosystem. GeoEdge guards against non-compliance, malware, inappropriate content, data leaka

4.5(1)
Blockfence

Blockfence

Israel flag

Security Operations

Blockfence are a seasoned crew versed in enterprise-grade cybersecurity and crypto, on a mission to collaboratively shape the future of Web3 security. Blockfence is a Web3 infrastructure uniting top

4.5(1)
Get Safe Online

Get Safe Online

United Kingdom flag

Security Awareness Training

Get Safe Online is a leading source of unbiased, factual and easy-to-understand information on online safety.

4.5(1)
Forum Systems

Forum Systems

United States flag

Security Operations

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments worldwide for over

4.5(1)
Adit Ventures

Adit Ventures

United States flag

Security Operations

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT. Adit seeks to capitalize on long-term secular trends i

4.5(1)
Matrix42

Matrix42

Germany flag

Security Operations

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant. The innovative software supports the integration of physical, vir

4.5(1)
ChainSecurity

ChainSecurity

Switzerland flag

Security Operations

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts research and development in the areas of security, program analysis, and machine learnin

4.5(1)
Zybert Computing

Zybert Computing

United Kingdom flag

Security Operations

Zybert Computing provide server solutions with built-in security and information protection features for the SME market. Our servers protect your business information without the need for additional

4.5(1)
Hacken

Hacken

EE flag

Penetration Testing

Hacken is a cybersecurity ecosystem that ensures the safety of IT companies and digital environments. We provide a range of cybersecurity services including security assessments, blockchain security a

4.5(1)
CodeOne

CodeOne

KO flag

Security Operations

CodeOne provides solutions for website and web app security. SafeCode Web Application Vulnerability hardening Solution consists of secure libraries which help to fix discovered vulnerabilities, and m

4.5(1)
Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation

Spain flag

Security Operations

BDIH is a connected network of advanced manufacturing assets and services Infrastructure for training, research, testing and validation available for companies. It consists of a digitally-linked netw

4.5(1)
Bonfy.AI

Bonfy.AI

United States flag

Security Operations

Bonfy.AI prevents incidents in the use and communication of AI and human generated content, providing visibility and proactive risk mitigation of confidentiality, privacy, compliance, and integrity ex

4.5(1)
Abu Dhabi Gov Digital

Abu Dhabi Gov

United Arab Emirates flag

Security Operations

Gov Digital (formerly Abu Dhabi Digital Authority - ADDA) enable, support and deliver a digital government that is proactive, personalised, collaborative and secure. We enable government-wide digital

4.5(1)
Business Intelligence Associates (BIA)

Business Intelligence Associates

United States flag

Digital Forensics and Incident Response

For over a decade, BIA has been developing and implementing defensible, technology driven software solutions complimented by mature professional services that reduce the costs and risks related to lit

4.5(1)
Air IT

Air IT

United Kingdom flag

Managed Security Service Providers

Air IT are a responsive, client-focused and award-winning Managed Service Provider, helping clients achieve success and transformation through their IT and communications. Air Sec is the specialist c

4.5(1)
Westminster eForum

Westminster eForum

United Kingdom flag

Security Operations

Wesrtminster eForum runs a series of conferences on matters relating to the UKs Digital Strategy. Topics include Smart Cities and Cyber Security. Westminster eForum is a cross-party forum within West

4.5(1)
DataTribe

DataTribe

United States flag

Security Operations

DataTribe is a cyber startup foundry, leveraging deep experience and expertise to build and launch successful product companies. Work with the DataTribe team to co-build your company. Experienced for

4.5(1)
Automation & Cyber Solutions (ACS)

Automation & Cyber

Saudi Arabia flag

Industrial Control System Security

Automation & Cyber Solutions (ACS) delivers a range of Industrial Automation and Cyber solutions & services to sectors including Oil & Gas, Chemicals & Petrochemicals, Water Treatment, Power and other

4.5(1)
DreamIt Ventures

DreamIt Ventures

United States flag

Security Operations

DreamIt Ventures is an early stage venture fund that accelerates startups building transformative tech products in the fields of healthcare, real estate/built environment, and security.DreamIt offers

4.5(1)
Evolution Equity Partners

Evolution Equity Partners

United States flag

Security Operations

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Based in N

4.5(1)
AC3

AC3

Australia flag

Cloud Security

AC3 is a leading secure cloud services provider, focused on turning your technology challenges into real results. Technology comes with a lot of promise, but in a lot of cases, is always more complic

4.5(1)
Rentalworks

Rentalworks

Singapore flag

Security Operations

Rentalworks is a leading provider of Internet-of-Things (IoT) Asset Lifecycle Management Services including secure data erasure and disposal. Rentalworks provides secure data destruction software and

4.5(1)
Amyna Systems

Amyna Systems

United States flag

Industrial Control System Security

Amyna has developed an IoT cybersecurity platform that prevents malignant attacks, helping users to protect themselves from cyberattacks. Amyna protection sets a new standard for privacy and access o

4.5(1)
Alias Robotics

Alias Robotics

Spain flag

Industrial Control System Security

Alias Robotics is a robot cyber security company. Founded upon previous experiences in robotics, we take a roboticists' approach to cyber security and deliver security solutions for robots and their c

4.5(1)
AgilePQ

AgilePQ

United States flag

Industrial Control System Security

AgilePQ visibly secures IoT devices worldwide to protect the privacy, safety, and well-being of all people. Because IoT devices have small processors, limited memory, and low power consumption, curre

4.5(1)
Arista Middle East

Arista Middle East

Saudi Arabia flag

Industrial Control System Security

Arista Middle East is part of Global Arista Technologies specializing in OT Cybersecurity. Our company is focused on creating value by solving cybersecurity challenges using innovative methodology co

4.5(1)
EYE Security

EYE Security

Netherlands flag

Compliance Consulting

Cyber Guard from EYE is an all-in-one package with which you can easily, effectively and affordably ensure the digital security of your company. The system focuses on preventive measures and strong de

4.5(1)
Conceal

Conceal

United States flag

Threat Intelligence Platforms

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser ensuring employee p

4.5(1)
Armexa

Armexa

United States flag

Industrial Control System Security

Armexa is a leading provider of advanced industrial cybersecurity solutions that protect your critical OT and ICS infrastructure against ever-changing threats. We leverage in-depth multidisciplinary

4.5(1)
Xilinx

Xilinx

United States flag

Industrial Control System Security

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. Our highly flexible, programmable silicon, enabled by a suite of advanced software and tools, drives rapid innovation across a

4.5(1)
DNX Ventures

DNX Ventures

United States flag

Security Operations

Based in Silicon Valley and Tokyo, DNX Ventures is an early stage VC for B2B startups in sectors including Cybersecurity. DNX Ventures was an early investor in Cylance, helping the company expand its

4.5(1)
AutoSec

AutoSec

Sweden flag

Industrial Control System Security

AutoSec supports the FFI program Electronics, Software and Communication by dissemination and exploitation of the results of projects related to automotive cybersecurity. FFI – Strategic Vehicle Rese

4.5(1)
BT Security

BT Security

United Kingdom flag

Cloud Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure. Specialties include Superfast broadband, Fixed-line voice, Mobile, Networke

4.5(1)
Assystem

Assystem

France flag

Industrial Control System Security

Assystem is a French engineering company specialised in managing complex projects. Assystem operates in the sectors of nuclear, conventional energy, transportation, life sciences, health and industry.

4.5(1)
Azeti Networks

Azeti Networks

Germany flag

Industrial Control System Security

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecommunications, oil and gas, manufacturing, finance and healthcare. Azeti's remote asset management softw

4.5(1)
Academic Centres of Excellence in Cyber Security Research

Academic Centres of

United Kingdom flag

Security Operations

The Academic Centres of Excellence in Cyber Security Research (ACE-CSRs) scheme is jointly managed by the Engineering & Physical Sciences Research Council (EPSRC), the Department for Business, Energy

4.5(1)
appNovi

appNovi

UN flag

Security Operations

Cyber assets are more than infrastructure. They are devices, users, applications, code, and more. appNovi inventories everything to map the attack surface, identify missing security agents, and priori

4.5(1)
3DOT Solutions

3DOT Solutions

United Kingdom flag

Compliance Consulting

3DOT Solutions is a cybersecurity consultancy focused on delivering end-to-end cyber security solutions for private and public sector customers with some of the most demanding cyber and IT security ch

4.5(1)
Xage Security

Xage Security

United States flag

Industrial Control System Security

The Xage Security Suite creates an adaptive any-to-any Blockchain-secured IIoT communication fabric for cooperation, management and data exchange among devices, applications and people. Secure local

4.5(1)
X-PHY

X-PHY

United States flag

Security Operations

X-PHY is a pioneering cybersecurity company dedicated to hardware-based cybersecurity solutions that protect data at its core. Built on the principle of Security by Design, X-PHY embeds protection dir

4.5(1)
AI or Not

AI or Not

UN flag

Security Operations

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions. AI or Not is a web service that helps users quickly and accurately determine whether an image has b

4.5(1)
CLUSIS

CLUSIS

Switzerland flag

Security Operations

CLUSIS is an association for the information security industry in Switzerland providing awareness, training, professional development and a forum for the exchange of information in information securit

4.5(1)
Alethea

Alethea

United States flag

Security Operations

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation. Disinformation is an informati

4.5(1)
Attestiv

Attestiv

United States flag

Security Operations

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing. In an age where fake and AI-generated photos, videos and documents have prol

4.5(1)
Certif AI

Certif AI

United States flag

Security Operations

At Certifi AI, we're implementing safeguards on advancing AI with the mission to detect, distinguish and verify the authenticity of digital content. We focus on providing a solution that actively pro

4.5(1)
Alkira

Alkira

United States flag

Cloud Security

Alkira has reinvented networking for the cloud era by delivering the network cloud, the first global unified network infrastructure with on-demand hybrid and multi-cloud connectivity, integrated netwo

4.5(1)
Akheros

Akheros

France flag

Threat Intelligence Platforms

Akheros is a software development lab, producing resident cybersecurity learning algorithms, which learns machines’ informational behavior in order to anticipate, detect and prevent offensive and inco

4.5(1)
Altipeak Security

Altipeak Security

Switzerland flag

Security Operations

Altipeak Security provide Safewalk - a flexible and robust authentication platform through which we offer improved security to SMBs, corporates, banks, insurance companies, the healthcare industry and

4.5(1)
TenIntelligence

TenIntelligence

United Kingdom flag

Brand Protection

TenIntelligence provides due diligence, brand protection and fraud investigation services with offices in London & Dubai. Fraud investigation services include digital forensics.

4.5(1)
Transportation Security Administration (TSA) - USA

Transportation Security Administration

United States flag

Security Operations

The Transportation Security Administration is a component agency of the U.S. Department of Homeland Security (DHS), committed to securing the nation’s transportation systems to ensure safe and efficie

4.5(1)
Arcanum Information Security (AIS)

Arcanum Information Security

United Kingdom flag

Compliance Consulting

4.5(1)
LEXORA.BY

LEXORA.BY

BY flag

Penetration Testing

4.5(1)
Cloud4C

Cloud4C

Singapore flag

Cloud Security

Cloud4C is a leading automation-driven, application focused cloud Managed Services Provider. Future-proof your enterprise on AI-powered, compliant Cloud with Cloud4C end-to-end managed cybersecurity

4.5(1)
Anjolen

Anjolen

United States flag

Compliance Consulting

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services. We understand the challenges faced by businesses to increase efficiency by integrating technology into daily produ

4.5(1)
Arcfield

Arcfield

United States flag

Compliance Consulting

Arcfield protects the nation and its allies through innovations in systems engineering and integration, space and mission launch assurance, cybersecurity, and missile support. The company has more tha

4.5(1)
BHC Laboratory

BHC Laboratory

EE flag

Compliance Consulting

BHC Laboratory is a cyber capabilities’ development company for a wide range of global customers.

4.5(1)
DarkFindR

DarkFindR

France flag

Security Operations

DarkFindR offers a solution for continuous monitoring of the dark web to prevent and reduce the impact of your digital risks. As cyber-attacks ramp up, the majority of companies remain unaware of the

4.5(1)
Aviva

Aviva

United Kingdom flag

Security Operations

Aviva provides Cyber Liability cover for small to mid-market customers to help combat the threat of data and privacy breach. Our Cyber Cover is designed to help combat the increasing threat of data l

4.5(1)
BCyber

BCyber

Switzerland flag

Digital Forensics and Incident Response

BCyber is a Swiss Cyber Security company that provides security products, training, and managed services to protect diverse IT and OT environments against cyber, physical, and cyber-physical threats.

4.5(1)
BruCERT

BruCERT

BN flag

Security Operations

Brunei National Computer Emergency Response Team ( BruCERT ) was established in May 2004. It was formed in collaboration with AITI, the Ministry of Communication, to become the nation’s first trusted

4.5(1)
CloudEndure

CloudEndure

Israel flag

Backup as a Service

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud. CloudEndure® provides Disaster Recovery and Live Migration for all applications, allowing enterprises to mobilize entire

4.5(1)
Awen Collective

Awen Collective

United Kingdom flag

Digital Forensics and Incident Response

Awen Collective develops software-based tools for performing Digital Forensics, Incident Response and Cyber-Crime Investigation of ICS, SCADA, IIoT and Robotics. These tools come together in one holis

4.5(1)
Fairfirst Insurance

Fairfirst Insurance

LK flag

Security Operations

Fairfirst Insurance Limited, is a business entity registered under the global Fairfax Group, a property and casualty insurer, reinsurer and investment manager. Fairfirst is the leading general insuran

4.5(1)
Beazley Security

Beazley Security

United States flag

Compliance Consulting

Beazley Security is a global cyber security firm committed to helping clients develop true cyber resilience: the ability to withstand and recover from any cyberattack. We combine decades of cyber sec

4.5(1)
Cirosec

Cirosec

Germany flag

Compliance Consulting

Cirosec is a specialized company with a focus on information security. We carry out pentests & audits and advise our customers in the German-speaking countries on information and IT security issues.

4.5(1)
AMSYS Innovative Solutions

AMSYS Innovative Solutions

United States flag

Managed Security Service Providers

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider that can give your business the support it needs. At AMSYS Cyber Security, we know how important it is to mana

4.5(1)
Accurics

Accurics

United States flag

Cloud Security

Accurics enables self-healing cloud native infrastructure by codifying security throughout your development lifecycle. At Accurics, we envision a world where organizations can innovate with confidenc

4.5(1)
Aphelio

Aphelio

France flag

Compliance Consulting

Aphelio is a company specialising in cybersecurity, operating throughout France to support companies and local authorities in the protection of their information systems. Our areas of expertise are v

4.5(1)
BlueRiSC

BlueRiSC

United States flag

Digital Forensics and Incident Response

BlueRiSC invent cutting-edge system assurance solutions for the 21st century with novel software and hardware designs focusing on security technologies that can be game changing. Our approaches span f

4.5(1)
Towergate Insurance

Towergate Insurance

United Kingdom flag

Security Operations

Towergate Insurance is a leading UK specialist insurance broker. Business products include Cyber Liability Insurance. Protect yourself against cyber security risks with our cyber insurance:- Data rec

4.5(1)
Sovereign Intelligence

Sovereign Intelligence

United States flag

Brand Protection

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company. Our Mission is to make sense of the world's data so people c

4.5(1)
Centum Digital

Centum Digital

Spain flag

Compliance Consulting

Centum Digital provide services, products and solutions specialized in communications engineering, control and signal intelligence. We operate mainly in the Aerospace, Defense, Emergency, Security and

4.5(1)
Clayden Law

Clayden Law

United Kingdom flag

Security Operations

At Clayden Law we advise global businesses that buy and sell technology products and services. It’s what we do day-in-day-out. So, unlike many other law firms: This specialist approach has establishe

4.5(1)
AIoTrust

AIoTrust

France flag

Industrial Control System Security

AIoTrust builds embedded systems designed to bring real-time visibility and cyber integrity to the heart of industrial operations. Our easy-to-install sensor captures raw electrical signals directly

4.5(1)
Virus Bulletin

Virus Bulletin

United Kingdom flag

Security Operations

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape, as well as c

4.5(1)
Nucleus Security

Nucleus Security

United States flag

Security Operations

Nucleus is a vulnerability and risk management platform that integrates with your scanning tools, asset inventories, issue trackers, ticketing systems, SIEMs and more to automate and orchestrate your

4.5(1)
Awareness Software Limited (ASL)

Awareness Software Limited

United Kingdom flag

Backup as a Service

As Hosting Specialists, we offer practical and affordable hosting solutions to suit all environments, including cloud-based, SAP Business One and Microsoft Dynamics hosting. We offer a variety of cyb

4.5(1)
InformationWeek

InformationWeek

United States flag

Security Operations

InformationWeek is the world's most trusted online community for business technology professionals like you. Our community members include thought-leading CIOs, CTOs, IT VPs and managers, along with h

4.5(1)
BH Consulting

BH Consulting

Ireland flag

Compliance Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity. Robust data protection and cybe

4.5(1)
Backup112

Backup112

Denmark flag

Backup as a Service

Backup112 has been delivering professional cloud backup services since 2004. Backup112 provides an automated and unattended backup service ensuring that data held on desktops, laptops, physical and v

4.5(1)
Advanced Systems International SAC

Advanced Systems International

Peru flag

Data Loss Prevention

Advanced Systems international is a global company dedicated to data security software design, development, support, and licensing. USB Device Control is an important part of Endpoint Security Manage

4.5(1)
CONCORDIA

CONCORDIA

Belgium flag

Security Operations

CONCORDIA is a Cybersecurity Competence Network with leading research, technology, and competences to build the European Secure, Resilient and Trusted Ecosystem.

4.5(1)
AXA XL

AXA XL

United States flag

Security Operations

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance. Strong cybersecurity requires teamwork—and so does strong cybersecurity insurance. We ha

4.5(1)
CIP Cyber

CIP Cyber

UN flag

Security Awareness Training

CIP Cyber is an online learning community with a mission of connecting, training, and certifying cybersecurity professionals to protect critical infrastructure. We offer interactive courses, informat

4.5(1)
Bit4id

Bit4id

Spain flag

Security Operations

Bit4id Group are leading digital transformation by providing the best technologies for electronic signature, online authentication, cybersecurity and all other services based on the concept of digital

4.5(1)
Apricorn

Apricorn

United States flag

Data Loss Prevention

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest. Apricorn’s unique approach to em

4.5(1)
Arcium

Arcium

Switzerland flag

Data Loss Prevention

Arcium is an encrypted supercomputer. It revolutionizes the way the Internet handles data by enabling digital interactions, applications, and infrastructure to operate in a fully encrypted state. Deve

4.5(1)
DataExpert Singapore

DataExpert Singapore

Singapore flag

Digital Forensics and Incident Response

DataExpert SIngapore is a professional information security and digital forensics company, established since 2014. We provide products, services, and training courses in the areas of information secu

4.5(1)
Brit

Brit

United Kingdom flag

Security Operations

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks. It has a major presence in Lloyd’s of London, the world’s specialist insurance market provid

4.5(1)
Xiphera

Xiphera

Finland flag

Industrial Control System Security

Xiphera designs and implements proven cryptographic security for embedded systems. Our strong cryptographic expertise and extensive experience in digital system design enable us to help our customers

4.5(1)
Holiseum

Holiseum

France flag

Compliance Consulting

Holiseum delivers innovative cybersecurity solutions for the critical infrastructure organizations, as well as cybersecurity services and consulting. Holiseum offers a holistic approach of cybersecur

4.5(1)
bwtech@UMBC

bwtech@UMBC

United States flag

Security Operations

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

4.5(1)
MailGuard

MailGuard

Australia flag

Threat Intelligence Platforms

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment. MailGuard’s proprietary “Hybrid AI (Artificial Intelligence)

4.5(1)
Eden Legal

Eden Legal

United Kingdom flag

Security Operations

Eden Legal provides an experienced, modern, prevention-based, solution-focussed service to avoid, progress and solve commercial and regulatory issues affecting digital businesses. Adam Farr is the fo

4.5(1)
Atakama

Atakama

United States flag

Data Loss Prevention

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture. Using multi-factor encryption, Atakama provides exceptional data

4.5(1)
Comunet

Comunet

Australia flag

Cloud Security

For over 30 years, Comunet has been a trusted Australian cybersecurity partner, delivering specialised consulting, governance, risk and compliance services including ISM, ISO 27001 consulting, and pro

4.5(1)
Concise Technologies

Concise Technologies

United Kingdom flag

Backup as a Service

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe. Conc

4.5(1)
Pradeo

Pradeo

France flag

Security Operations

Pradeo Security offers a complete, automatic and seamless protection to mobile devices and applications, aligned with your organization security policy while preserving business agility. Mobility is

4.5(1)
Bastazo

Bastazo

United States flag

Governance Risk and Compliance Platforms

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation. Bastazo's Spartan is a tool for better vul

4.5(1)
Security Engineered Machinery (SEM)

Security Engineered Machinery

United States flag

Security Operations

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

4.5(1)
CyberTee

CyberTee

France flag

Security Operations

CyberTee is an Alliance designed for and by independent cybersecurity professionals to address the talent shortage. The Alliance brings together a community of over 450 consultants. It provides a frie

4.5(1)
BUNKR

BUNKR

United States flag

Data Loss Prevention

BUNKR asserts that every human on Earth deserves bank-level security for their valuable information and communications. That’s why we designed BUNKR from the ground up with security and privacy at th

4.5(1)
Argantic

Argantic

South Africa flag

Cloud Security

Argantic aims to help organisations thrive and reach their full potential in a modern cloud-centric era. The company was founded 7 years ago with the aim to focus on delivering software and infrastruc

4.5(1)
Agile Defense

Agile Defense

United States flag

Compliance Consulting

Agile Defense is an Information Technology services provider, delivering leading-edge Digital Transformation solutions to the Federal Government. Our capabilities include Cloud Services, DevSecOps, C

4.5(1)
CelcomDigi

CelcomDigi

MY flag

Cloud Security

CelcomDigi aspire to be Malaysia’s top Telco-Tech company, transforming beyond core connectivity to lead digitalization and innovation as part of nation-building. We believe that connectivity improve

4.5(1)
Attaxion

Attaxion

United States flag

Governance Risk and Compliance Platforms

Attaxion is an External Attack Surface Management (EASM) Platform. Attaxion builds on decades of joint cybersecurity expertise from our founders, team members, and advisors. We stand at the forefront

4.5(1)
Aegis Security

Aegis Security

Singapore flag

Penetration Testing

Based in Singapore, Aegis Security is a digital security company that works with the local government and private companies. Our mission is to support our clients, and secure their systems against po

4.5(1)
Zacco

Zacco

Denmark flag

Brand Protection

Zacco offer an all-embracing 360° perspective on intellectual property: From patent filing, trademark registration and design protection to software development, digital brand protection, cyber securi

4.5(1)
AlAnsari Technical Solutions (ATS)

AlAnsari Technical Solutions

KW flag

Compliance Consulting

ATS is a Kuwait based company specialised in delivering hardware/software, Virtualisation, IP Telephony / Unified Communication, Networking and professional IT services and solutions. By combining an

4.5(1)
Axonius

Axonius

United States flag

Governance Risk and Compliance Platforms

Axonius is the only cybersecurity asset management platform that provides organizations with complete visibility and automated policy validation on all assets, devices, and users. Axonius integrates

4.5(1)
Cypherleak

Cypherleak

United Arab Emirates flag

Governance Risk and Compliance Platforms

Cypherleak provide Automated Cyber Risk Monitoring & Ai powered cyber recommendations. With Cypherleak, you can automatically and passively monitor your cyber risks, understand your cyber risk rating

4.5(1)
Gigacycle

Gigacycle

United Kingdom flag

Security Operations

Gigacycle is one of the leading IT disposal and recycling providers in the UK. We specialise in IT asset disposal (ITAD) and data destruction. Our ISO certifications include ISO 27001, ISO 9001, ISO

4.5(1)
DeXpose

DeXpose

United States flag

Security Operations

DeXpose is a hybrid dark/deep web monitoring and attack surface mapping platform integrating human intelligence with automated workflows to help you find compromised data or exposed assets related to

4.5(1)
BioConnect

BioConnect

Canada flag

Security Operations

BioConnect provide biometric access control solutions to verify a person’s identity across physical, IOT and digital applications. The result is exact identity assurance, cybersecurity and protection

4.5(1)
ERI

ERI

United States flag

Security Operations

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States. ERI holds the highest level of certificat

4.5(1)
NOYB

NOYB

Austria flag

Security Operations

NOYB is a non-profit organization aiming to close the gap between privacy laws and the reality of corporate practice. Europe already has stringent privacy and consumer protection laws but lacks effect

4.5(1)
Magic Software Enterprises

Magic Software Enterprises

Israel flag

Security Operations

4.5(1)
IONIX

IONIX

Israel flag

Security Operations

IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your real attack surface and its digital supply

4.5(1)
Prolimax

Prolimax

Ireland flag

Security Operations

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD). Our solution for desktops, laptops, ser

4.5(1)
AllegisCyber Capital

AllegisCyber Capital

United States flag

Security Operations

AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets. The objective of AllegisCyber is to create a

4.5(1)
Covenco

Covenco

United Kingdom flag

Backup as a Service

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do. Our D

4.5(1)
Zanutix Consulting

Zanutix Consulting

JM flag

Cloud Security

At Zanutix, we are dedicated to providing top-notch IT solutions to businesses of all sizes. With a team of highly skilled and experienced professionals, we specialize in a wide range of services incl

4.5(1)
Cyberport

Cyberport

HK flag

Security Operations

Cyberport is an innovative digital community with over 1,500 start-ups and technology companies. Cyberport is committed to nurturing a vibrant tech ecosystem by cultivating talent; promoting entrepren

4.5(1)
Belle de Mai Incubator

Belle de Mai

France flag

Security Operations

Belle de Mai Incubator supports and funds innovative startup ideas in digital industries. Belle de Mai Incubator is the only French incubator to be labeled by the Department of National Education, th

4.5(1)
Battery Ventures

Battery Ventures

United States flag

Security Operations

Battery partners with talented founders and teams building category-defining businesses at all stages of growth. Founded in 1983, Battery is a global, technology-focused investment firm with offices

4.5(1)
Zeroday Ops

Zeroday Ops

India flag

Penetration Testing

Our goal is to lead innovation in autonomous vulnerability scanning, combining scalability, speed, and accuracy to stay ahead of emerging threats and evolving attack surfaces. We’re building a produc

4.5(1)
Boeing

Boeing

United States flag

Security Operations

Boeing is the world's largest aerospace company and leading manufacturer of commercial jetliners, defense, space and security systems. Boeing provides a comprehensive suite of interactive solutions i

4.5(1)
C3iHub

C3iHub

India flag

Industrial Control System Security

C3iHub was set up under the National Mission on Interdisciplinary Cyber-Physical Systems (NM-ICPS) in 2020 with funding from the Department of Science and Technology to drive technology development, t

4.5(1)
CyberE71

CyberE71

United Arab Emirates flag

Security Operations

CyberE71 is an ambitious initiative serving as an umbrella for the UAE’s cybersecurity innovation ecosystem. This program is designed not only to identify and support the ideas of students and recent

4.5(1)
DHCO IT

DHCO IT

United Kingdom flag

Backup as a Service

DHCO IT provides IT services to small and medium-sized businesses across Scotland and Northern England. The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery,

4.5(1)
Crosspring

Crosspring

Netherlands flag

Security Operations

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business and / or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity an

4.5(1)
IberLayer

IberLayer

Spain flag

Threat Intelligence Platforms

IberLayer is the company behind the Email Guardian service, a cloud based Email Total Protection system that filters and blocks, APT, Ransomware, Spam, Malware, Scams, Phishing, massive Marketing camp

4.5(1)
Cyber7

Cyber7

Israel flag

Security Operations

CYBER7 is a National Cyber Security Innovation community initiated by Israel National Cyber Directorate, Ministry of Economy and Israel Innovation Authority led by Tech7 – Venture Studio. The goal of

4.5(1)
Early Game Ventures (EGV)

Early Game Ventures

RO flag

Security Operations

Early Game Ventures (EGV) invests in startups that jumpstart new industries in the emerging markets of Europe. We are interested in: cloud, RPA, blockchain, electric vehicles, NPL, big data, AI, ML,

4.5(1)
Fortyx Security

Fortyx Security

United Kingdom flag

Security Operations

Fortyx are reimaging email security for the AI era. AI native protection against phishing, BEC, data leaks and AI crafted scams, and agentic AI workflows that make email security ops 5× faster. Email

4.5(1)
ZM CIRT

ZM CIRT

ZM flag

Security Operations

ZM CIRT is the national Computer Incident Response Team for Zambia. The constituency consists of the Zambia Government , including but not limited to, Governmental ministries and agencies, public uti

4.5(1)
Lavabit

Lavabit

United States flag

Data Loss Prevention

Developed by Lavabit, the Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet. Radically different from a

4.5(1)
Libraesva

Libraesva

Italy flag

Security Operations

Libraesva secures email communications for organisations, helping them eliminate email borne threats, preserve email data and provide an environment for their people to communicate safely. With an in

4.5(1)
LockMagic

LockMagic

United States flag

Data Loss Prevention

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization. Our patented identity-based encrypti

4.5(1)
mxHERO

mxHERO

United States flag

Security Operations

mxHERO is a San Francisco, California-based software company and creator of the Mail2Cloud digital bridge. mxHERO's cloud-based email technology allows enterprise customers and public sector agencies

4.5(1)
Zuratrust

Zuratrust

Spain flag

Threat Intelligence Platforms

Zuratrust provide protection for all kinds of email related cyber attacks. Zuratrust is an independent verification channel, based on the same principle second factor authentication relies on. It all

4.5(1)
xorlab

xorlab

Switzerland flag

Threat Intelligence Platforms

xorlab is a Swiss cybersecurity company providing specialized, machine-intelligent defense against highly engineered, sophisticated and targeted email attacks. xorlab ActiveGuard is a proactive commu

4.5(1)
Phished

Phished

Belgium flag

Security Awareness Training

Phished is an AI-driven platform that focuses on the human side of cybersecurity. By combining fully automated training software with personalised, realistic simulations of cyberattacks. Organisation

4.5(1)
OutKept

OutKept

Belgium flag

Security Awareness Training

OutKept offers phishing prevention for organisations. We execute the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alert

4.5(1)
MazeBolt Technologies

MazeBolt Technologies

Israel flag

Threat Intelligence Platforms

Israel-based MazeBolt is an innovation leader in cybersecurity, with over two decades of experience in pioneering DDoS protection solutions.

4.5(1)
Aira Security

Aira Security

United States flag

Security Operations

Aira Security delivers runtime security for AI agents. As enterprises deploy agents into production with little oversight, we provide the security layer that monitors behavior, blocks unsafe actions a

4.5(1)
Q-Integrity (Q-I)

Q-Integrity (Q-I)

Switzerland flag

Security Operations

Q-Integrity offer AI powered solutions to detect and stop image / video manipulation and fraud, ensuring digital content integrity. Award-winning multimodal AI detectors. Revolutionary SaaS AI Soluti

4.5(1)
Law Enforcement Cyber Center (LECC)

Law Enforcement Cyber

United States flag

Security Operations

4.5(1)
Certera

Certera

United States flag

Data Loss Prevention

Certera is a modern and affordable SSL Certificate provider of the world's leading Certificate Authorities such as Certera, Sectigo, and Comodo. At CerteraSSL online security and data protection is o

4.5(1)
Aeriandi

Aeriandi

United Kingdom flag

Security Operations

Aeriandi is a leading provider of hosted PCI security compliance solutions for call centres, trusted by high street banks and major Telcos. Our award winning secure voice solutions are being used by

4.5(1)
IdentifAI

IdentifAI

Italy flag

Security Operations

At identifAI, we develop cutting-edge AI solutions to combat the growing threats of deepfakes and fakenews. Our mission is to empower individuals, organizations, and platforms with the ability to ver

4.5(1)
Echoworx

Echoworx

Canada flag

Data Loss Prevention

Echoworx primary and exclusive focus is providing organizations with secure email services. A smarter, more adaptive email encryption solution. Only Echoworx customizable encryption offers you 8 diff

4.5(1)
AML Solutions

AML Solutions

New Zealand flag

Security Operations

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services. These services include preparing Risk Assessments, setting up new or helping wi

4.5(1)
AML Global Solutions (AMLGS)

AML Global Solutions

United Kingdom flag

Compliance Consulting

AMLGS delivers bespoke face-to-face Financial Crime prevention training programmes and consultancy services encompassing Anti-Money Laundering (AML), Counter Terrorism Financing (CTF), Bribery & Corru

4.5(1)
Computing Technology Industry Association (CompTIA)

Computing Technology Industry

United States flag

Security Awareness Training

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy. The Computing Technolo

4.5(1)
Fibernet

Fibernet

Israel flag

Security Operations

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity. Fibernet has developed Physical Cybersecu

4.5(1)
Resemble AI

Resemble AI

United States flag

Security Operations

Resemble AI helps more than 1.5 million creators use Generative Voice AI technology to craft immersive and dynamic experiences. As we push the boundaries of generative voice AI innovation, we also le

4.5(1)
Authorize.Net

Authorize.Net

United States flag

Security Operations

Authorize.Net is a Payment Gateway which provides the complex infrastructure and security necessary to ensure fast, reliable and secure transmission of transaction data. The Authorize.Net Payment Gat

4.5(1)
Bluecyber Insurance

Bluecyber Insurance

Brazil flag

Security Operations

At Bluecyber, we are revolutionizing the cyber insurance market, democratizing access to digital protection for small and medium-sized businesses. Our unique and innovative approach allows us to offer

4.5(1)
Aversafe

Aversafe

Singapore flag

Security Operations

Aversafe provides individuals, employers and certificate issuers around the world with a first line of defense against credential fraud. Aversafe is committed to combatting credential fraud by provid

4.5(1)
Blackbird.AI

Blackbird.AI

United States flag

Security Operations

Blackbird.AI provides an intelligence and early-warning system to help users detect disinformation and take action against threats. Disinformation manipulates the public and damages trust in institut

4.5(1)
Bureau

Bureau

United States flag

Governance Risk and Compliance Platforms

Bureau is a no-code, identity decisioning platform that offers businesses the complete range of risk, compliance and ongoing fraud monitoring solutions innovated with AI. Using next-generation orches

4.5(1)
BPC Banking Technologies

BPC Banking Technologies

Switzerland flag

Security Operations

BPC Banking Technologies creates payments solutions that inspire change and progress for businesses and people everywhere. We are the architect and developer of the market-leading SmartVista platform

4.5(1)
YL Ventures

YL Ventures

Israel flag

Security Operations

YL Ventures funds and supports brilliant Israeli tech entrepreneurs from seed to lead. Based in Silicon Valley and Tel Aviv, YL Ventures manages $260 million focused on deep - technology sectors and

4.5(1)
Charm Security

Charm Security

Israel flag

Security Operations

Charm Security is an AI-powered customer security platform that protects organizations and their customers from scams, social engineering, and human-centric fraud. By combining real-time AI-driven in

4.5(1)
Civo

Civo

United Kingdom flag

Cloud Security

Civo isn’t just another cloud and AI platform, it’s a whole new way of thinking. Designed to challenge traditional models, we’ve built a new kind of cloud, defined a better business model to support i

4.5(1)
ClosingLock

ClosingLock

United States flag

Security Operations

ClosingLock is the leading provider of wire fraud prevention software for the real estate industry. ClosingLock provides the industry-leading solution for securely sharing wire information, while rem

4.5(1)
CCL Solutions Group

CCL Solutions Group

United Kingdom flag

Digital Forensics and Incident Response

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors. We bring together digital forensics,

4.5(1)
Defentry

Defentry

Sweden flag

Security Awareness Training

Defentry have created an Ecosystem that lets our users easily monitor, train and resolve their digital security issues. We are here to build a safer world. We have developed the world’s first platfor

4.5(1)
Verifi

Verifi

United States flag

Security Operations

Verifi is an award-winning provider of end-to-end payment protection and risk management solutions. Verifi’s patented collaboration platform enables the sharing of near real-time data between cardhol

4.5(1)
Asimily

Asimily

United States flag

Industrial Control System Security

Asimily’s IoMT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care. Risk assessment – and threats – aren’t a static target. But

4.5(1)
Brainloop

Brainloop

Germany flag

Data Loss Prevention

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall. Brainloop is a leading board portal and secure collaborati

4.5(1)
Argentra

Argentra

Singapore flag

Compliance Consulting

Argentra is a specialist engineering company, we have years of experience developing custom security software and providing security risk consulting. Large System Integrators, Software Principals and

4.5(1)
Enzoic

Enzoic

United States flag

Security Operations

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection. Enzoic is focused on account takeover (ATO) preventi

4.5(1)
Agio

Agio

United States flag

Compliance Consulting

Agio provide Managed IT & Cybersecurity for Financial Firms. Our industry-specific expertise and AI-powered service delivery transform reactive support into proactive prevention. The result is a consi

4.5(1)
Veriff

Veriff

United States flag

Security Operations

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market. We help banks, marketplaces, and other online businesses start trusting relationshi

4.5(1)
Zighra

Zighra

Canada flag

Security Operations

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications. Zighra’s SensifyID delivers rapid, real-time behavioral intell

4.5(1)
Astran

Astran

France flag

Data Loss Prevention

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches. Say goodbye to the struggle of safeguarding data with traditional encryption keys

4.5(1)
Binarly

Binarly

United States flag

Security Operations

Binarly is a global firmware and software supply chain security company founded in 2021. The company’s flagship Binarly Transparency Platform is an enterprise-class, AI-powered solution used by devic

4.5(1)
Cycuity

Cycuity

United States flag

Security Operations

Cycuity was created as Tortuga Logic in 2014 by co-founders with a shared vision: to revolutionize cybersecurity with trusted microelectronics. Today, we remain committed to the belief that a secure

4.5(1)
Claroty

Claroty

United States flag

Industrial Control System Security

Claroty was conceived to secure and optimize OT networks that run the world’s most critical infrastructures. Claroty empowers the people who run and protect industrial systems to make the most of the

4.5(1)
Caveonix

Caveonix

United States flag

Cloud Security

Caveonix’s RiskForesight TM solution is an automated, proactive risk and compliance platform designed for hybrid and multi-cloud. It implements CSPM capabilities in addition to including built-in inte

4.5(1)
Fortanix

Fortanix

United States flag

Data Loss Prevention

Fortanix has built a new category Runtime Encryption using Intel SGX. Just like encryption today protects data at rest and data during motion, Runtime Encryption keeps keys, data, and applications com

4.5(1)
FortifyIQ

FortifyIQ

United States flag

Security Operations

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum. We accomplish this by offering a pre-silicon evaluation toolset built to test hard

4.5(1)
ACET Solutions

ACET Solutions

United States flag

Industrial Control System Security

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients. Our experienced and certified consultants help protect your indust

4.5(1)
Achtwerk

Achtwerk

Germany flag

Industrial Control System Security

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants. IRMA (Industry Risk Management Automation) is an industrial computer syste

4.5(1)
Ascent Solutions

Ascent Solutions

United States flag

Compliance Consulting

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud. Emerging technologies and constantly evolving threats

4.5(1)
CyDeploy

CyDeploy

United States flag

Security Operations

CyDeploy helps organizations seamlessly understand the impact of technology changes — like patches and digital transformations — on their environment. Our platform provides cutting-edge features to e

4.5(1)
Knocknoc

Knocknoc

Australia flag

Security Operations

Knocknoc is a novel yet elegant approach to removing attack surface. Your infrastructure becomes invisible until users authenticate, eliminating pre-auth exposure across distributed IT and OT environ

4.5(1)
Kontron

Kontron

Germany flag

Industrial Control System Security

Kontron is a global leader in embedded computing technology (ECT). As a part of technology group S&T, Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Th

4.5(1)
Envelop Risk

Envelop Risk

United Kingdom flag

Security Operations

Envelop Risk is a global specialty cyber insurance firm, combining decades of insurance industry expertise with sophisticated cyber and artificial intelligence-based analytics. Our artificial intelli

4.5(1)
NewAE Technology

NewAE Technology

Canada flag

Security Operations

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors. NewAE Technology

4.5(1)
CounterFind

CounterFind

United States flag

Brand Protection

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites. Using hundreds of data points and AI tec

4.5(1)
IronScales

IronScales

Israel flag

Threat Intelligence Platforms

IronScales combines human intelligence with machine learning to automatically prevent, detect and respond to email phishing attacks. To address the challenges of email phishing, IronScales has develo

4.5(1)
Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in

United Kingdom flag

Industrial Control System Security

The UK Research Institute in Secure Hardware and Embedded Systems (RISE), funded by the Engineering and Physical Science Research Council (EPSRC) and the National Cyber Security Centre (NCSC) seeks to

4.5(1)
Graphus

Graphus

United States flag

Threat Intelligence Platforms

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users with no intervention necessary from IT

4.5(1)
Access Venture Partners

Access Venture Partners

United States flag

Security Operations

Access Venture Partners are an early stage VC firm investing in bold founders and helping every step of the way. We are passionate about supporting our portfolio & the founders we work with. when we

4.5(1)
SECQAI

SECQAI

United Kingdom flag

Industrial Control System Security

At SECQAI we create dual-use hardware and software to enable the future of computing. Military-Grade Security for IoTWe develop ultra-secure memory-safe hardware with post-quantum secure accelerators

4.5(1)
SolidRun

SolidRun

Israel flag

Industrial Control System Security

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure, support embedded and IoT markets, and give rise to the vast a

4.5(1)
CirrusHQ

CirrusHQ

United Kingdom flag

Cloud Security

CirrusHQ are a Specialist AWS Advanced Consulting Partner with a focus on Cloud Management, DevOps, Migration and Consulting Services for the private and public sectors. Wherever you are on your clou

4.5(1)
Anura

Anura

United States flag

Security Operations

The world’s most accurate ad fraud solution protects your web assets by eliminating bots, malware and human fraud, ensuring your content is seen by real people. Anura takes the guesswork out of ad fr

4.5(1)
1Kosmos

1Kosmos

United States flag

Security Operations

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology. 1Kosmos is the world’s only cybersecurity solut

4.5(1)
Airtel Secure

Airtel Secure

India flag

Managed Security Service Providers

Airtel Secure’s multi-layered, full service cybersecurity offerings are designed to safeguard enterprises against threats of various kinds and origins.

4.5(1)
CyberMindr

CyberMindr

United States flag

Governance Risk and Compliance Platforms

CyberMindr is a SaaS platform for Automated & Continuous Attack Path and Threat Exposure Discovery helps you to proactively identify & assess your attack surface to mitigate associated threats. Cyber

4.5(1)
Cypherd Technologies

Cypherd Technologies

PH flag

Compliance Consulting

Cypherd Technologies Corp. is a cybersecurity firm dedicated to protecting digital infrastructures in an ever-evolving technological landscape. Established by experienced professionals with extensive

4.5(1)
1Touch.io

1Touch.io

United States flag

Governance Risk and Compliance Platforms

4.5(1)
Ascent Cyber

Ascent Cyber

United Kingdom flag

Compliance Consulting

Ascent Cyber provide simple and stress-free solutions to protect your business and its customers from the worries and costs of cybercrime. Ascent Cyber are bringing a Government approved level of cyb

4.5(1)
Cellopoint

Cellopoint

Taiwan flag

Data Loss Prevention

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products. We specialize in security defense, anti-spam, anti-virus, anti-APT, auditing, archiving and

4.5(1)
AET Europe

AET Europe

Netherlands flag

Security Operations

AET Europe is specialised in creating technological solutions for user identification and authentication. The company is leader in digital ID technology which enables for example Governments 24/7 acc

4.5(1)
Acsense

Acsense

Israel flag

Security Operations

Acsense's mission is to eliminate IAM as a single point of failure, mitigating threats such as ransomware, insider attacks and human error. At Acsense, we understand the complexities and challenges o

4.5(1)
Newtech Recycyling

Newtech Recycyling

United States flag

Security Operations

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle. We provide full IT asset disposition services including asset auditing, re

4.5(1)
CipherMail

CipherMail

Netherlands flag

Data Loss Prevention

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest. CipherMail is used by va

4.5(1)
Anametric

Anametric

United States flag

Data Loss Prevention

Anametric is developing new technologies and devices for chip scale quantum photonics, with a focus on cybersecurity. The company enjoys a close working relationship with Southern Methodist Universit

4.5(1)
Deduce

Deduce

United States flag

Security Operations

The Deduce Collective Intelligence Platform uses a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication sol

4.5(1)
ALSCO

ALSCO

United States flag

Compliance Consulting

ALSCO is dedicated to bringing first class IT services, technical support, and solutions to goverment, companies and organizations worldwide. ALSCO is a managed service provider as well as a world-cl

4.5(1)
ADGS

ADGS

QA flag

Security Operations

ADGS is a deeptech company focused in the fields of Agent-Based simulations (Emergent Behavior), Cybersecurity and Biometrics, Social Dynamics, Natural Language Processing and Artificial Intelligence.

4.5(1)
Andreessen Horowitz (a16z)

Andreessen Horowitz (a16z)

United States flag

Security Operations

Andreessen Horowitz (known as "a16z") is a venture capital firm in Silicon Valley, California that backs bold entrepreneurs building the future through technology. The firm is led by general partners

4.5(1)
Avalon Cyber

Avalon Cyber

United States flag

Compliance Consulting

Arm your organization in the fight against cyberattacks by partnering with the experts at Avalon Cyber. As a full-service managed security services provider (MSSP), Avalon Cyber offers security asses

4.5(1)
Effectiv

Effectiv

United States flag

Security Operations

Effectiv is a real-time fraud & risk management platform for Financial Institutions and Fintechs. Effectiv’s AI-powered no-code platform enables your risk team to be in control of all fraud & complia

4.5(1)
VeriClouds

VeriClouds

United States flag

Security Operations

VeriClouds is a password verification service that helps organizations detect compromised passwords and stop account takeover attacks. Account Takeover attacks are the new attack vector of choice for

4.5(1)
Vyntra Global

Vyntra Global

Switzerland flag

Security Operations

Vyntra is a global leader in transaction intelligence, formed from the merger of NetGuardians and Intix. Combining deep expertise in financial crime prevention and transaction data management, Vyntra

4.5(1)
ClearVector

ClearVector

United States flag

Cloud Security

ClearVector is the identity-driven cloud security company. In realtime, the ClearVector platform discovers, instruments, maps activity to identities, and provides productized cloud expertise to help

4.5(1)
BigBear.ai

BigBear.ai

United States flag

Security Operations

BigBear.ai delivers high-end analytics capabilities across the data and digital spectrum to deliver information superiority and decision support. BigBear.ai provides a comprehensive suite of solution

4.5(1)
Badge

Badge

United States flag

Security Operations

Each day there are over 100B authentications that rely on stored user information like passwords, secrets, biometric templates, and private keys. With Badge, there are no crown jewels to steal. Badge

4.5(1)
Mercury Systems

Mercury Systems

United States flag

Security Operations

Mercury Systems is the leader in making trusted, secure mission-critical technologies profoundly more accessible to aerospace and defense. Protect mission-critical technologies at chip scaleIn today'

4.5(1)
RNTrust

RNTrust

United Arab Emirates flag

Data Loss Prevention

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment. RNTrust is a leading EMEA provide

4.5(1)
Aptum

Aptum

Canada flag

Backup as a Service

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network. Aptum Protect provides comprehensive protectio

4.5(1)
Auth0

Auth0

United States flag

Security Operations

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device. It's modern identity infrastru

4.5(1)
AON

AON

United Kingdom flag

Governance Risk and Compliance Platforms

Aon is a leading global provider of risk management (including cyber), insurance and reinsurance brokerage, human resources solutions and outsourcing services. The Aon Professional Risk Solutions tea

4.5(1)
Barclay Simpson

Barclay Simpson

United Kingdom flag

Security Operations

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

4.5(1)
Adlumin

Adlumin

United States flag

Governance Risk and Compliance Platforms

Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure. With one license and one platform, its p

4.5(1)
Direct Recruiters Inc

Direct Recruiters Inc

United States flag

Security Operations

Direct Recruiters has been recognized as the relationship-focused search firm that assists IT Security and Cybersecurity companies with recruiting, acquiring and retaining high-impact talent for missi

4.5(1)
Zip Security

Zip Security

United States flag

Governance Risk and Compliance Platforms

Zip Security make it easy to deploy, configure, and manage key security tools like cross platform device management (MDM), endpoint detection and response (EDR), and more. Zip's platform streamlines

4.5(1)
Averon

Averon

United States flag

Security Operations

Averon is on a mission to restore sanity in online identity. Our conversion-increasing innovations instantly authenticate mobile users, creating a world where we can all move safely and efficiently ar

4.5(1)
Axiomatics

Axiomatics

Sweden flag

Security Operations

Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The comp

4.5(1)
BIO-key

BIO-key

United States flag

Security Operations

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions. BIO-key’s core software engine is built on a fingerprint a

4.5(1)
ACA Group

ACA Group

United States flag

Governance Risk and Compliance Platforms

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services. ACA Compliance Group was founded in 2002 by four former SEC regulators and one former state regulator. Th

4.5(1)
AFCERT

AFCERT

AF flag

Security Operations

AFCERT is the national Computer Emergency Response Team for Afghanistan. AFCERT operates as first responder to cyber and computer incidents in Afghanistan. We closely cooperate with law enforcement i

4.5(1)
BruCON

BruCON

Belgium flag

Security Operations

BruCON aims to become the best and most fun hacking and security event in Belgium and W. Europe offering a high quality line up of speakers, opportunities of networking with peers, hacking challenges

4.5(1)
Axitea

Axitea

Italy flag

Managed Security Service Providers

Axitea designs, implements and develops the solutions best suited to its customers’ needs and their physical and cyber security requirements. All Axitea's activities and services are market- and cust

4.5(1)
UKAS

UKAS

United Kingdom flag

Security Operations

UKAS is the national accreditation body for the United Kingdom, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration

4.5(1)
BAE Systems

BAE Systems

United Kingdom flag

Compliance Consulting

BAE Systems develop, engineer, manufacture, and support products and systems to deliver military capability, protect national security and people, and keep critical information and infrastructure secu

4.5(1)
Aura Information Security

Aura Information Security

New Zealand flag

Compliance Consulting

Aura Information Security consists of a team of highly-skilled and renowned information security professionals spanning Australia and New Zealand. We offer an unprecedented range of services and leve

4.5(1)
Borderless CS

Borderless CS

Australia flag

Compliance Consulting

Borderless CS's primary goal is to empower Australian businesses by strengthening data protection, enhancing cyber confidence, and raising cybersecurity maturity. We are a leading cybersecurity speci

4.5(1)
ClearHub

ClearHub

United Kingdom flag

Security Operations

Do you struggle to find reliable Atlassian contractors that have the skills you need? ClearHub are the only dedicated Atlassian contractor network. With built-in support. The aim of ClearHub is simpl

4.5(1)
BreachRx

BreachRx

United States flag

Security Operations

BreachRx is the first intelligent incident response management platform that provides operational resilience for the entire enterprise. At BreachRx, our vision is to enable organizations to achieve o

4.5(1)
C3.ai Digital Transformation Institute

C3.ai Digital Transformation

United States flag

Security Operations

The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society. The Institute engages the w

4.5(1)
ANIS

ANIS

RO flag

Security Operations

ANIS represents the interests of Romanian IT companies and supports the development of the software and services industry, as well as the growth of companies involved both in outsourcing projects and

4.5(1)
WiSecure Technologies

WiSecure Technologies

Taiwan flag

Data Loss Prevention

WiSecure Technologies aims to develop cryptographic products meeting requirements in the new economic era. Unlike typical hardware security firms prioritizing "contemporary compliance context", we gua

4.5(1)
Association of Azerbaijani Cyber Security Organizations (AKTA)

Association of Azerbaijani

AZ flag

Security Operations

The Association of Azerbaijani Cyber Security Organizations (AKTA) is a non-commercial organization aimed at strengthening the country's cybersecurity system. AKTA is a single platform for experts, c

4.5(1)
Arab Information & Communication Technologies Organization (AICTO)

Arab Information &

TN flag

Security Operations

The Arab ICT Organization (AICTO) is an Arab governmental organization working under the aegis of the league of Arab States. It aims at developing ICTs throughout the Arab region and providing the ne

4.5(1)
BSA - The Software Alliance

BSA - The

United States flag

Security Operations

BSA is the leading advocate for the global software industry before governments and in the international marketplace. Its members are among the world's most innovative companies, creating software so

4.5(1)
Cognizant

Cognizant

United States flag

Industrial Control System Security

Cognizant is a leading provider of information technology, business consulting, enterprise applications, and business process services. Security - Cognizant Security Services offer security platforms

4.5(1)
AVR International

AVR International

United Kingdom flag

Cloud Security

AVR educate, advise, analyse and provide professional, technical consultancy and support to ensure your business is safe, compliant and protected. AVR International provide Cyber, UEM, and Cloud mana

4.5(1)
Cybersecurity Collaborative

Cybersecurity Collaborative

United States flag

Security Operations

CISOs working with CISOs for "real-time" security solutions. The bad guys are more connected than ever, and that has to change. The Cybersecurity Collaborative is led by a seasoned group of Founding M

4.5(1)
Babble

Babble

United Kingdom flag

Cloud Security

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage. Always available, Secure computing. We integr

4.5(1)
UK Cyber Security Council (UKCSC)

UK Cyber Security

United Kingdom flag

Security Operations

The role of The UK Cyber Security Council is to champion the cybersecurity profession across the UK, provide broad representation for the industry, accelerate awareness and promote excellence in the p

4.5(1)
SAIF Check

SAIF Check

Saudi Arabia flag

Security Operations

SAIF Check is the first AI systems risk assessment and mitigation solution in the MENA region and is working to fulfill the goals of Saudi Arabia's Vision 2030 through safety and security in technolog

4.5(1)
Vicarius

Vicarius

Israel flag

Security Operations

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution. Vicarius is committed to leading the pack in vulnerability remediation. Our prod

4.5(1)
eCentre@LindenPointe

eCentre@LindenPointe

United States flag

Security Operations

We're committed to promoting technology startup innovation and entrepreneurship in the Ohio-Pennsylvania interstate region, by providing a supportive environment, including infrastructure, education,

4.5(1)
WithSecure

WithSecure

Finland flag

Compliance Consulting

WithSecure (formerly F-Secure Business) is your reliable cyber security partner. IT service providers, MSSPs and businesses – along with the largest financial institutions, manufacturers, and thousand

4.5(1)
Fletch

Fletch

United States flag

Security Operations

Fletch is an early warning system, alerting users about the most important threats 7-10 days before the news. Fletch’s AI tracks the evolving cybersecurity threat landscape by reading and interpretin

4.5(1)
Xalient

Xalient

United Kingdom flag

Cloud Security

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies, delivering innovative solutions and services t

4.5(1)
APT Search

APT Search

United Kingdom flag

Security Operations

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors. We help data and security organisations grow. Our AI technologies enable deep searchin

4.5(1)
ADVA Optical Networking

ADVA Optical Networking

Germany flag

Security Operations

ADVA is a company founded on innovation and focused on helping our customers succeed. Our technology forms the building blocks of a shared digital future and empowers networks across the globe. The A

4.5(1)
Benchmark Executive Search

Benchmark Executive Search

United States flag

Security Operations

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets. As a

4.5(1)
Careers in Cyber Security (CiCS)

Careers in Cyber

United Kingdom flag

Security Operations

CareersinCyberSecurity, part of the CareersinAudit Group, is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals. The site c

4.5(1)
CIBR Warriors

CIBR Warriors

United States flag

Security Operations

CIBR Warriors are a leading cyber security and networking staffing company that provides workforce solutions with businesses nationwide in the USA. We specialize in connecting top Cyber Security and

4.5(1)
Cymulate

Cymulate

Israel flag

Security Operations

Designed for companies that want to manage their security posture against the evolving threat landscape. Cymulate's SaaS-based platform deploys within an hour, enabling security professionals to conti

4.5(1)
Dice

Dice

United States flag

Security Operations

Dice is a leading recruitment platform, helping technology professionals manage their careers and employers connect with highly skilled tech talent in specialist areas including cybersecurity. For pr

4.5(1)
Etonwood

Etonwood

United Kingdom flag

Security Operations

Etonwood specialises in infrastructure and vendor technology recruitment in areas including cloud platforms, cyber security and service management. We provide adaptable talent search that is closely

4.5(1)
Questex Asia Total Security Conference

Questex Asia Total

Singapore flag

Security Operations

Questex Asia is an integrated provider of technology and business media covering Asia and emerging markets. Questex Asia’s Total Security Conference is one of the industry’s most reputed forums for t

4.5(1)
Focus on Security

Focus on Security

United Kingdom flag

Security Operations

Focus on Security are Cyber Security recruitment specialists. We’re dedicated to connecting you with the top Cyber Security talent across the globe. We focus on partnerships and results. Focus on Sec

4.5(1)
HireVergence

HireVergence

United States flag

Security Operations

HireVergence is a full service IT staffing and recruiting firm with a focus on cyber and information security. Information security is in our DNA and it’s why we’re the best at what we do. We underst

4.5(1)
ID R&D

ID R&D

United States flag

Security Operations

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics. With one of the strongest R&D teams in the industry, ID R&D consistently delivers innovative,

4.5(1)
Fujitsu

Fujitsu

Japan flag

Compliance Consulting

Fujitsu is a global leader in digital services that transform organizations and the world around us.  We aim to make the world more sustainable by building trust in society through innovation. We tak

4.5(1)
AaDya

AaDya

United States flag

Security Operations

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses. The size of your business, or budget, shouldn't limit your ability to combat cy

4.5(1)
Trapezoid

Trapezoid

United States flag

Security Operations

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure. The Tr

4.5(1)
Cloud53

Cloud53

United Kingdom flag

Cloud Security

Clolud53 is a Manchester based Managed Cyber Security & Cloud company providing solutions focused around you. We manage and protect you in the Cloud. Maintaining cybersecurity in a constantly evolvin

4.5(1)
Corrata

Corrata

Ireland flag

Security Operations

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.  Our patent-pending software solution enables organizations to defend against mobile threats, block

4.5(1)
GigaOm

GigaOm

United States flag

Security Operations

GigaOm's mission is to provide enterprises with information and analysis to help them make better decisions about technology. GigaOm is a technology research and analysis firm. Our focus is on helpin

4.5(1)
Bolt Learning

Bolt Learning

United Kingdom flag

Security Awareness Training

Cyber-crime is an ever-increasing risk to businesses and individuals and as such is a priority for a company to train everyone in their roles and responsibilities. At Bolt, we have designed our Cyber

4.5(1)
Bolster

Bolster

United States flag

Brand Protection

Bolster (formerly RedMarlin) is an AI-based cyber-security platform designed to detect phishing and fraudulent sites in real-time. The platform integrates into existing systems and is built to effici

4.5(1)
Xcede

Xcede

United Kingdom flag

Security Operations

Xcede are global technology recruitment specialists. We connect companies with exceptional professionals who empower growth. Founded in 2003, our vertical specialists provide global transformational

4.5(1)
Aembit

Aembit

United States flag

Security Operations

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads. Aembit provides seamless and secure access from your workloads to the serv

4.5(1)
UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for

Ireland flag

Security Operations

UCD Centre for Cybersecurity and Cybercrime Investigation (CCI) is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

4.5(1)
Backup Technology

Backup Technology

United Kingdom flag

Backup as a Service

Founded in 2005, Backup Technology has become a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market, with an international customer base from a wide range of sect

4.5(1)
Emergence Insurance

Emergence Insurance

Australia flag

Security Operations

Emergence is an insurance underwriting agency, focused on providing insurance solutions to help protect businesses and families against their cyber risks.

4.5(1)
VdS

VdS

Germany flag

Governance Risk and Compliance Platforms

VdS is an independent safety and security testing institution. Cybersecurity services include standards, audit/assessment and certification for small and medium-sized enterprises (SMEs). VdS has deve

4.5(1)
Sentryc

Sentryc

Germany flag

Brand Protection

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient. Brand Protection M

4.5(1)
Cansure

Cansure

Canada flag

Security Operations

Cansure is a leading insurance provider in Canada offering a broad range of property & casualty insurance solutions including Cyber & Data Breach insurance. Cansure has designed an affordable and com

4.5(1)
Czech Accreditation Institute

Czech Accreditation Institute

CZ flag

Security Operations

Czech Accreditation Institute is the national accreditation body for the Czech Republic, responsible for assessing the competence and capability of organisations that provide certification, testing, i

4.5(1)
689cloud

689cloud

VN flag

Data Loss Prevention

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared. This means that important content such as confidential documents

4.5(1)
CUIng.org

CUIng.org

Netherlands flag

Security Operations

Criminal Use of Information Hiding (CUIng) Initative was officially launched in June 2016 with the support by Europol's European Cybercrime Centre (EC3) to tackle the problem of criminal exploitation

4.5(1)
101 Blockchains

101 Blockchains

United States flag

Security Awareness Training

101 Blockchains is a professional and trusted provider of enterprise blockchain research and training. Our core mission is to train leading enterprise professionals to become global blockchain experts

4.5(1)
Astaara

Astaara

United Kingdom flag

Security Operations

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics. Astaara provides maritime companies with a comprehensi

4.5(1)
Eastern Cyber Resilience Centre (ECRC)

Eastern Cyber Resilience

United Kingdom flag

Governance Risk and Compliance Platforms

The Eastern Cyber Resilience Centre is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019. The WCRC began its journey in November 2020. Led by Policing and facili

4.5(1)
AmWINS Group

AmWINS Group

United States flag

Security Operations

AmWINS are a global specialty insurance distributor with expertise in property, casualty and professional lines including cyber liability. AmWINS has launched an exclusive Cyber Umbrella Program, kno

4.5(1)
European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training

Netherlands flag

Security Awareness Training

The primary aim of the European Cybercrime Training and Education Group (ECTEG) is to provide experience and knowledge to further enhance the coordination of cybercrime training, by identifying opport

4.5(1)
Future Crime Research Foundation (FCRF)

Future Crime Research

India flag

Security Operations

Future Crime Research Foundation is an IIT Kanpur incubated Start-Up (Non-Profit NGO) specializing in Research in Cyber Security, Digital Crime, Fraud Risk Management, Cyber Laws and Cyber Forensics.

4.5(1)
Crisis24

Crisis24

Canada flag

Compliance Consulting

Crisis24 is a leading integrated risk management, crisis response, consulting, and global protective solutions firm, serving the world's most influential people, disruptive brands, and prominent organ

4.5(1)
US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber

United States flag

Security Operations

U.S. Fleet Cyber Command reports directly to the Chief of Naval Operations as an Echelon II command and is responsible for Navy information network operations, offensive and defensive cyberspace opera

4.5(1)
DAkkS

DAkkS

Germany flag

Security Operations

DAkkS is the national accreditation body for Germany, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration services.

4.5(1)
Verax AI

Verax AI

United States flag

Security Operations

Verax AI provides solutions which mitigate privacy and security risks within organisations adopting AI, enabling them to manage a safe, and responsible environment to do so. Verax Protect helps organ

4.5(1)
Bastille

Bastille

United States flag

Security Operations

Bastille is the first company to enable enterprise security teams to assess and mitigate the risk associated with the growing 'Internet of Radios'. Bastille’s patented software and security sensors b

4.5(1)
Codenotary

Codenotary

United States flag

Security Operations

Our mission is to ensure the safety of your software, and ensure that your software is trustworthy. We provide a comprehensive suite of verification and enforcement services to guarantee the integrity

4.5(1)
Swiss Accreditation Service (SAS)

Swiss Accreditation Service

Switzerland flag

Security Operations

SAS is the national accreditation body for Switzerland, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration service

4.5(1)
King & Spalding

King & Spalding

United States flag

Security Operations

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security. This covers a broad range of legal issues

4.5(1)
Business Resilience International Management (BRIM)

Business Resilience International

United Kingdom flag

Governance Risk and Compliance Platforms

Business Resilience International Management (BRIM) is engaged by law enforcement in the UK and overseas to advise on establishing and developing Cyber Resilience Centres (CRCs) for business. A CRC p

4.5(1)
Bottomline Technologies

Bottomline Technologies

United States flag

Security Operations

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure. Our Cyber Fraud and Risk Management solut

4.5(1)
Catalyst Campus For Technology & Innovation

Catalyst Campus For

United States flag

Security Operations

Catalyst Campus is designed as a collaborative ecosystem where industry, small business, workforce training, entrepreneurs, start-ups and venture capital intersect with the diverse resources of Southe

4.5(1)
AFRY

AFRY

Sweden flag

Compliance Consulting

AFRY is a world leading engineering company, trusted as a supplier of services and solutions within the industry, energy, and infrastructure sectors as well as for authorities. At AFRY X, we've broug

4.5(1)
GMO Cyber Security

GMO Cyber Security

Japan flag

Compliance Consulting

GMO Cyber Security is an information security company that focuses mainly on vulnerability diagnosis. It is Japan's leading white hat hacker organisation. We have a menu of white hat hackers who spec

4.5(1)
Accenture

Accenture

Ireland flag

Compliance Consulting

Accenture is a leading global professional services company providing a range of strategy, consulting, digital, technology & operations services and solutions including cybersecurity. Accenture Secur

4.5(1)
Greensafe IT

Greensafe IT

United Kingdom flag

Security Operations

Greensafe is one of the most certified IT recycling companies in the UK; reassuring customers that we are focused on security, processes and quality of service. Greensafe offer various onsite and off

4.5(1)
TUV Sud

TUV Sud

Germany flag

Compliance Consulting

TÜV SÜD is a leading technical service organisation. We specialize in testing, certification, auditing, training, and advisory services for different industries. Our aim is to inspire trust in techno

4.5(1)
MobileIron

MobileIron

United States flag

Security Operations

MobileIron provides Enterprise Mobility Management (EMM) capabilities to IT organizations that need to secure mobile devices, applications and content. The MobileIron EMM solution is a mobile securit

4.5(1)
Aristi Labs

Aristi Labs

United States flag

Cloud Security

Aristi Labs provides comprehensive security solutions to help businesses protect data and intellectual property, minimizing downtime and maximizing productivity. Our mission is to insure high availab

4.5(1)
Kubus Hitam

Kubus Hitam

ID flag

Compliance Consulting

Kubus Hitam (PT Kubus Hitam Indonesia) are a research-based company focused on cyber security. Kubus Hitam is a young company that believes and invests in the youth. Kubus Hitam ’s mission is entrust

4.5(1)
Techmeme

Techmeme

United States flag

Security Operations

Techmeme is an online news curation service focused on leading edge technology. Coverage includes cyber security. Techmeme presents a summary of the day's essential reports and analysis on a single p

4.5(1)
National Cyber-Forensics & Training Alliance (NCFTA) - USA

National Cyber-Forensics &

United States flag

Digital Forensics and Incident Response

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats. Effectively disrupting serious cyber threats, often

4.5(1)
Philippine National Police Anti-Cybercrime Group (PNP-ACG)

Philippine National Police

PH flag

Security Operations

The mission of the PNP Anti-Cybercrime Group is to implement and enforce pertinent laws on cybercrime and other cyber related crimes and pursue an effective anti-cybercrime campaign. The Anti-Cybercr

4.5(1)
Axiom Security

Axiom Security

Israel flag

Security Operations

Axiom provides Security and IT teams with an Access Management platform designed to streamline permission requests, approvals, and management for Cloud, SaaS, and Databases. Leveraging the cloud's ag

4.5(1)
Octopus Cybercrime Community

Octopus Cybercrime Community

France flag

Security Operations

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence. The online tools – Country Wiki profiles on cybercrime legislation and policies, trai

4.5(1)
Searchlight Cyber

Searchlight Cyber

United Kingdom flag

Threat Intelligence Platforms

Searchlight Cyber is a leading darknet intelligence company.  Working with law enforcement, industry, and end users to help protect society against the threats of the darknet. Our sophisticated suite

4.5(1)
North West Cyber Resilience Centre (NWCRC)

North West Cyber

United Kingdom flag

Governance Risk and Compliance Platforms

The North West Cyber Resilience Centre is a trusted, not-for-profit venture between Greater Manchester Police and Manchester Digital. It is our ambition that every business within our region will hav

4.5(1)
Ciphero

Ciphero

United States flag

Security Operations

Ciphero aims to tackle the security challenges posed by the rapid adoption of AI in enterprise environments. It provides an AI verification layer designed to capture, check, and govern all AI interac

4.5(1)
Armenia Startup Academy

Armenia Startup Academy

AM flag

Security Operations

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity. Armenia Startup Academy is a game-changing entrepreneurship a

4.5(1)
Corvus Insurance

Corvus Insurance

United States flag

Security Operations

Corvus' mission is to create a safer, more productive world through technology-enabled commercial insurance. Corvus is a commercial InsurTech company. We leverage big data, IoT, and the latest digita

4.5(1)
Police Digital Security Centre (PDSC)

Police Digital Security

United Kingdom flag

Security Awareness Training

PDSC is a not-for-profit organisation, owned by the police, that works across the UK in partnership with industry, government, academia and law enforcement. We firmly believe that the overwhelming maj

4.5(1)
ActiveFence

ActiveFence

Israel flag

Threat Intelligence Platforms

ActiveFence enables Trust & Safety teams to be proactive about online integrity so they can keep their users safe from online harm – across content formats, languages, and abuse areas. Established wi

4.5(1)
ARCON

ARCON

United States flag

Governance Risk and Compliance Platforms

ARCON is a globally recognized Identity-As-A-Service provider with a wealth of experience in risk management and continuous risk assessment tools. Our award-winning solutions portfolio includes our P

4.5(1)
Bob's Business

Bob's Business

United Kingdom flag

Security Awareness Training

Bob's Business adopts a fresh approach to information security awareness and compliance training. Delivering key information through the use of short animated movies maximises user engagement and rete

4.5(1)
Zenzero

Zenzero

United Kingdom flag

Managed Security Service Providers

Zenzero simplifies technology adoption and supports our customers through managed and outsourced IT support. Our cyber security solutions We work in partnership with our customers, following the Nati

4.5(1)
Hexagate

Hexagate

Israel flag

Security Operations

Hexagate is at the forefront of blockchain threat prevention and automated risk management, leveraging advanced machine learning and a proprietary invariant monitoring engine to proactively detect and

4.5(1)
Cipher Net Shield

Cipher Net Shield

United Kingdom flag

Digital Forensics and Incident Response

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital. Leveraging blo

4.5(1)
Airlock Digital

Airlock Digital

Australia flag

Threat Intelligence Platforms

Airlock Digital was created after many years of experience in implementing whitelisting/ allowlisting solutions in Federal Government and various enterprises in Australia. Unlike signature based file

4.5(1)
Cyberra Legal Services (CLS)

Cyberra Legal Services

India flag

Security Operations

Cyberra Legal Services is a premier organization in cyber law advisory, cyber crime consultancy, cyber law compliance audit, cyber security services, cyber forensics services and cyber training (law,

4.5(1)
Ericom Software

Ericom Software

United States flag

Security Operations

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

4.5(1)
International Organization for Standardization (ISO)

International Organization for

Switzerland flag

Security Operations

ISO is an independent, non-governmental international standards organization with a membership of 163 national standards bodies. Through its members, it brings together experts to share knowledge and

4.5(1)
OCM Business Systems

OCM Business Systems

United Kingdom flag

Security Operations

We ensure you maximise revenue from your end of life IT & EPoS assets, guarantee that your data will be erased securely, all hardware components and materials will be processed, recycled or disposed o

4.5(1)
Action1

Action1

United States flag

Security Operations

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network using plain

4.5(1)
Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for

Sweden flag

Security Operations

SWEDAC is the national accreditation body for Sweden, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration services.

4.5(1)
Binarii Labs

Binarii Labs

Ireland flag

Data Loss Prevention

Through our Blockchain services, businesses can benefit from greater transparency, improved security, and easier traceability. Binarii DMSA document management repository for files, data, images, aud

4.5(1)
SurePath AI

SurePath AI

United States flag

Security Operations

SurePath AI is a SaaS platform that governs any GenAI solutions you build, adopt, or buy - even Shadow AI. It secures both public and private models, detects usage, mitigates risks, and controls data

4.5(1)
Accredia

Accredia

Italy flag

Security Operations

Accredia is the national accreditation body for Italy, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration services

4.5(1)
Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich

United States flag

Security Operations

Wilson Sonsini's Privacy & Cybersecurity team is led by former senior officials who served in the DOJ's National Security Division, the FTC's Bureau of Consumer Protection, the NSA, and other regulato

4.5(1)
M2 Recovery

M2 Recovery

United Kingdom flag

Security Operations

M2 Recovery are Crypto legal recovery specialists. Crypto legal expenses insuranceOur crypto legal expenses policy is the world’s first insurance for legal expenses incurred for the recovery of crypt

4.5(1)
Mayer Brown

Mayer Brown

United States flag

Security Operations

Mayer Brown is a global law firm. We have deep experience in high-stakes litigation and complex transactions across industry sectors including the global financial services industry. Mayer Brown brin

4.5(1)
Kramer Levin

Kramer Levin

United States flag

Security Operations

Kramer Levin Naftalis & Frankel LLP is a premier, full-service law firm with offices in New York, Silicon Valley and Paris. Practice areas include Cybersecurity, Privacy and Data Protection. Kramer L

4.5(1)
Penningtons Manches Cooper

Penningtons Manches Cooper

United Kingdom flag

Security Operations

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime. We recognised cyber law as a distinct and e

4.5(1)
Salient Law

Salient Law

United Kingdom flag

Security Operations

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology. We advise clients across all sectors, on contracts ranging from clo

4.5(1)
SEALSQ

SEALSQ

Switzerland flag

Security Operations

SEALSQ develop secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world. SEALSQ is one of the very few Semiconduc

4.5(1)
HOBI International

HOBI International

United States flag

Security Operations

HOBI International, Inc. is a leading mobile, IT and data center asset management provider with comprehensive and traceable solutions for device management, reverse logistics, data erasure, refurbishm

4.5(1)
AccountabilIT

AccountabilIT

United States flag

Backup as a Service

AccountabilIT is a full spectrum information technology services firm for enterprises with complex information technology needs seeking relief from those challenges. Protecting your IT infrastructure

4.5(1)
White & Black

White & Black

United Kingdom flag

Security Operations

White & Black are specialist corporate & technology lawyers based in London & Oxford. We advise businesses across the globe on technology law, corporate deals, venture capital & disputes. Our commerc

4.5(1)
Althammer & Kill

Althammer & Kill

Germany flag

Compliance Consulting

Althammer & Kill offers pragmatic solution concepts for data protection and digitization. We advise in the field of data protection, information security and compliance. Our employees work as external

4.5(1)
Ampsight

Ampsight

United States flag

Governance Risk and Compliance Platforms

Ampsight specializes in enabling cloud integration, securing data, and navigating complications that drive critical-mission success. Our cloud-based solutions leverage our expertise to develop, deploy

4.5(1)
ActZero

ActZero

United States flag

Managed Security Service Providers

ActZero’s security platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats. No tools to buy and manage. No more alert fatigue. Just i

4.5(1)
BankVault

BankVault

Australia flag

Threat Intelligence Platforms

BankVault is a new type of cyber technology (called remote isolation) which sidesteps your local machine and any possible malware. It works by creating a pristine, temporary secure browser to conduct

4.5(1)
ACIS Professional Center

ACIS Professional Center

TH flag

Compliance Consulting

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management. Our

4.5(1)
Alert Logic

Alert Logic

United States flag

Managed Security Service Providers

Alert Logic delivers unrivaled security for any environment, delivering industry-leading managed detection and response (MDR) and web application firewall (WAF) solutions. We are the industry’s first

4.5(1)
TROOPERS

TROOPERS

Germany flag

Security Operations

TROOPERS consists of two days of high-end training, followed by a two-day, three-track conference, culminating in TROOPERS Roundtables on the final day of the event, where participants discuss current

4.5(1)
AuthMind

AuthMind

United States flag

Threat Intelligence Platforms

Prevent your next identity-related cyberattack with the AuthMind Identity SecOps Platform. It works anywhere and deploys in minutes. AuthMind is a pioneering Identity SecOps provider that arms identi

4.5(1)
IASME Consortium

IASME Consortium

United Kingdom flag

Security Operations

IASME is one of just five companies appointed as Accreditation Bodies for assessing and certifying against the Government's Cyber Essentials Scheme. The Scheme focuses on the five most important techn

4.5(1)
American Technology Services (ATS)

American Technology Services

United States flag

Compliance Consulting

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. Our technology span the full range of IT issues, from top-level strategy

4.5(1)
CI-CERT

CI-CERT

Colombia flag

Security Operations

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire. As the IT security incident response coordination center, the role of CI-CERT is to facilitate the dissemination of informat

4.5(1)
Assurestor

Assurestor

United Kingdom flag

Backup as a Service

Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience. Total protection and data recovery is our goal, every single t

4.5(1)
AnyTech365

AnyTech365

Spain flag

Managed Security Service Providers

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech. Our mission is to provide world’s best servi

4.5(1)
US Secret Service

US Secret Service

United States flag

Security Operations

The United States Secret Service is a federal law enforcement agency mandated by Congress to carry out the integrated missions of protection and investigations. The US Secret Service has a pivotal ro

4.5(1)
AFNOR Group

AFNOR Group

France flag

Security Operations

AFNOR Group designs and deploys solutions based on voluntary standards around the world. The Group serves the general interest in its standardization activities and provides services in such competiti

4.5(1)
CFC Underwriting

CFC Underwriting

United Kingdom flag

Security Operations

With a track record of disrupting inefficient insurance markets, we use proprietary technology to deliver high-quality products to market faster than the competition while making it easier for brokers

4.5(1)
InfoSecurity Magazine

InfoSecurity Magazine

United Kingdom flag

Security Operations

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features

4.5(1)
AB Handshake

AB Handshake

United States flag

Security Operations

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic. We validate each call using our advanced system of interaction b

4.5(1)
Clover Security

Clover Security

Israel flag

Security Operations

Clover Security delivers design-led product security, using AI agents to embed security into the earliest stages of software development, replicating the thinking of experienced security architects to

4.5(1)
Belkasoft

Belkasoft

United States flag

Digital Forensics and Incident Response

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions. Its chief product is Belkasoft Evidence Center with allow

4.5(1)
BlastWave

BlastWave

United States flag

Industrial Control System Security

BlastWave is taking on one of the biggest challenges in the cybersecurity market - protecting a nation’s critical infrastructure. We deliver Operational Technology Cybersecurity solutions that minimiz

4.5(1)
S2T

S2T

United Kingdom flag

Threat Intelligence Platforms

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics, linguistics, and web application deve

4.5(1)
Uptime Institute

Uptime Institute

United States flag

Security Operations

Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and reliability of business critical infrastructure through innovation, collaboration, and indep

4.5(1)
ACI Learning

ACI Learning

United States flag

Security Awareness Training

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT. At ACI Learning, we train leaders in Cybersecurity, Audit, and Information

4.5(1)
FileWave

FileWave

Switzerland flag

Security Operations

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices. FileWave offers complete client management capabilities for both macOS and Windows compute

4.5(1)
PhishProtection

PhishProtection

United States flag

Security Operations

We created Phish Protection to prevent all types of phishing including spear phishing protection and office 365 email protection for your small business. Protect your business from phishing, imperson

4.5(1)
4 Sight Technology (4Sight)

4 Sight Technology

BD flag

Compliance Consulting

4 Sight Technology, your trusted IT solution integrator. We specialize in seamlessly blending technologies to create cohesive and efficient systems tailored to your business needs. IT Infrastructure

4.5(1)
Certihash

Certihash

United States flag

Security Operations

Certihash have developed the world’s first blockchain empowered suite of information security tools based on the NIST cybersecurity framework. The capabilities of blockchain, such as transparency, im

4.5(1)
Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

United Kingdom flag

Security Operations

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the University of Cambridge's Department of Computer Science and Technology, Institute of Criminology and Fa

4.5(1)
Altius IT

Altius IT

United States flag

Security Operations

As Certified Information Systems Auditors, Altius IT offers a full range of audits and assessments including: Website security vulnerability assessmentsWebsite compliance audits and industry requirem

4.5(1)
K2 Cyber Security

K2 Cyber Security

United States flag

Threat Intelligence Platforms

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks including OWASP Top 10 and memo

4.5(1)
Bangladesh Computer Council (BCC)

Bangladesh Computer Council

BD flag

Security Operations

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities, formulating national ICT strategy and policy, creating standards and specifications of ICT tools fo

4.5(1)
DoSarrest Internet Security Ltd

DoSarrest Internet Security

Canada flag

Security Operations

DOSarrest is a fully managed security firm specializing in cloud based DDoS protection services to a worldwide client base. DOSarrest is the result of ten years of research, experimentation and mitig

4.5(1)
Cybraics

Cybraics

United States flag

Threat Intelligence Platforms

Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities across the

4.5(1)
Lakera

Lakera

Switzerland flag

Security Operations

Lakera was founded to empower developers and organizations to build and operate AI systems that are secure and safe. We are leading and accelerating secure AI adoption. Secure LLMs in minutesAdd one

4.5(1)
Appsec Phoenix

Appsec Phoenix

United Kingdom flag

Security Operations

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data. AppSec Phoenix platform integrates with security vulnerability scanners t

4.5(1)
Council of European Professional Informatics Societies (CEPIS)

Council of European

Belgium flag

Security Operations

The Council of European Professional Informatics Societies (CEPIS) is the representative body of national informatics associations throughout greater Europe. Established in 1989 by 9 European informat

4.5(1)
XpertDPO

XpertDPO

Ireland flag

Governance Risk and Compliance Platforms

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations. We help change our clients relationship with the data they proce

4.5(1)
Adaware

Adaware

Canada flag

Threat Intelligence Platforms

Adaware is an award-winning security and privacy software provider, empowering users to connect with confidence. Its digital security solutions provide a seamless user experience and peace of mind, pr

4.5(1)
Yoti

Yoti

United Kingdom flag

Security Operations

Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies. We’re working together to fix an outdated identity system. We be

4.5(1)
Xperien

Xperien

South Africa flag

Security Operations

Xperien (Pty) Limited is a leading Johannesburg-based South African Information Technology Asset Disposition (ITAD) company. We are the only company in Africa with ISO9001:2015 accreditation specifica

4.5(1)
Cybertech

Cybertech

Israel flag

Security Operations

Cybertech is on of the most significant conference and exhibition of cyber technologies outside of the United States. Cybertech provides attendees with a unique and special opportunity to get acquain

4.5(1)
7AI

7AI

United States flag

Threat Intelligence Platforms

7AI is the first agentic security platform that harnesses the speed, swarming capabilities, and power of AI to finally give defenders the advantage over evolving threats. The 7AI Agentic Security Plat

4.5(1)
DEKRA

DEKRA

United Kingdom flag

Penetration Testing

DEKRA’s promise is to ensure the safety of human interaction with technology and the environment. Protecting people, assets and communities is at the core of what we do helping a variety of clients in

4.5(1)
Guardian Digital

Guardian Digital

United States flag

Threat Intelligence Platforms

Guardian Digital makes email safe for business. Threat-ready business email protection. Fully supported. We protect your users and your business against today's most advanced threats. Coupled with ou

4.5(1)
Velta Technology

Velta Technology

United States flag

Industrial Control System Security

Velta Technology provide digital safety and cybersecurity solutions for the industrial space. Velta Technology is comprised of multi-disciplinary industrial manufacturing and critical infrastructure

4.5(1)
Avalanchio Technologies

Avalanchio Technologies

India flag

Security Operations

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL (domain-specific lang

4.5(1)
Digitale Gründerinitiative Oberpfalz (DGO)

Digitale Gründerinitiative Oberpfalz

Germany flag

Security Operations

Digital Founder Initiative Oberpfalz's goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

4.5(1)
McDonald Hopkins

McDonald Hopkins

United States flag

Security Operations

McDonald Hopkins is a business advisory and advocacy law firm. We focus on insightful legal solutions that help our clients strategically plan for an increasingly competitive future. Data privacy and

4.5(1)
Zephyr Project

Zephyr Project

United States flag

Industrial Control System Security

The Zephyr Project is a Linux Foundation hosted Collaboration Project. It’s an open source collaborative effort uniting developers and users in building a best-in-class small, scalable, real-time oper

4.5(1)
Assac Networks

Assac Networks

Israel flag

Security Operations

Assac Networks ShieldIT is an app that completely protects any BYOD smartphone from both tapping and hacking. ShieldiT is a complete anti-hacking anti-tapping solution which encapsulates various tact

4.5(1)
Bittium

Bittium

Finland flag

Security Operations

Bittium specializes in the development of reliable, secure communications and connectivity solutions, leveraging its 30 year legacy of expertise in advanced radio communication technologies. Bittium p

4.5(1)
Build38

Build38

Germany flag

Security Operations

Build38 provides the highest levels of security for mobile applications produced by financial institutions, enterprise services, insurance companies, and the automotive industry, among others. Our sec

4.5(1)
US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps

United States flag

Security Operations

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

4.5(1)
FirstPoint

FirstPoint

Israel flag

Industrial Control System Security

At FirstPoint, we’ve developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage. FirstPoint is the only

4.5(1)
G DATA CyberDefense

G DATA CyberDefense

Germany flag

Compliance Consulting

G Data developed the world's first antivirus software. We now ensure the security of small, large and medium-sized companies, critical infrastructures such as hospitals and airports, and millions of p

4.5(1)
Adaptiva

Adaptiva

United States flag

Security Operations

Adaptiva, the autonomous endpoint management company, delivers the fastest way to patch and manage endpoints at scale. The company offers OneSite, the first fully adaptive autonomous endpoint managem

4.5(1)
Security Magazine

Security Magazine

United States flag

Security Operations

Security, the business magazine for security executives, focuses on management issues facing top security professionals and effective solutions being employed, both physical and cyber.

4.5(1)
NSHC

NSHC

KO flag

Compliance Consulting

NSHC is a provider for security information and analysis with clients from financial institutions and government agencies in Korea & Japan. Activity areas include mobile security solutions, cyber secu

4.5(1)
Pareteum

Pareteum

United States flag

Security Operations

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud. Pareteum

4.5(1)
MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MY flag

Digital Forensics and Incident Response

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services. MyCSC is a trusted partner for

4.5(1)
Activu

Activu

United States flag

Security Operations

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security. Our customers see, share, and respond to events in

4.5(1)
Compass Security

Compass Security

Switzerland flag

Compliance Consulting

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training. We put our in-depth exp

4.5(1)
CCN-CERT

CCN-CERT

Spain flag

Security Operations

The CCN-CERT is the Capacity for Response to incidents of Information Security of the National Cryptological Center, CCN, attached to the National Intelligence Center, CNI. This service was created in

4.5(1)
ASRC Federal

ASRC Federal

United States flag

Compliance Consulting

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance. Digital Operations & IT ModernizationAccelerat

4.5(1)
CARICERT

CARICERT

CU flag

Security Operations

CARICERT is the National Cyber Emergency Response Team of Curacao in the Caribbean. The mission of CARICERT is to co-ordinate the resolution of IT security incidents and to help prevent such incident

4.5(1)
Software Testing News

Software Testing News

United Kingdom flag

Security Operations

Software Testing News provides the latest news in the industry; from the most  up-to-date reports in web security to the latest testing tool that can help you perform better. Featuring stimulating, i

4.5(1)
Stack Overflow

Stack Overflow

United States flag

Security Operations

Founded in 2008, Stack Overflow’s public platform is used by nearly everyone who codes to learn, share their knowledge, collaborate, and build their careers. Our products and tools help developers an

4.5(1)
All About Cookies

All About Cookies

United States flag

Security Operations

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security. T

4.5(1)
CSO

CSO

United States flag

Security Operations

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks. With incisive content that

4.5(1)
SafetyDetectives

SafetyDetectives

UN flag

Security Operations

SafetyDetectives are a publishing group of cyber security experts, privacy researchers, and technical product reviewers all over the world. Our mission is to give our readers accurate and valuable inf

4.5(1)
Security Weekly

Security Weekly

United States flag

Security Operations

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research. We strive to use new technologies to reach a wider audience across the globe

4.5(1)
The Hacker News (THN)

The Hacker News

India flag

Security Operations

The Hacker News (THN) is a leading, trusted, and widely recognized cybersecurity news platform that attracts over 8 million readers monthly, including IT professionals, researchers, hackers, technolog

4.5(1)
Appknox

Appknox

India flag

Penetration Testing

Appknox is the world’s most powerful plug-and-play security platform that helps developers, security researchers, and enterprises to build a safe and secure mobile ecosystem. Appknox provide world cl

4.5(1)
AnubisNetworks

AnubisNetworks

PT flag

Threat Intelligence Platforms

AnubisNetworks is one of Europe’s leading threat intelligence and email security suppliers. Mail Protection Service (MPS) is a secure email service that protects against ransomware, spam, business em

4.5(1)
AEI Cybersecurity

AEI Cybersecurity

Spain flag

Security Operations

The Spanish Cybersecurity Innovation Cluster (AEI Ciberseguridad y Tecnologías Avanzadas) brings together companies, Research Centres, Universities,  public and other private organizations interested

4.5(1)
Brookings Institution

Brookings Institution

United States flag

Security Operations

The Brookings Institution is a nonprofit public policy organization based in Washington, DC. Our mission is to conduct in-depth research that leads to new ideas for solving problems facing society at

4.5(1)
Nord Security

Nord Security

Netherlands flag

Data Loss Prevention

Nord Security is one of the world’s leading providers of digital security and privacy solutions for businesses and individuals. We are a home for advanced security solutions that share the Nord brand

4.5(1)
Chatham House

Chatham House

United Kingdom flag

Security Operations

Chatham House, the Royal Institute of International Affairs, is an independent policy institute based in London, with a mission is to help build a secure, prosperous and just world. Topics cover forei

4.5(1)
Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions

United States flag

Security Operations

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market. Our product portfolio includes high-per

4.5(1)
HashDit

HashDit

UN flag

Security Operations

HashDit products and services focus on helping build a safe ecosystem for both protocol users and smart contract developers on BNB Chain. HashDit is dedicated to helping build a safe ecosystem for bo

4.5(1)
Citizen Lab - University of Toronto

Citizen Lab -

Canada flag

Security Operations

The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs & Public Policy, University of Toronto, focusing on research, development, and high-level strategic policy

4.5(1)
Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative

United States flag

Industrial Control System Security

CCI seeks to elevate the state-wide ecosystem of innovation and excellence in cyberphysical systems with an emphasis on trust and security and to further secure Virginia’s role as a global leader in s

4.5(1)
CyberScout

CyberScout

United States flag

Compliance Consulting

Since 2003, Cyberscout has been a leader in protecting businesses, individuals and families against hackers, thieves and human error. We want to empower you to take control of your cybersecurity with

4.5(1)
Consortium for Information & Software Quality (CISQ)

Consortium for Information

United States flag

Security Operations

The mission of the Consortium for Information & Software Quality™ (CISQ™) is to develop international standards to automate software quality measurement and to promote the development and sustainment

4.5(1)
BSI Group

BSI Group

United Kingdom flag

Compliance Consulting

BSI is the business standards company that equips businesses with the necessary solutions to turn standards of best practice into habits of excellence. BSI facilitates business improvement across the

4.5(1)
Jiran Security

Jiran Security

KO flag

Data Loss Prevention

Jiran Security provides data and application security solution over email, mobile device and endpoints.

4.5(1)
ENAC

ENAC

Spain flag

Security Operations

ENAC is the national accreditation body for Spain, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration services. E

4.5(1)
Echelon

Echelon

Russia flag

Security Operations

Echelon Company is a provider of information security services specializing in certification of security software and hardware products in Russia. 1. Consulting on security certification and accredit

4.5(1)
Anvil Secure

Anvil Secure

United States flag

Penetration Testing

Anvil specialize in penetration testing, embedded systems, and research to help identify vulnerabilities and mitigate risk. Penetration TestingWe test your systems the way attackers would, uncovering

4.5(1)
Indelible Data

Indelible Data

United Kingdom flag

Compliance Consulting

Indelible Data is an established information security and technology consultancy: enterprise security architecture, lead security project management, training and auditing with extensive experience of

4.5(1)
IMQ Group

IMQ Group

Italy flag

Security Operations

IMQ is one of Europe’s top players in the field of conformity assessment. We offer certification services, testing, inspections and audits to support all the major sectors of the manufacturing and ser

4.5(1)
Systems Assessment Bureau (SAB)

Systems Assessment Bureau

United Kingdom flag

Security Operations

Systems Assessment Bureau (SAB) is a leading ISO Certification body, recognized globally. SAB engages with organizations to outperform in their journey of demonstrating compliance, assurance, innovati

4.5(1)
Aunalytics

Aunalytics

United States flag

Managed Security Service Providers

Aunalytics is a data platform company that delivers insights as a service to answer your most important IT and business questions. Turn data into answers with the secure, reliable, and scalable data p

4.5(1)
bluedog Security Monitoring

bluedog Security Monitoring

United Kingdom flag

Security Operations

Our goal is to provide businesses with a level of network protection typically only afforded by large corporations. We aim to bring high quality technology, support and service to the small to medium

4.5(1)
CheapSSLWEB

CheapSSLWEB

United States flag

Security Operations

CheapSSLWeb.com is one of the trusted and reputed SSL/TLS certificate providers globally offering best SSL certificates from branded certificate authorities like COMODO, Sectigo, Certera, DigiCert, Ra

4.5(1)
BOXX Insurance

BOXX Insurance

Canada flag

Security Operations

BOXX Insurance Inc. is a new type of insurance company for a new type of risk. We work closely with the most respected insurance and technology partners to provide solutions that help small business c

4.5(1)
Actiphy

Actiphy

United States flag

Backup as a Service

Actiphy helps protect businesses and organisations against the threat of data-loss as a result of natural disasters, hardware failure, human error, viruses, ransomware and malware. We do this by provi

4.5(1)
Gradcracker

Gradcracker

United Kingdom flag

Security Operations

Gradcracker is THE careers website for Science, Technology (including Cybersecurity), Engineering and Maths university students in the UK. There are more Science, Technology, Engineering, and Maths s

4.5(1)
Darknetsearch by Kaduu

Darknetsearch by Kaduu

Switzerland flag

Threat Intelligence Platforms

Our dark web and deep web monitoring continuously tracks confidential data across dark web markets, telegram channels, paste sites, botnet logs, IRC, social media and other sources. We alert you when

4.5(1)
Advens

Advens

France flag

Compliance Consulting

Advens is a company specializing in information security management. We provide Consultancy, Security Audits and Technology Solutions. For more than ten years, we have been helping organizations, pub

4.5(1)
Conference Index

Conference Index

UN flag

Security Operations

Conference Index provides an indexed listing of upcoming meetings, seminars, congresses, workshops, summits and symposiums across the world on a wide range of subjects including Cybersecurity. It list

4.5(1)
Devo Technology

Devo Technology

United States flag

Security Operations

Devo Security Operations is a next-gen cloud SIEM that enables you to gain complete visibility, reduce noise, and focus on the threats that matter most to the business. Explore Devo Security Operation

4.5(1)
Everfox

Everfox

United States flag

Threat Intelligence Platforms

Everfox (formerly Forcepoint Federal) has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years. We protect our global cu

4.5(1)
Corinium Global Intelligence

Corinium Global Intelligence

United Kingdom flag

Security Operations

At Corinium, we have been bringing together the brightest minds in data, AI and info sec since 2013, to innovate at the intersection of technological advancements and critical thinking. Our global co

4.5(1)
KryptoKloud

KryptoKloud

United Kingdom flag

Governance Risk and Compliance Platforms

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions. KryptoKloud was establishe

4.5(1)
Hillstone Networks

Hillstone Networks

United States flag

Security Operations

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks – whether physical, virtual, or in the cloud. Hillstone solutions provide continuous threat defe

4.5(1)
Advantus360

Advantus360

Canada flag

Cloud Security

Advantus360 is an IT Security solutions organization focused on safeguarding our client’s enterprise and virtual presence. We advise, design and deploy best of breed IT Security technology and profess

4.5(1)
Wotan Monitoring

Wotan Monitoring

Austria flag

Security Operations

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring. Business processes are increasingly digitally controlled. You lo

4.5(1)
Aries Security

Aries Security

United States flag

Security Awareness Training

Aries Security provides a premiere cyber training range and skills assessment suite and develops content for all levels of ability. Aries Security also provides advisory services, prototyping, R&D and

4.5(1)
Infiltrate

Infiltrate

United States flag

Security Operations

4.5(1)
BEAM Teknoloji

BEAM Teknoloji

Turkey flag

Security Operations

Companies today have to develop more qualified and secure software with lower costs compared to its competition. For many IT companies these requirements often are not met properly, or sometimes at al

4.5(1)
BugRaptors

BugRaptors

United States flag

Static Application Security Testing

BugRaptors is a certified software testing company with extensive experience as a third-party testing vendor, effectively proven as a leader in software testing & QA Services. BugRaptors offers relia

4.5(1)
Cloudsmith

Cloudsmith

United Kingdom flag

Security Operations

Cloudsmith is the only cloud-native, global, universal artifact management platform for securely developing and distributing software. Cloud-Native Artifact ManagementWhen we say cloud-native, we mea

4.5(1)
CMD+CTRL Security

CMD+CTRL Security

United States flag

Security Awareness Training

CMD+CTRL Security is a pioneer in software security training. Industry-leading organizations rely on our training solutions to make software secure wherever it runs. As part of Security Innovation, w

4.5(1)
Acalvio Technologies

Acalvio Technologies

United States flag

Threat Intelligence Platforms

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and

4.5(1)
Code Intelligence

Code Intelligence

Germany flag

Security Operations

Code Intelligence offers a platform for automated software security testing to help developers make their software more robust and secure. We are automating software security testing. Our mission is

4.5(1)
HoxHunt

HoxHunt

Finland flag

Security Awareness Training

Hoxhunt empowers your employees to shield your organisation. We do this with an automated cyber training program that transforms the way your employees react and respond to the growing amount of phish

4.5(1)
Alpha Mountain AI (alphaMountain)

Alpha Mountain AI

United States flag

Threat Intelligence Platforms

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms. Your network and security teams need additional data to triangulate security i

4.5(1)
Alsid

Alsid

France flag

Threat Intelligence Platforms

Alsid helps corporates to anticipate attacks by detecting breaches before hackers can exploit them. Founded by security experts we created the first proactive and intelligent cybersecurity product ab

4.5(1)
AVG Technologies

AVG Technologies

Netherlands flag

Threat Intelligence Platforms

AVG is focused on providing home and business computer users with the most comprehensive and proactive protection against computer security threats. The AVG family of security software products is di

4.5(1)
LayerX Security

LayerX Security

Israel flag

Threat Intelligence Platforms

Enforce secure access and browsing activity in real time. Prevent risky user activities in the browser that can expose your apps, devices and data to risk of compromise or data loss.

4.5(1)
Dynamic Standards International (DSI)

Dynamic Standards International

United States flag

Security Operations

Dynamic Standards International (formerly Cyber Security Certification Australia - CSCAU) is a global standards development organization which develops certifiable ‘dynamic standards’ that pace with f

4.5(1)
Ensighten

Ensighten

United States flag

Governance Risk and Compliance Platforms

Ensighten is a leader in Website Security & Privacy Compliance. Protect Your Website From Malicious Attacks & Formjacking. Securely Manage Third-Party Tech. Monitor & Detect Vulnerabilities. Control a

4.5(1)
Authenware

Authenware

United States flag

Security Operations

4.3(2)
Edgio

Edgio

United States flag

Security Operations

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms. As the world continues to move to the edge, Edgio is the platform of cho

4.3(2)
Atlantic Council

Atlantic Council

United States flag

Security Operations

Through global engagement and thought leadership, the Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace. Cyberspace is simil

4.3(2)
BrandShelter

BrandShelter

United States flag

Brand Protection

BrandShelter specializes in providing online brand protection for companies and trademark owners. BrandShelter is the corporate domain management division of Key-Systems GmbH, one of the world's large

4.3(2)
Blackwall

Blackwall

EE flag

Threat Intelligence Platforms

Blackwall (formerly BotGuard) is a security infrastructure company focused on protecting web ecosystems from automated threats, while optimizing performance, operational costs, and revenue for hosting

4.3(2)
Area 1 Security

Area 1 Security

United States flag

Threat Intelligence Platforms

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

4.3(2)
AirITSystems

AirITSystems

Germany flag

Security Operations

AirITSystems offer companies comprehensive IT security solutions that take all security considerations into account and are tailored to your business. How much IT security do you need? Benefit from a

4.3(2)
Custodio Technologies

Custodio Technologies

Singapore flag

Threat Intelligence Platforms

Custodio Technologies Pte Ltd. was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) Ltd., in order to spearhead R&D activities in the field of cyber early warning as well a

4.3(2)
BlueHalo

BlueHalo

United States flag

Compliance Consulting

BlueHalo is purpose-built to provide industry capabilities in the domains of Space Superiority and Directed Energy, Missile Defense and C4ISR, and Cyber and Intelligence. BlueHalo focuses on inspired

4.3(2)
AdNovum Informatik

AdNovum Informatik

Switzerland flag

Compliance Consulting

4.3(2)
Jones Day

Jones Day

United States flag

Security Operations

Jones Day is a global law firm with 41 offices in major centers of business and finance throughout the world. Practice areas include Cybersecurity, Privacy & Data Protection.

4.3(2)
IT Band Systems

IT Band Systems

BY flag

Security Operations

IT Band Systems is an international provider of IT products and services including web server monitoring and web security consulting. Dhound Cyber Security Platform is a software solution for compani

4.3(2)
AUCloud

AUCloud

Australia flag

Backup as a Service

AUCloud is a leading Australian cyber security and secure cloud provider, specialising in supporting businesses and Governments with the latest cloud infrastructure, backup and cyber security detectio

4.3(2)
ArmourZero

ArmourZero

Singapore flag

Security Operations

ArmourZero believes cybersecurity should be easy and manageable. Our mission is to make cybersecurity simple. By combining the power of people, process and technology, we help organisations redefine t

4.3(2)
Hakware

Hakware

South Africa flag

Security Operations

Hakware is a next-generation Security Management solution offering a comprehensive OneView of your entire IT and security environment. At the heart of Hakware are custom-trained models that consolidat

4.3(2)
CyberSeek

CyberSeek

United States flag

Security Operations

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market. Interactive Heat Map - provides a granular snapshot of demand and supply data for cybersecurity j

4.3(2)
Lansafe

Lansafe

United Kingdom flag

Compliance Consulting

Lansafe stands as a leading managed service provider in the UK, seamlessly integrating IT, Telecoms, Security, Electrical and Cyber Security solutions. Secure your network with our IMPACT cyber secur

4.3(2)
Gcore

Gcore

LU flag

Security Operations

Gcore is an international leader in public cloud and edge computing, content delivery, hosting, and security solutions. We manage a global infrastructure designed to provide enterprise-level businesse

4.3(2)
AlertSec

AlertSec

United States flag

Data Loss Prevention

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices. Many organizations work with third-parties, such as partners

4.3(2)
Anetac

Anetac

United States flag

Security Operations

Developed by seasoned cybersecurity experts, the Anetac Identity and Security Platform protects threat surface exploited via service accounts. Revolutionizing cybersecurity by delivering streaming vi

4.3(2)
GrayMatter

GrayMatter

United States flag

Industrial Control System Security

GrayMatter’s goal is to transform operations and empower people. Since 1991, we have been helping some of the biggest industrial organizations in the world harness data so they can work smarter. They

4.3(2)
AdviserCyber

AdviserCyber

United States flag

Governance Risk and Compliance Platforms

AdviserCyber provide Cybersecurity and Compliance Solutions for Registered Investment Advisers. Registered Investment Advisors’ cybersecurity needs are specific. You need a team at the top of their t

4.3(2)
AU10TIX

AU10TIX

CY flag

Governance Risk and Compliance Platforms

AU10TIX is an identity intelligence company on a mission to obliterate fraud and make the world a more secure and inclusive place, with forensic-grade technology that confidently links our physical an

4.3(2)
Lacework

Lacework

United States flag

Cloud Security

Lacework brings speed, scale, and automation to cloud security and allows security and DevOps teams to collaborate on keeping data and applications safe in today’s highly dynamic cloud environments.

4.3(2)
Arms Cyber

Arms Cyber

United States flag

Threat Intelligence Platforms

Arms Cyber is redefining ransomware defense with advanced solutions that stop attacks before they start. Arms Cyber was created to combat one of the most pressing threats to organizations worldwide:

4.3(2)
Cifas

Cifas

United Kingdom flag

Security Operations

Cifas is a not-for-profit company working to protect businesses and individuals from financial crime. We have more than 25 years of experience in fraud prevention and financial crime. Cifas enables f

4.3(2)
Holm Security

Holm Security

Sweden flag

Penetration Testing

Holm Security make first-class vulnerability assessment available to everyone by taking vulnerability assessment into the next generation as a cloud service. Holm Security VMP (Vulnerability Manageme

4.3(2)
GetReal Security

GetReal Security

United States flag

Security Operations

GetReal Security is the world’s leading authority on malicious digital content and deepfake protection. GetReal was incubated by Ballistic Ventures, the venture capital firm dedicated exclusively to

4.3(2)
Hiscox

Hiscox

Belgium flag

Security Operations

Hiscox is an international specialist insurer, underwriting a diverse range of personal and commercial insurance risks. Hiscox offers cyber and data risks insurance to protect your business against th

4.3(2)
Bleckwen

Bleckwen

France flag

Security Operations

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers. Designed with banks for banks, Bleckwen detects the most sophisticated frauds in real time. A

4.3(2)
Lewis Brisbois

Lewis Brisbois

United States flag

Security Operations

Lewis Brisbois offers legal practice in more than 40 specialties, and a multitude of sub-specialties including Data Privacy & Cybersecurity. The Data Privacy & Cybersecurity Team has managed response

4.3(2)
Fireblocks

Fireblocks

United States flag

Security Operations

Fireblocks is a blockchain security service provider for moving, storing, and issuing digital assets. Fireblocks is a digital asset security platform that helps financial institutions protect digital

4.3(2)
Sensity

Sensity

Netherlands flag

Security Operations

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

4.3(2)
Cloudmark

Cloudmark

United States flag

Threat Intelligence Platforms

Cloudmark is a trusted leader in intelligent threat protection against known and future attacks, safeguarding 12 percent of the world’s inboxes from wide-scale and targeted email threats. With more t

4.3(2)
Phone Monitoring Service

Phone Monitoring Service

United States flag

Penetration Testing

Phone Monitoring Service provides cyber security services, ethical hacking services, social media hacking services in the USA, Canada, Europe. As a cyber security company, we offer one-stop phone sec

4.3(2)
Blu Venture Investors (BVI)

Blu Venture Investors

United States flag

Security Operations

Blu Venture Investors (BVI) is a venture capital firm that supports early stage companies primarily in the Mid-Atlantic region. We make venture capital and private equity investments in early stage co

4.3(2)
SPLX

SPLX

United States flag

Security Operations

Our mission at SPLX is to secure and safeguard GenAI-powered conversational apps by providing advanced security and pentesting solutions, so neither your organization nor your user base get harmed. C

4.3(2)
Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe

RO flag

Security Operations

The Cybercrime Programme Office of the Council of Europe (C-PROC) in Bucharest, Romania is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to the

4.3(2)
Miradore

Miradore

Finland flag

Security Operations

Miradore is a software company specializing in effective, cloud-based device management. Our goal is to help IT Service Providers and IT departments secure and control devices. We help Managed Servic

4.3(2)
Suffescom Solutions

Suffescom Solutions

India flag

Security Operations

Suffescom Solutions is a leading blockchain development company, assisting businesses in harnessing the true potential of blockchain technology. Our team knows what it takes to modernize your busines

4.3(2)
Africa ICS Cyber Security Conference

Africa ICS Cyber

KE flag

Industrial Control System Security

4.3(2)
blueAllianceIT

blueAllianceIT

United States flag

Security Operations

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively while preserving their brand and protectin

4.3(2)
Forever Group

Forever Group

United Kingdom flag

Cloud Security

Forever Group is a Managed Services Provider specialising in Telecommunications, IT Support, and Cyber Security. Even if you have an existing IT provider, that does not mean that your organisation is

4.3(2)
Council on Foreign Relations (CFR)

Council on Foreign

United States flag

Security Operations

CFR is dedicated to being a resource for its members, government officials, business executives, journalists, educators and students, civic and religious leaders, and other interested citizens in orde

4.3(2)
Amnesty Tech

Amnesty Tech

United Kingdom flag

Digital Forensics and Incident Response

Amnesty Tech, part of Amnesty International, is a global collective of advocates, hackers, researchers and technologists. Amnesty Tech's Security Lab, launched in 2019 and located in Berlin, leads te

4.3(2)
BBS Technology

BBS Technology

Turkey flag

Compliance Consulting

BBS Technology is a company that develops and delivers next-generation cyber security technologies worldwide. With a customer-oriented approach, we strive to fully understand the business requirement

4.3(2)
Aves Netsec

Aves Netsec

Finland flag

Threat Intelligence Platforms

Our solution adds a new layer of security into your network, which robs the attacker from the ability to function - we will take the reliability of the information the attacker collects.

4.3(2)
4ARMED

4ARMED

United Kingdom flag

Compliance Consulting

4ARMED specialises in modern, cloud native applications, typically running on public cloud infrastructure such as Amazon Web Services, Google Cloud Platform, Microsoft Azure or DigitalOcean. We also h

4.3(2)
Factory Internet

Factory Internet

United Kingdom flag

Compliance Consulting

Factory Internet provide leading edge consultancy, management and technical services across Cloud, Hosting, Migrations, Platform Management, Monitoring along with General ICT Services. Vulnerability

4.3(2)
BreachQuest

BreachQuest

United States flag

Digital Forensics and Incident Response

BreachQuest brings together cybersecurity experts with decades of experience identifying security flaws, penetrating networks, and responding to incidents. We protect our clients by preparing for, def

4.3(2)
DCL Search & Select

DCL Search &

United Kingdom flag

Security Operations

DCL Search & Selection is a client-focused, independent niche recruitment company headquartered in South East London who specialise in the recruitment of permanent and contract IT staff to director le

4.3(2)
Cubro Network Visibility

Cubro Network Visibility

Austria flag

Security Operations

Cubro has a global presence with offices in different geographic locations to serve customers across different time zones.

4.3(2)
Baselime

Baselime

United Kingdom flag

Security Operations

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems. Cloud observability made for devs. Use logs, metrics and distributed tracing t

4.3(2)
QuilrAI

QuilrAI

United States flag

Data Loss Prevention

Traditional security tools silo these layers, creating gaps that attackers exploit. Quilr unifies them—protecting sensitive data across every touchpoint, securing AI from prompts to autonomous agents,

4.3(2)
Advanced Software Products Group (ASPG)

Advanced Software Products

United States flag

Data Loss Prevention

ASPG offers a wide range of innovative mainframe software solutions for Data Security, Access Management, Storage Administration, Capacity Planning, System Management, Application Programming and CICS

4.3(2)
Paubox

Paubox

United States flag

Security Operations

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size. Our solutions encrypt all outbound email by default, allowing he

4.3(2)
Basalt

Basalt

Sweden flag

Compliance Consulting

Basalt work with customers with the highest security requirements and covers all areas within operational protection and safety protection. We provide qualified consulting services in information sec

4.3(2)
36 Group

36 Group

United Kingdom flag

Security Operations

The 36 Group combines formidable strengths in Commercial, International Trade and Shipping, Family, Public & Human Rights, and Crime, with state of the art facilities and a friendly, solution-driven a

4.3(2)
Identillect Technologies

Identillect Technologies

United States flag

Data Loss Prevention

Identillect Technologies provide a user-friendly secure email solution to protect critical information, with an emphasis on simplicity. Our aim is to make high-performing products which are easy enoug

4.3(2)
AVEVA

AVEVA

United Kingdom flag

Industrial Control System Security

AVEVA has a long history in providing Supervisory Control and Data Acquisition software and offers a winning strategy for meeting complex and evolving automation requirements while protecting engineer

4.3(2)
Bleach Cyber

Bleach Cyber

United States flag

Cloud Security

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security. With Bleach Cyber, SMEs have a partner who understands their unique challenges and needs

4.3(2)
CyberSentriq

CyberSentriq

United Kingdom flag

Backup as a Service

CyberSentriq is an integrated cybersecurity and data protection platform, leveraging solutions from two best-of-breed vendors in the MSP space. Partnering with over 3,000 MSPs and protecting over 150,

4.3(2)
Ark Infotech

Ark Infotech

United States flag

Cloud Security

Ark Infotech is a provider of cloud management services, selective support services, and technology solutions. We are an Amazon AWS certified consulting partner providing services to small/mid-size b

4.3(2)
AFCON Control & Automation

AFCON Control &

Israel flag

Industrial Control System Security

AFCON is a leading global provider of software solutions and services for the smart management of Control & Automation systems in the age of Digital Transformation. We design, develop, market and dep

4.3(2)
ZehnTek

ZehnTek

United States flag

Compliance Consulting

ZehnTek is a premier technology solutions provider, committed to offering comprehensive IT services tailored to meet the diverse needs of businesses. Our team of consultants and engineers have the ex

4.3(2)
Loccus AI

Loccus AI

Spain flag

Security Operations

Loccus are developers of AI solutions in the voice safety space. We build identity verification solutions, deepfake detection systems and fraud protection products for companies and end-users. We are

4.3(2)
ICT Reverse

ICT Reverse

United Kingdom flag

Security Operations

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure. As part of the Ecorenew Group, we fully understand the importance of secure data eras

4.3(2)
dWallet Labs

dWallet Labs

Israel flag

Data Loss Prevention

dWallet Labs is a cybersecurity company specializing in blockchain technology. We believe that the future of Web3 relies on cutting edge cryptography and unabated security. With the top talent in bot

4.3(2)
CyberRisk Alliance (CRA)

CyberRisk Alliance (CRA)

United States flag

Security Operations

CyberRisk Alliance is a business intelligence company created to serve the rapidly evolving cybersecurity and information risk management marketplace through a diversified portfolio of services that i

4.3(2)
NST Cyber

NST Cyber

United States flag

Security Operations

NST Cyber provides comprehensive Threat Exposure Management to Global banks and Forbes 2000 companies. NST Cyber was established with the vision of empowering organisations with the necessary tools a

4.3(2)
Amtivo Group

Amtivo Group

United Kingdom flag

Security Operations

Our vision is to inspire and enable organisations globally to reach their true potential, by making governance, compliance and inspection a truly positive and valuable experience. We do this through

4.3(2)
Blackpanda

Blackpanda

Singapore flag

Digital Forensics and Incident Response

Blackpanda is Asia’s premier cyber security incident response group, hyper-focused on digital forensics and cyber crisis response. Digital Forensics ServicesOur expert digital forensics investigators

4.3(2)
EarlyBirds

EarlyBirds

United States flag

Security Operations

EarlyBirds is a real-time Open Innovation and OSINT ecosystem that connects organizations with Innovators, Early Adopters, and Subject Matter Experts (SMEs). We help businesses, government agencies, a

4.3(2)
CryptoCodex

CryptoCodex

Israel flag

Brand Protection

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system. Counter-Fight is a unique encryption system, having an immunity level of military sy

4.3(2)
Alan Turing Institute

Alan Turing Institute

United Kingdom flag

Security Operations

Alan Turing Institute is the UK national institute for data science. A major focus is Big Data analysis with applications including cyber security. The institute will work with universities across th

4.3(2)
EIT Digital

EIT Digital

Belgium flag

Security Awareness Training

EIT Digital is a leading European digital innovation and entrepreneurial education organisation driving Europe’s digital transformation. EIT Digital delivers breakthrough digital innovations to the m

4.3(2)
Foretrace

Foretrace

United States flag

Security Operations

Foretrace aims to prevent, assess, and contain the exposure of customer accounts, domains, and systems to malicious actors. Foretrace's External Exposure Platform is designed to enable active analysi

4.3(2)
iStorage

iStorage

United Kingdom flag

Data Loss Prevention

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions. By combining the power of strong, easy to use, authentication and hardware data encryptio

4.3(2)
ANSI National Accreditation Board (ANAB)

ANSI National Accreditation

United States flag

Security Operations

The ANSI National Accreditation Board (ANAB) is the largest multi-disciplinary accreditation body in North America. We accredit management systems and certification bodies, calibration and testing la

4.3(2)
Link11 GmbH

Link11 GmbH

Germany flag

Threat Intelligence Platforms

Link11 provides DDoS protection solutions to protect websites and complete server infrastructures from DDoS attacks. Link11's cloud-based security services are fully automated, react in real-time and

4.3(2)
West Midlands Cyber Resilience Centre (WMCRC)

West Midlands Cyber

United Kingdom flag

Governance Risk and Compliance Platforms

The East Midlands Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime. Working with local Universities

4.3(2)
Defimoon

Defimoon

Italy flag

Compliance Consulting

DeFimoon is the International Blockchain Development & Security Agency. We provide professional services and solutions at the highest quality on world-leading chains. The Defimoon technical team cons

4.3(2)
Hut Six Security

Hut Six Security

United Kingdom flag

Security Awareness Training

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns. Hut Six’s annual subscription reinvents informati

4.3(2)
Vesta

Vesta

United States flag

Security Operations

Vesta Corporation is a global provider of a scalable suite of fraud and payment solutions for online commerce. A pioneer in the development of fully guaranteed payments for CNP transactions, Vesta of

4.3(2)
NewsGuard Technologies

NewsGuard Technologies

United States flag

Security Operations

NewsGuard’s analysts, powered by multiple AI tools, operate the trust industry’s most accountable and largest dataset on news. These data are deployed to fine-tune and provide guardrails for generativ

4.3(2)
Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice

United States flag

Security Operations

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide. CCI

4.3(2)
Swisscom Blockchain

Swisscom Blockchain

Switzerland flag

Security Operations

4.3(2)
Stratus Cyber

Stratus Cyber

United States flag

Governance Risk and Compliance Platforms

4.3(2)
B2Bcert

B2Bcert

India flag

Security Operations

B2BCERT is a Solutions & Service organization, specialized in management consulting, Trainings, Assessments, Certification & Managed Services. We are catering to a diverse portfolio of clients across

4.3(2)
Avanade

Avanade

United States flag

Cloud Security

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem. Established over 20 years ago by Accent

4.3(2)
ZIUR Industrial Cybersecurity Center

ZIUR Industrial Cybersecurity

Spain flag

Industrial Control System Security

4.3(2)
Gambit Cyber

Gambit Cyber

Netherlands flag

Security Operations

Gambit Cyber empowers businesses to build robust cyber defence through our AI-Native and Risk Centric Preemptive Threat Exposure Management Platform, KnightGuard. Through automation, real-world threa

4.3(2)
Labyrinth Technology

Labyrinth Technology

United Kingdom flag

Backup as a Service

Labyrinth Technology is an IT support company based in London specialising in cyber security for small to medium sized businesses. Located in the heart of The City of London, Labyrinth Technology is

4.3(2)
ITRenew

ITRenew

United States flag

Security Operations

ITRenew is a leading global IT lifecycle management solutions company, specializing in onsite data center decommissioning and data erasure services. Our mission is to help data center clients eliminat

4.3(2)
4N6

4N6

Italy flag

Digital Forensics and Incident Response

4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics to our customers. ◦ Computer Forensic Investigations◦ Expert Witness and Expert Consulting◦ eDi

4.3(2)
Conseal Security

Conseal Security

United Kingdom flag

Penetration Testing

Conseal Security are specialists in mobile app penetration testing. Our expert-led DAST and SAST quickly finds security vulnerabilities in your iOS and Android apps. We do this using meticulously-res

4.3(2)
11:11 Systems

11:11 Systems

United States flag

Managed Security Service Providers

11:11 Systems synchronizes every aspect of network services for your business. Power performance from a single platform. Leverage fully automated and integrated systems for management and control. Bui

4.3(2)
360 Privacy

360 Privacy

United States flag

Threat Intelligence Platforms

360 Privacy's mission is to protect the digital identity, security, and reputation of high-profile executives, athletes, celebrities, and high net-worth families. Digital identity is at the intersect

4.3(2)
AngelList

AngelList

United States flag

Security Operations

AngelList champion startups and the people who empower them. Search tech & startup jobs, find new tech products, and invest in startups. AngelList is the parent company of AngelList Venture, AngelLis

4.3(2)
CNA Insurance

CNA Insurance

United States flag

Security Operations

CNA offers a broad portfolio of property and casualty business insurance solutions that allow you to better manage your risks. CNA offers a market-leading suite of cyber liability insurance products

4.3(2)
Cybersecurity Business Network (CBN

Cybersecurity Business Network

UN flag

Security Operations

CBN (fomerly Transatlantic Cyber Security Business Network) is a network of cybersecurity organisations in the UK advocating for and shaping cyber policy and regulation to encourage a more secure, res

4.3(2)
PhishFirewall

PhishFirewall

United States flag

Security Awareness Training

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform. At PhishFirewall, we believe that technology alone cannot solve the

4.3(2)
CyRise

CyRise

Australia flag

Security Operations

CyRise is a venture accelerator focused squarely on early stage cyber security startups. CyRise is on a mission to be the number one cyber security accelerator in the Asia-Pacific region. Based in Me

4.3(2)
10dot Cloud Security

10dot Cloud Security

South Africa flag

Managed Security Service Providers

10dot Cloud Security is a security service management company. Our solutions give you contextualised visibility into your network security. You can only manage what you can see with intuitive security

4.3(2)
4Stop

4Stop

Germany flag

Governance Risk and Compliance Platforms

4Stop is a global KYC, compliance and anti-fraud risk management company. 4Stop have developed their proprietary anti-fraud technology with real-time intelligence and data aggregation to be the best-

4.3(2)
Bastion Security Group

Bastion Security Group

New Zealand flag

Cloud Security

Bastion Security combines the skills, expertise and leadership from Quantum Security, ZX Security, Helix Security and Cassini. We offer a wide range of services including security assessments, audits

4.3(2)
ABCsolutions

ABCsolutions

Canada flag

Governance Risk and Compliance Platforms

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way. With these resources in plac

4.3(2)
IFE Digital Systems

IFE Digital Systems

Norway flag

Security Operations

IFE Digital Systems department of Risk, Safety and Security (RSS) conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

4.3(2)
INT3L

INT3L

PA flag

Security Operations

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services. We are cutting-edge engineers in Technology, Information and Communications (I

4.3(2)
Fortify 24/7

Fortify 24/7

United States flag

Managed Security Service Providers

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks. Fortify 24×7’s Cybersecurity Managed™ program delivers a comprehensive and custom

4.3(2)
Atlant Security

Atlant Security

United States flag

Cloud Security

Atlant Security is a cyber and IT security company offering consulting and implementation services. Our mission is to provide SMBs with clear visibility of what is happening in their digital assets.

4.3(2)
Vanbreda

Vanbreda

Belgium flag

Security Operations

Vanbreda Risk & Benefits is the largest independent insurance broker and risk consultant in Belgium and the leading insurance partner in the Benelux. Vanbreda has been providing solutions to the risk-

4.3(2)
Cellebrite

Cellebrite

Israel flag

Digital Forensics and Incident Response

Cellebrite delivers comprehensive solutions for mobile data forensics and mobile lifecycle management. A pioneer of mobile data forensics since 1999 with a passion for technology innovation, Cellebri

4.3(2)
A3Sec

A3Sec

Spain flag

Compliance Consulting

A3Sec provides professional solutions in the areas of Cybersecurity, Device Monitoring, Business Intelligence and Big Data. We provide Cybersecurity services to support our clients in minimizing the

4.3(2)
US Department of State - Bureau of Cyberspace & Digital Policy

US Department of

United States flag

Security Operations

The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace and advance policies t

4.3(2)
Crypsis

Crypsis

United States flag

Digital Forensics and Incident Response

4.3(2)
Aprio

Aprio

United States flag

Compliance Consulting

Aprio is a premier business advisory and accounting firm. Aprio delivers advisory, tax, managed, and private client services to build value, drive growth, manage risk, and protect wealth. Cybersecuri

4.3(2)
Exein

Exein

Italy flag

Industrial Control System Security

Exein IDS is the world's first IDS Firmware for tackling supply chain exploitation and alerting management. We are on a mission to build the world’s first ecosystem for firmware security so that all

4.3(2)
Assured Information Security (AIS)

Assured Information Security

United States flag

Compliance Consulting

AIS is committed to providing our customers with critical information security products, services, and training. We support diverse needs throughout business and industry. We proactively protect your

4.3(2)
Disklabs

Disklabs

United Kingdom flag

Digital Forensics and Incident Response

Disklabs are industry leaders in data recovery, digital forensics and data erasure since 1997 with dedicated data recovery and digital forensic laboratories and data erasure and asset management facil

4.3(2)
Fortiphyd Logic

Fortiphyd Logic

United States flag

Industrial Control System Security

Fortiphyd Logic equips operators of the power grid, oil & gas, and other critical infrastructure with the tools and training they need to defend their industrial networks from advanced cyberattacks an

4.2(3)
Zertificon Solutions

Zertificon Solutions

Germany flag

Data Loss Prevention

Alongside the Z1 SecureMail Gateway solution for server based email encryption & signing, the product range has been extended to include client-side application for foolproof End-to-End email encrypti

4.2(3)
Adversa AI

Adversa AI

Israel flag

Security Operations

Adversa is a leading company working on applied security measures for AI. Our mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents. With a team of m

4.2(3)
Zerodium

Zerodium

United States flag

Security Operations

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research. We pay big bounties to security researchers to acquire their original and previously un

4.2(3)
8kSec

8kSec

United States flag

Security Awareness Training

8kSec is a cybersecurity company specializing in training, consulting, and research. We offer advanced cybersecurity training to commercial and defense clients across the US, Europe, and MENA - empow

4.2(3)
RiskIQ

RiskIQ

United States flag

Brand Protection

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. RiskIQ allow

4.2(3)
CYDES

CYDES

MY flag

Security Operations

CYDES is the first event in Malaysia to showcase advanced solutions and technologies to address cyber defence and cyber security challenges for the public and private sectors with the objective of pro

4.2(3)
BlueFiles

BlueFiles

France flag

Data Loss Prevention

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing. Aimed at all types of professionals who need to excha

4.2(3)
Kingston Technology

Kingston Technology

United States flag

Data Loss Prevention

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.

4.2(3)
Dedge Security

Dedge Security

Spain flag

Security Operations

4.2(3)
Beazley

Beazley

United Kingdom flag

Security Operations

Beazley are a specialist insurer with three decades of experience in providing clients with the highest standards of underwriting and claims service worldwide. All our insurance businesses are rated A

4.2(3)
Chainalysis

Chainalysis

United States flag

Digital Forensics and Incident Response

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations. Chainalysis uses pattern recognition, machine le

4.2(3)
Wolfpack Information Risk

Wolfpack Information Risk

South Africa flag

Compliance Consulting

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities. Advisory - Professional bus

4.2(3)
Mindgard

Mindgard

United Kingdom flag

Security Operations

The Mindgard Security Copilot platform secures your Artificial Intelligence, GenAI and LLMs. Mindgard is a deep-tech company specializing in cyber security for AI. Our flagship AI security platform M

4.2(3)
UZCERT

UZCERT

UZ flag

Security Operations

UZCERT is the national Computer Emergency Response Team for Uzbekistan. UZCERT is an information security incident response service. The main objective of the service is to reduce the level of inform

4.2(3)
Crispmind

Crispmind

United States flag

Security Operations

Crispmind creates innovative solutions to some of today’s most challenging technology problems. Crispmind holds over 50 patents, know-how’s, proprietary software registrations and other forms of inte

4.2(3)
Ceerus

Ceerus

United Kingdom flag

Data Loss Prevention

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation. We do that by providing a proven layer of security that can be integrated easi

4.2(3)
Xceptional

Xceptional

Australia flag

Security Operations

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism. Xceptional have pioneered a range of inclusive talent solutions for the austra

4.2(3)
CyberUSA

CyberUSA

United States flag

Security Operations

CyberUSA is a collaboration of leaders and states focused on a common mission purpose of enabling innovation, education, workforce development, enhanced cyber readiness and resilience - all while conn

4.2(3)
authen2cate

authen2cate

United States flag

Security Operations

Authen2cate is passionate about making identity management easier and more secure. We provide setup, integration, and maintenance support as part of our full-service solution. This takes all of the ha

4.2(3)
AttackIQ

AttackIQ

United States flag

Security Operations

Founded in 2014, AttackIQ pioneered the Breach and Attack Simulation (BAS) category with the industry’s first commercial platform. But as adversaries evolved, so did we. Today, we lead the market in

4.2(3)
Atlantic Data Security

Atlantic Data Security

United States flag

Compliance Consulting

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure. We’ve worked in healthcare, universities, enter

4.2(3)
Dux Security

Dux Security

United States flag

Security Operations

Dux is an agentic exposure management platform built for a world where vulnerability exploitation windows are collapsing from weeks to minutes. Use our AI agents to continuously determine what’s actu

4.2(3)
AI Spera

AI Spera

United States flag

Threat Intelligence Platforms

AI-Driven Cyber Threat Intelligence Security. AI Spera provides real-time intelligence to empower your security competences in all aspects of the business. AI Spera, a frontrunner in cyber threat int

4.2(3)
Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions

United States flag

Security Operations

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider. We have designed our custom built drive wipe software, XErase, to support whatever

4.2(3)
BlockSec

BlockSec

UN flag

Security Operations

BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top security researchers and experiencedexperts from both academia and industry. Security AuditAutomatic t

4.2(3)
Afripol

Afripol

DZ flag

Security Operations

AFRIPOL is a technical institution of the African Union with a mandate to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnati

3.9(3)
Cryptoloc

Cryptoloc

Australia flag

Data Loss Prevention

3.9(3)
OpSec Security

OpSec Security

United States flag

Brand Protection

OpSec protects your entire brand continuum, covering every facet of your product’s life cycle. From conception through consumers, both online and offline, we provide you with valuable insight to prote

3.9(3)
GrayHats

GrayHats

Spain flag

Brand Protection

GrayHats is a platform-based cybersecurity company devoted to delivering comprehensive, scalable, and proactive protection for businesses in an ever-evolving threat landscape. We implement cybersecur

3.9(3)
Penten

Penten

Australia flag

Data Loss Prevention

Penten is an Australian-based cyber security company focused on innovation in secure mobility and applied AI (artificial intelligence). Our mission is to deliver new defence and security technologies

3.9(3)
Hassans International Law Firm

Hassans International Law

United Kingdom flag

Security Operations

The largest law firm in Gibraltar, Hassans offers a huge selection of legal services to clients based both locally and around the globe. Able to offer legal advice and expertise to clients across corp

3.9(2)
Acunetix

Acunetix

United Kingdom flag

Security Operations

Acunetix is a leading web vulnerability scanner, widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology. It automatically crawls your websites and performs

3.9(2)
Gray Swan

Gray Swan

United States flag

Security Operations

Gray Swan is the safety and security provider for the AI era, founded by world leading experts in the AI safety and security space. When your AI fails, your reputation, compliance, and bottom line ar

3.9(2)
Blind Insight

Blind Insight

United States flag

Data Loss Prevention

Your Complete Data Protection Toolbox. Field-level searchable encryption plus fine-grained programmable access controls. All wrapped neatly in developer-friendly APIs and SDKs. Data protection perfect

3.9(2)
Pindrop Security

Pindrop Security

United States flag

Security Operations

Pindrop solutions are leading the way to the future of voice by establishing the standard for security, identity, and trust for every voice interaction. In a digital world where human and machine con

3.9(2)
Crossbow Labs

Crossbow Labs

India flag

Compliance Consulting

Crossbow Labs empowers businesses of all sizes, from startups to global enterprises, with tailored cybersecurity and compliance solutions. Our expertise in navigating evolving threats and regulations

3.9(2)
American Binary

American Binary

United States flag

Data Loss Prevention

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company made up of multi-disciplinary technologists, engineers, and security professionals, with expertise in privacy, com

3.9(2)
Adroit Technologies

Adroit Technologies

South Africa flag

Industrial Control System Security

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years. We are the number 1 Supervisory Control and Data Acquisition (SCADA)

3.9(2)
Abacode

Abacode

United States flag

Governance Risk and Compliance Platforms

Abacode is a Managed Security Services Provider (MSSP). We help businesses consolidate all of their Regulatory Compliance & Cybersecurity needs, under one roof. Abacode is fundamentally different tha

3.9(2)
Verlingue

Verlingue

United Kingdom flag

Security Operations

Verlingue (formerly ICB Group) is a leading corporate insurance broker providing Insurance, Risk Management and related advice to businesses and private clients. Commercial products include Cyber & Da

3.9(2)
NSI Global

NSI Global

Australia flag

Compliance Consulting

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects. We are trusted by Governments, Law Enforcement, and Multin

3.9(2)
Anect

Anect

CZ flag

Compliance Consulting

Anect is a leading provider of ICT security and services for hybrid and cloud solutions. We have been providing our services for 30 years. From a traditional ICT integrator, we have moved to a leadin

3.9(2)
Zercurity

Zercurity

United Kingdom flag

Governance Risk and Compliance Platforms

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats. We provide a cost effectiv

3.9(2)
DuckDuckGoose

DuckDuckGoose

Netherlands flag

Security Operations

DuckDuckGoose offer advanced solutions to protect against manipulated videos, images, voices and texts, ensuring that users can still believe what they perceive in the digital environment. Our range

3.9(2)
2Keys

2Keys

Canada flag

Compliance Consulting

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements. 2Keys engagements focus on Confidentiality, A

3.9(2)
Axiad IDS

Axiad IDS

United States flag

Security Operations

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations. Our mission - and expertise - is to enable our customers to efficiently issue, manage, and u

3.9(2)
BaseN

BaseN

Finland flag

Industrial Control System Security

BaseN is an inherently scalable computing platform for hosting billions of spimes, the core objects of the IoT. What makes us unique is that we are a full stack IoT Operator. We control the full valu

3.9(2)
InfraShield

InfraShield

United States flag

Industrial Control System Security

InfraShield is a US-based cyber-physical security company specializing in the protection of critical infrastructure systems across OT and IT environments. We design and implement tailored solutions, t

3.9(2)
TechBeacon

TechBeacon

United States flag

Security Operations

TechBeacon.com is a digital hub by and for software engineering, IT and security professionals sharing practical and passionate guidance to real-world challenges. All things security for software eng

3.9(2)
AUTOCRYPT

AUTOCRYPT

KO flag

Industrial Control System Security

3.9(2)
Artjoker

Artjoker

United States flag

Security Operations

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

3.9(2)
Trusted Computing Group

Trusted Computing Group

United States flag

Security Operations

Trusted Computing Group is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for intero

3.9(2)
Zeguro

Zeguro

United States flag

Penetration Testing

Zeguro provides complete cybersecurity risk assessment, mitigation and insurance, allowing you to easily manage your cyber risk. Zeguro gives you the tools and training to manage and monitor security

3.9(2)
Hogan Lovells

Hogan Lovells

United Kingdom flag

Security Operations

Hogan Lovells is an international business law firm with offices across Europe, Asia and the USA. Practice areas include Privacy & Cybersecurity. The privacy and cybersecurity lawyers at Hogan Lovell

3.9(2)
Alpine Cyber Solutions

Alpine Cyber Solutions

United States flag

Managed Security Service Providers

Alpine Cyber offers a full range of security services to match your needs. Choose from one-time security assessments, routine checks, 24×7 managed security service, training and more.

3.9(2)
Yubico

Yubico

United States flag

Security Operations

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts. The company’s core invention, the YubiKey, delivers strong hardware protect

3.9(2)
Accedian

Accedian

Canada flag

Penetration Testing

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure. The Accedian management

3.9(2)
Berkman Klein Center for Internet & Society

Berkman Klein Center

United States flag

Security Operations

The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace.

3.9(2)
Diaplous Group

Diaplous Group

CY flag

Governance Risk and Compliance Platforms

Diaplous Group is a leading Maritime Risk Management (MRM) provider, delivering specialized services to an ever-broadening portfolio of shipping, oil & gas, energy providers and construction industrie

3.9(2)
Bericon Forensics

Bericon Forensics

United Kingdom flag

Digital Forensics and Incident Response

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics. We have experience in providing many forensic digital exami

3.9(2)
Alcatel-Lucent Enterprise (ALE)

Alcatel-Lucent Enterprise (ALE)

France flag

Compliance Consulting

Our solutions are tailored to our customers’ industries providing built-in security and limited environmental impact. We offer flexible business models: in the Cloud, on premises, and hybrid. Over 100

3.9(2)
Inholo

Inholo

Belgium flag

Security Operations

Inholo offers tools to manage the risks of synthetic realities, starting with an AI-photo detection service. AI generators have great potential, but we also recognize the possibility of misuse. That'

3.9(2)
24By7Security

24By7Security

United States flag

Compliance Consulting

3.9(2)
Quside

Quside

Spain flag

Data Loss Prevention

Quside, a spin-off from The Institute of Photonic Sciences (ICFO) in Barcelona, designs and manufactures innovative quantum technologies for a wide range of applications including cyber security. Qus

3.9(2)
SecureWeb3

SecureWeb3

United Kingdom flag

Brand Protection

SecureWeb3 helps businesses and brands to secure their Web3 presence by offering a full suite of security services including training, consultancy & brand protection solutions. SecureWeb3 specialise

3.9(2)
Virsec Systems

Virsec Systems

United States flag

Threat Intelligence Platforms

Virsec is pioneering OTTOGUARD AI — the first workload patchless mitigation platform powered by patented zero-trust technology. In a world where milliseconds matter, we lock down your software and ac

3.9(2)
National Crime Agency (NCA) - United Kingdom

National Crime Agency

United Kingdom flag

Security Operations

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend. We work closely with UK police, r

3.8(1)
FortKnoxster

FortKnoxster

United Kingdom flag

Data Loss Prevention

FortKnoxster is a cybersecurity company within the Crypto & FinTech space. Our encryption technologies are blockchain integrated and we make the world a safer place, by offering our apps both towards

3.8(1)
XY Cyber

XY Cyber

XK flag

Governance Risk and Compliance Platforms

XY Cyber enable Generative AI for Cyber Operations. We simplify the complex world of cyber threats into actionable strategies, empowering your defense with AI-powered solutions. Security AssessmentLe

3.8(1)
Bedrock Security

Bedrock Security

United States flag

Data Loss Prevention

Bedrock Security is at the forefront of revolutionizing data security in the cloud and GenAI era. We are driven by the imperative belief that data is the lifeblood of organizational growth. In this d

3.8(1)
Ultratec

Ultratec

United Kingdom flag

Security Operations

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD). Our, in-house developed; UltraErase system i

3.8(1)
Cybernatics

Cybernatics

Singapore flag

Security Operations

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests. Cyber

3.8(1)
Aligned Technology Solutions (ATS)

Aligned Technology Solutions

United States flag

Managed Security Service Providers

Aligned Technology Solutions has been helping Washington, DC businesses get the most out of their IT since its inception. We manage, monitor, and maintain everything from your network and servers to y

3.8(1)
Albania Lab

Albania Lab

AL flag

Compliance Consulting

Albania Lab is a consulting company focused on the development and delivery of digital solutions and IT services. Our group is made up of specialists from various sectors and includes web developers,

3.8(1)
AwareGO

AwareGO

IS flag

Security Awareness Training

AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace and protect their business from modern-day cybe

3.8(1)
ADL Consulting

ADL Consulting

United Kingdom flag

Compliance Consulting

ADL Consulting provide information security-related consultancy and training support to businesses across the UK. ADL Consulting help medium-sized businesses to develop a pragmatic and efficient stra

3.8(1)
EtherAuthority

EtherAuthority

India flag

Security Operations

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018. EtherAuthority, a premier blockchain smart contract security company,

3.8(1)
Circle Security

Circle Security

United States flag

Data Loss Prevention

Circle’s breakthrough security API unifies the solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their application

3.8(1)
Aptive Consulting

Aptive Consulting

United Kingdom flag

Penetration Testing

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services. Penetration Testing - We provide manual penetration testing services performed by CREST reg

3.8(1)
World Cyber Security Summit

World Cyber Security

India flag

Security Operations

World Cyber Security Summit, organised by Trescon, is a thought-leadership driven, business-focused initiative that provides a platform for CISOs who are looking to explore new-age threats and the tec

3.8(1)
Kasm Technologies

Kasm Technologies

United States flag

Threat Intelligence Platforms

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers. Deployment - Kasm is equipped with the authentication and security

3.8(1)
Blackwall Industries

Blackwall Industries

PH flag

Compliance Consulting

Blackwall Industries is a Philippine-based cybersecurity firm committed to delivering proactive, scalable protection for local businesses. Our approach combines deep local insight with the power of op

3.8(1)
CYMAR

CYMAR

HK flag

Security Operations

CYMAR offer a disruptive and challenging approach to providing cyber insurance.

3.8(1)
International Accreditation Forum (IAF)

International Accreditation Forum

Canada flag

Security Operations

The IAF is the world association of Conformity Assessment Accreditation Bodies. Its primary function is to develop a single worldwide programme of conformity assessment which reduces risk for business

3.8(1)
Ackcent Cybersecurity

Ackcent Cybersecurity

Spain flag

Compliance Consulting

Our mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services. Ackcent's professional services are designed to ach

3.8(1)
Zen360Consult

Zen360Consult

BH flag

Compliance Consulting

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity. We advise organizations to safeguard their most imp

3.8(1)
Advisen

Advisen

United States flag

Security Operations

Advisen is the leading provider of data, media, and technology solutions for the commercial property and casualty insurance market. Advisen’s proprietary data sets and applications focus on large, spe

3.8(1)
APERIO

APERIO

United States flag

Industrial Control System Security

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations. Data is growing exponentially

3.8(1)
FirstStep Middle East & Africa

FirstStep Middle East

United Arab Emirates flag

Services

FirstStep MEA is a dynamic distribution and consulting company specializing in cybersecurity and forensics. Focused on the Middle East and African markets, the company identifies and markets niche tec

3.8(1)
Advanced IT

Advanced IT

United States flag

Managed Security Service Providers

At Advanced IT, we provide a modular approach to technology solutions, ensuring that from the spark of your initial idea to your project’s completion, our dedicated team stands with you. As a premier

3.8(1)
CloudLayar

CloudLayar

United Kingdom flag

Threat Intelligence Platforms

CloudLayar is a cloud-based website firewall for protecting your website against online threats. CloudLayar was built with simplicity in mind so that every user could use the powerful protection with

3.8(1)
Brightside AI

Brightside AI

Switzerland flag

Security Awareness Training

Brightside AI is a Swiss cybersecurity SaaS that helps teams combat AI-enabled phishing threats. Protect your team today. Let Brightside AI prepare your team for cyberattacks. The first cybersecurity

3.8(1)
Jetico

Jetico

Finland flag

Data Loss Prevention

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Powerful yet easy to use, BCWipe and BestCrypt are engineered for a wide range of users:

3.8(1)
Copenhagen FinTech

Copenhagen FinTech

Denmark flag

Security Operations

Copenhagen FinTech is a centre for R&D and innovation in the Danish finance IT sector. Focus areas include cyber security and payments platforms. We want to create a Danish fintech ecosystem of the h

3.8(1)
Communications Fraud Control Association (CFCA)

Communications Fraud Control

United States flag

Security Operations

CFCA is the premier International Association for fraud risk management, fraud prevention and profitability control through education, information sharing and collaboration involving domain experts an

3.8(1)
Ammune.ai

Ammune.ai

Israel flag

Threat Intelligence Platforms

Ammune.ai (formerly L7 Defense) helps organizations to protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks. APIs have become c

3.8(1)
ACM-CCAS

ACM-CCAS

United Kingdom flag

Security Operations

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 (Information Security Management) and ISO 22301 (Busi

3.8(1)
IntelForce

IntelForce

EG flag

Threat Intelligence Platforms

IntelForce (Cyber Intelligence / Dark Web Monitoring)IntelForce provides services in cyber intelligence, especially Dark Web Monitoring and OSINT (Open‐Source Intelligence), Attack Surface Management

3.8(1)
Aurascape AI

Aurascape AI

United States flag

Security Operations

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture. We have assembled one of the world’s best teams combining Security, Generative AI, and SaaS

3.8(1)
Pangea

Pangea

United States flag

Security Operations

Pangea's AI Security Platform empowers security teams to secure AI from cloud to code. With Pangea, organizations can enable secure workforce AI use and innovation and ship secure AI applications fas

3.8(1)
Blockchain Research Institute (BRI)

Blockchain Research Institute

Canada flag

Security Operations

3.8(1)
Ampcus Cyber

Ampcus Cyber

United States flag

Compliance Consulting

Ampcus Cyber specialize in providing comprehensive security solutions and services that are tailored to safeguard our clients' networks, infrastructure, and valuable assets. With a team of highly skil

3.8(1)
Alias

Alias

United States flag

Compliance Consulting

Alias (formerly Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services. By allowing our security team to be your security expert, w

3.8(1)
Aporeto

Aporeto

United States flag

Security Operations

Aporeto is a Zero Trust security solution for cloud, containers and microservices, allowing companies to achieve granular application segmentation. The Aporeto platform protects cloud applications fr

3.8(1)
CAT Labs

CAT Labs

United States flag

Security Operations

The explosion of crypto-targeted crimes like hacks, scams and fraud is the biggest threat to the Web3 and DeFi revolution. CAT Labs is building cybersecurity protocols for crypto projects and retail a

3.8(1)
National Trading Standards eCrime Team (NTSeCT) - United Kingdom

National Trading Standards

United Kingdom flag

Security Operations

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email. The National Trading Standard e-Crime Team (NTSeCT) is a new

3.8(1)
Farsight Security

Farsight Security

United States flag

Brand Protection

Farsight Security provides the world’s largest real-time actionable threat intelligence on how the Internet is changing. Leveraging proprietary technology purpose-built to manage volumes of data and r

3.8(1)
Cortado Mobile Solutions

Cortado Mobile Solutions

Germany flag

Security Operations

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM. Cortado MDM, enables companies, teams and freelancers to improve productivity and secure their corpo

3.8(1)
CSC Digital Brand Services

CSC Digital Brand

United States flag

Brand Protection

3.8(1)
Allen & Overy

Allen & Overy

United Kingdom flag

Security Operations

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection. Clients turn to us to manage legal risk in relation to the threat of cyber-attacks as well as whe

3.8(1)
GFI Software

GFI Software

United States flag

Security Operations

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant. GFI Security - Monitor, manage

3.8(1)
ERCOM

ERCOM

France flag

Security Operations

Ercom, a subsidiary of the Thales Group, is a French company known for its mobility security solutions. For over 30 years, Ercom has developed a leadership position in the communications, data and te

3.8(1)
DLA Piper

DLA Piper

United Kingdom flag

Security Operations

DLA Piper is a global law firm with more than 4,200 lawyers located throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity. In today's interconnected

3.8(1)
DANAK

DANAK

Denmark flag

Security Operations

DANAK  is the national accreditation body for Denmark, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration services

3.8(1)
Arthur J Gallagher & Co

Arthur J Gallagher

United States flag

Security Operations

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance. Gallagher Cyber Liability Practice experts can help ensure you

3.8(1)
Cybersecurity Dubai

Cybersecurity Dubai

United Arab Emirates flag

Compliance Consulting

Welcome to our cybersecurity company in Dubai! We are a leading provider of top-notch cybersecurity consultant solutions to businesses of all sizes. Our team of experienced professionals is dedicated

3.8(1)
MailChannels

MailChannels

Canada flag

Security Operations

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world. MailChannels builds email security products for hosting providers to give users a mor

3.8(1)
Beosin

Beosin

China flag

Security Operations

Beosin is a blockchain security company providing cybersecurity services including security audits, on-chain asset investigation, threat intelligence and wallet security. Beosin aims to provide the b

3.8(1)
Material Security

Material Security

United States flag

Security Operations

Material is solving one of the most fundamental problems in security: protecting the data sitting in mailboxes. Extend Zero Trust Security to Email. Email is an essential repository of sensitive cont

3.8(1)
Auriga

Auriga

United Kingdom flag

Industrial Control System Security

Auriga create innovative software and have become a benchmark for high quality banking software including cyber security solutions to protect business critical devices. Critical devices provide essen

3.8(1)
C2A Security

C2A Security

Israel flag

Industrial Control System Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection. With our new multi-layer cyber approach for vehicles, we

3.8(1)
Arkose Labs

Arkose Labs

United States flag

Security Operations

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses. Monetary gain is what fuels today’s cy

3.8(1)
APMG International (APM Group)

APMG International (APM

United Kingdom flag

Security Operations

The APM Group is a global accreditation, certification and examination body specializing in certification schemes for individuals, organizations and software. We set, enforce, maintain and improve sta

3.8(1)
CyberSecurityJobsite.com

CyberSecurityJobsite.com

United Kingdom flag

Security Operations

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance. As a leading jobsite within the Cyber S

3.8(1)
AppGuard

AppGuard

United States flag

Threat Intelligence Platforms

AppGuard prevents breaches by blocking applications from performing inappropriate processes, but allows them to continue performing normal actions, using our patented dynamic isolation and inheritance

3.8(1)
Augusta HiTech

Augusta HiTech

United States flag

Security Operations

Augusta Hitech is a focused product development, software services and technology consulting company. Our Vision is to become the most socially impactful and innovative technology company in the Unive

3.8(1)
Antigen Security

Antigen Security

United States flag

Compliance Consulting

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats. Antigen Secu

3.8(1)
Digitpol

Digitpol

Netherlands flag

Security Operations

Digitpol is an authorized criminal investigation agency specializing in operational support and investigative services to fight against transnational crimes. We work together with Public-Private, Law

3.8(1)
S2S Group

S2S Group

United Kingdom flag

Security Operations

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle. We provide a complete package of in-house’ specialised asset security services, assiting clients in al

3.8(1)
Iron Mountain

Iron Mountain

United States flag

Backup as a Service

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets. Every day, companies big and small, in virtually every industry, trust Iron Moun

3.8(1)
IABG

IABG

Germany flag

Cloud Security

IABG offer independent, product-neutral consulting as well as technical and scientific services for the use of safety-relevant systems and technologies. We develop customized solutions for a secure fu

3.8(1)
Deepware

Deepware

Turkey flag

Security Operations

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection. Deepware provides real-time authenticity verification for users using AI sc

3.8(1)
Avatao

Avatao

HU flag

Security Awareness Training

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming. ~~Topics cover classic

3.8(1)
Acuant

Acuant

United States flag

Governance Risk and Compliance Platforms

Acuant is a leading global provider of identity verification, regulatory compliance (AML/KYC) and digital identity solutions. The Trusted Identity Platform is powered by AI and human assisted machine

3.8(1)
Ampyx Cyber

Ampyx Cyber

United States flag

Industrial Control System Security

Ampyx Cyber (formerly Ampere Industrial Security) is an industrial security firm based in Portland, Oregon. We specialize in industrial control systems (ICS) and operational technology (OT) security.

3.8(1)
LetsData

LetsData

United States flag

Security Operations

At LetsData, our mission is to empower organizations communicate proactively by levereging AI-powered analysis of information space to provide actionable insights for data-driven decision-making in th

3.8(1)
ModelOp

ModelOp

United States flag

Security Operations

ModelOp is the leading AI Governance software for enterprises and helps safeguard all AI initiatives —  including generative AI, Large Language Models (LLMs), in-house, third-party, and embedded syste

3.8(1)
Advantech

Advantech

Taiwan flag

Industrial Control System Security

Advantech is a leader in providing trusted innovative embedded and automation products and solutions. Activities include IoT security. Advantech, a global leader in embedded computing and IoT systems

3.8(1)
AirMDR

AirMDR

United States flag

Security Operations

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers. AirMDR delivers the first Managed Detection and Response (MDR) service primarily operated by AI-power

3.8(1)
Reality Defender

Reality Defender

United States flag

Security Operations

Reality Defender stops deepfakes before they become a problem. With comprehensive and proactive scanning, actionable results, and detailed reporting, our proprietary deepfake and generative content fi

3.8(1)
Human Security

Human Security

United States flag

Threat Intelligence Platforms

Human Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

3.8(1)
CIO Dive

CIO Dive

United States flag

Security Operations

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more. Our mission is to prov

3.8(1)
Aujas Cybersecurity

Aujas Cybersecurity

India flag

Compliance Consulting

Aujas Cybersecurity, an NSEIT Company, is an enterprise security service provider for organizations across North America, Asia Pacific, and EMEA regions. Aujas has deep expertise and capabilities in

3.8(1)
Coana

Coana

Denmark flag

Security Operations

Coana helps software teams tackle the flood of alerts from traditional SCA tools. Using advanced reachability analysis, Coana cuts false alerts by over 80%, freeing up significant engineering time wit

3.8(1)
ACME Communications

ACME Communications

HK flag

Managed Security Service Providers

3.8(1)
Baker Donelson

Baker Donelson

United States flag

Security Operations

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity. Baker Donelson's Data P

3.8(1)
Antivirus Tales

Antivirus Tales

United States flag

Threat Intelligence Platforms

Antivirus Tales offers a platform to resolve all types of antivirus-related issues. The platform also provide various blog articles and informative guides to fix antivirus software errors.

3.8(1)
Anthony Timbers LLC

Anthony Timbers LLC

United States flag

Compliance Consulting

Anthony Timbers LLC is a cybersecurity consulting and penetration testing firm providing services to the Federal and Commercial sectors nationwide. Let us be the cybersecurity consulting firm that yo

3.8(1)
BullWall

BullWall

Denmark flag

Threat Intelligence Platforms

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks. BullWall’s three solut

3.8(1)
Alchemy Security Consulting

Alchemy Security Consulting

Australia flag

Compliance Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

3.8(1)
Continuum

Continuum

United Kingdom flag

Backup as a Service

Continuum is the IT management platform company that allows Managed IT Services Providers (MSPs) to maintain and back up on-premise and cloud-based servers, desktops, mobile devices and other endpoint

3.8(1)
Abstract Security

Abstract Security

United States flag

Security Operations

Abstract Security has created a revolutionary platform, equipped with an AI-powered assistant, to better centralize the management of security analytics. Abstract transcends next-gen SIEM solutions b

3.8(1)
AutoRABIT

AutoRABIT

United States flag

Security Operations

AutoRABIT provides DevSecOps tools built specifically for Salesforce developers to increase release velocity, produce consistently high-quality code, and enhance data security. Flexible hosting optio

3.8(1)
BackBox Software

BackBox Software

United States flag

Backup as a Service

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

3.8(1)
Avalor

Avalor

Israel flag

Security Operations

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. Real-time access to complete, accurate, and precise data also means more buy-in for

3.8(1)
Hypori

Hypori

United States flag

Security Operations

Hypori is a virtual smartphone solution that makes truly secure BYOD a reality for organizations in healthcare, finance, government, and beyond. Hypori is a highly secure virtual smartphone solution

3.8(1)
Ballistic Ventures

Ballistic Ventures

United States flag

Security Operations

Ballistic Ventures is a new kind of venture capital firm, built by and for cybersecurity entrepreneurs and investors. Today’s cybersecurity entrepreneurs need investors who are in the fight — who und

3.8(1)
HacWare

HacWare

United States flag

Security Awareness Training

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing. Human Error is the leading cause of data breache

3.8(1)
ANSSI Burkina Faso

ANSSI Burkina Faso

BF flag

Security Operations

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso and is placed under the technical supervision of the Prime Minister and the financial supervision o

3.8(1)
APWG

APWG

United States flag

Security Operations

APWG is the international coalition unifying the global response to cybercrime across industry, government and law-enforcement sectors and NGO communities. APWG’s membership of more than 1800 institu

3.8(1)
AuthLite

AuthLite

United States flag

Security Operations

AuthLite secures your Windows enterprise network authentication. Unlike all competing multi-factor authentication solutions, the unique AuthLite technology teaches your Active Directory how to native

3.8(1)
CodeSealer

CodeSealer

Denmark flag

Threat Intelligence Platforms

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties. With our unique solution, t

3.8(1)
Allegro Software

Allegro Software

United States flag

Industrial Control System Security

Allegro Software Development Corporation is a leading provider of software toolkits that are used by manufacturers to enable their machines to be used on the Internet. Allegro software toolkits are p

3.8(1)
ZILLIONe

ZILLIONe

LK flag

Compliance Consulting

ZILLIONe is one of Sri Lanka´s top enterprise technology solutions providers with exceptional global partnerships, renowned technology providers and excellent in-house development skills. We offer va

3.8(1)
Blockchain Firm

Blockchain Firm

United Kingdom flag

Security Operations

Blockchain Firm is a leading Blockchain based software solutions and service provider with our roots of expertise running deep into the technology. Services include Smart Contract development and Sma

3.8(1)
Microchip Technology

Microchip Technology

United States flag

Industrial Control System Security

Microchip Technology Incorporated is a leading provider of smart, connected and secure embedded control solutions. Its easy-to-use development tools and comprehensive product portfolio enable customer

3.8(1)
Accompio

Accompio

Germany flag

Cloud Security

Accompio offer comprehensive support in the digitalisation of your business processes. Our experts help you to develop and implement innovative solutions to increase your productivity and achieve comp

3.8(1)
Aurva

Aurva

United States flag

Data Loss Prevention

Aurva are a team of engineers, product thinkers, and security minds who believe that data security should be simple, powerful, and built for speed. Securing data in modern cloud environments is no lo

3.8(1)
AISLE

AISLE

United States flag

Threat Intelligence Platforms

AISLE is rewriting the foundations of cybersecurity. We don't just find real vulnerabilities. We fix them - autonomously, end-to-end, and at superhuman speed, scale and precision. AISLE was built by

3.8(1)
CloudBees

CloudBees

United States flag

Security Operations

CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom. Boost, secure, and modernize your developer expe

3.8(1)
Euro-Recycling

Euro-Recycling

United Kingdom flag

Security Operations

Euro-Recycling is a leading UK provider of Secure On-Site Data Media Destruction Services.

3.8(1)
AppSentinels

AppSentinels

India flag

Security Operations

Appsentinels are a group of security and technology experts with a mission to fix gaps in application security. Continuous Discovery and Posture ManagementReal Time discovery of API’s, PII/Sensitive

3.8(1)
ActiveNav

ActiveNav

United States flag

Governance Risk and Compliance Platforms

ActiveNav provide dark data discovery solutions for compliance and information governance. Our cloud platform deploys fast and builds a comprehensive data inventory, presented in dashboards that are

3.8(1)
BTQ Technologies

BTQ Technologies

Canada flag

Data Loss Prevention

Quantum-resistant security using zero-knowledge products, cloud-based software solutions, and hardware. Committed to accelerating and utilizing the the first application of quantum computers for use

3.8(1)
Imageware

Imageware

United States flag

Managed Security Service Providers

Imageware is a pioneer in biometric technology and a leader in biometric cybersecurity. Protect against costly, damaging ransomware hacks by employing biometric cybersecurity solutions. Imageware ide

3.8(1)
BwCIRT

BwCIRT

BW flag

Security Operations

BwCIRT is the Computer Incident Response Team (CIRT) for Botswana. BwCIRT provides an official point of contact for dealing with computer security incidents in the Government Departments, and Interne

3.8(1)
Fivecast

Fivecast

Australia flag

Threat Intelligence Platforms

Fivecast is enabling a safer world. We help organizations around the world explore masses of data to uncover actionable insights. Used and trusted by leading defense, national security, law enforceme

3.8(1)
Capital Network Solutions

Capital Network Solutions

United Kingdom flag

Cloud Security

Capital Network Solutions are a highly accredited managed IT services and consultancy provider, specialising in cyber security, infrastructure and communications. Capital Network Solutions has develo

3.8(1)
Elysium Analytics

Elysium Analytics

United States flag

Security Operations

Elysium Cognitive Security Analytics delivers the latest and most flexible security system to reduce cost and complexity while providing unmatched scalability. Elysium Analytics was founded to take t

3.8(1)
ATHENE National Research Center For Applied Cybersecurity

ATHENE National Research

Germany flag

Security Operations

3.8(1)
3Elos

3Elos

Brazil flag

Compliance Consulting

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions. It is made up of certified profes

3.8(1)
Hacknoid

Hacknoid

UY flag

Security Operations

Hacknoid is an automated vulnerability management platform that allows a couple of clicks to visualize the cybersecurity status of the entire organization. We provide automatic detection of vulnerabi

3.8(1)
WaveLink

WaveLink

United States flag

Compliance Consulting

WaveLink offers low risk, results-oriented Engineering Services and best-of-class Technical Support Services. • Aviation and Flight Engineering• Test Technology Development• Cyber and Security Engine

3.8(1)
KTrust

KTrust

Israel flag

Security Operations

KTrust provides Continuous Threat Exposure Management for Kubernetes environments. At KTrust, we redefine Kubernetes (K8s) security. By mastering K8s attack flows, the company empowers DevSecOps by u

3.8(1)
AegisAI

AegisAI

United States flag

Security Operations

AegisAI is an AI-native Email Security platform. Our AI agents think like human analysts—stopping Zero-day Phishing, BEC, and Malware attacks while cutting false positives by up to 90%. Let our AI Ag

3.8(1)
MrLooquer

MrLooquer

Spain flag

Security Operations

MrLooquer provide a solution to automatically discover the assets of organizations on the internet, determine the level of exposure to attacks and help to manage risk accurately. Complete organizatio

3.8(1)
CryptoSec.info

CryptoSec.info

UN flag

Security Operations

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers. Due to the steady and increasi

3.8(1)
US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk

United States flag

Security Operations

We offer Best Practices/Guidance, Training, Research/Thought Leadership, and Information Sharing & Events.

3.8(1)
Cofense

Cofense

United States flag

Threat Intelligence Platforms

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions. We deliver a collaborative approach to cybersecurity by enabling organization-wide engagement to active ema

3.8(1)
Profian

Profian

United States flag

Data Loss Prevention

Profian’s hardware-based solutions maintain your data's confidentiality and integrity in use, providing true confidential computing to meet regulatory and audit requirements. Deploy applications with

3.8(1)
D-Fence

D-Fence

Finland flag

Threat Intelligence Platforms

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats. D-Fence is the leading email security provider in Finland. Gr

3.8(1)
AuthenTrend

AuthenTrend

Taiwan flag

Security Operations

AuthenTrend provide biometric authentication products to achieve high security with extreme ease-of-use for the user.

3.8(1)
BELAC

BELAC

Belgium flag

Security Operations

BELAC is the national accreditation body for Belgium. BELAC is legally responsible for the accreditation of conformity assessment bodies (laboratories, inspection and certification bodies). This cov

3.8(1)
WTW

WTW

United Kingdom flag

Security Operations

WTW (formerly Willis Towers Watson) provide data-driven, insight-led solutions in the areas of people, risk and capital that make your organization more resilient, motivate your workforce, and maximiz

3.8(1)
CipherTrace

CipherTrace

United States flag

Digital Forensics and Incident Response

CipherTrace develops cryptocurrency Anti-Money Laundering, cryptocurrency forensics, and blockchain threat intelligence solutions. Leading exchanges, banks, investigators, regulators and digital asset

3.8(1)
CertiKit

CertiKit

United Kingdom flag

Security Operations

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible. We use

3.8(1)
Canadian Institute for Cybersecurity (CIC)

Canadian Institute for

Canada flag

Security Operations

The Canadian Institute for Cybersecurity (CIC) is a comprehensive multidisciplinary training, research and development, and entrepreneurial unit that draws on the expertise of researchers in the socia

3.8(1)
Allstate Identity Protection

Allstate Identity Protection

United States flag

Security Operations

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online. Identity & financial monitoringWe provide advanced monitoring, near real-time alerts, and

3.8(1)
AimBrain

AimBrain

United Kingdom flag

Security Operations

AimBrain tools detect and prevent fraud, faster and more accurately than ever before. In the digital era, few businesses are immune to the threat of fraud and the losses it incurs. Detect and block b

3.8(1)
CardinalOps

CardinalOps

United States flag

Security Operations

Using automation and MITRE ATT&CK, the CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack  so you can easily implement a th

3.8(1)
PMSLTech

PMSLTech

United States flag

Security Operations

PMSLTech.net, we provide the latest tech news, facts, updates, and essential tools designed specifically for startups and businesses. Launching a new venture or scaling your existing business, our pl

3.8(1)
Industrial Defender

Industrial Defender

United States flag

Industrial Control System Security

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint. Industrial Defender ASM collects both config

3.8(1)
CyberSec.sk (CSSk)

CyberSec.sk (CSSk)

SK flag

Security Operations

We are a group of security policy enthusiasts that is close to the themes of new security threats. Our ambition was to create a space for Slovaks to converge on cybersecurity from the point of view of

3.8(1)
GreenWorld Technologies

GreenWorld Technologies

United Kingdom flag

Security Operations

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing. We are the only Company to offer on-site asset management and data destruction se

3.8(1)
Anagram

Anagram

United States flag

Security Awareness Training

Anagram is the world’s first human-driven security awareness training platform that delivers real results. We go beyond traditional methods—like outdated videos and quizzes—by offering phishing simul

3.8(1)
Casepoint

Casepoint

United States flag

Security Operations

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs. Powered by cutting-ed

3.8(1)
Apozy

Apozy

United States flag

Threat Intelligence Platforms

Apozy replaces a secure web gateway to nullify phishing, malware and impersonation attacks. Deploy the Apozy extension to every browser in one-click with no performance overhead. Apozy's NoHack brows

3.8(1)
Cleafy

Cleafy

Italy flag

Security Operations

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Every day, we work side by side with our customers to help them safely navigate digital opportuniti

3.8(1)
BlackSwan Technologies

BlackSwan Technologies

United Kingdom flag

Governance Risk and Compliance Platforms

BlackSwan Technologies is reinventing enterprise software through Agile Intelligence for the Enterprise – a fusion of data, artificial intelligence, and cloud technologies. Cyber Underwriting and Thr

3.8(1)
HackRead

HackRead

United Arab Emirates flag

Security Operations

HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. We provide daily update

3.8(1)
CRI Group

CRI Group

United Kingdom flag

Governance Risk and Compliance Platforms

CRI Group excels at deterring, detecting and investigating crimes against businesses. We achieve success using a global network of professionals specially trained in Anti-Corruption, Risk Management a

3.8(1)
Early Warning Services

Early Warning Services

United States flag

Security Operations

Early Warning is committed to providing awareness, education, and enablement around fraud prevention. Early Warning Services, a financial services technology leader, has been empowering and protectin

3.8(1)
AddSecure

AddSecure

Sweden flag

Industrial Control System Security

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions. We help customers optimize their operations, drive business value, and secure vital functions. By combini

3.8(1)
Axoflow

Axoflow

United States flag

Security Operations

Axoflow helps organizations to consolidate their existing solutions for logs, metrics, and traces, and evolve them into a cloud native observability infrastructure to solve challenges in the areas of

3.8(1)
Verint Systems

Verint Systems

United States flag

Security Operations

Verint is a leader in CX automation. The world’s most iconic brands rely on our open platform and team of AI-powered bots to create tangible AI business outcomes, now. Fraud & Security SolutionsWe ar

3.8(1)
Breadcrumb Cybersecurity

Breadcrumb Cybersecurity

United States flag

Compliance Consulting

Breadcrumb Cybersecurity is a cybersecurity and advisory firm. We specialize in penetration testing, threat hunting, incident response, regulatory compliance, and employee training services. Our miss

3.8(1)
CYB3R

CYB3R

United Kingdom flag

Compliance Consulting

CYB3R Group, is a leading provider of comprehensive Cyber Security, IT and Communications Solutions. We specialise in safeguarding digital assets and optimising business technology. Our commitment to

3.8(1)
CloudDefense.AI

CloudDefense.AI

United States flag

Cloud Security

CloudDefense.AI is an industry-leading multi-layered Cloud Native Application and Protection Platform (CNAPP) that safeguards your cloud infrastructure and cloud-native apps with unrivaled expertise,

3.8(1)
Duane Morris LLP

Duane Morris LLP

United States flag

Security Operations

Duane Morris is a global law firm with more than 750 attorneys and offices in the USA, UK and Asia. Practice areas include Cybersecurity. Cybersecurity is one of the big issues of our times and conti

3.8(1)
Auria

Auria

United States flag

Compliance Consulting

Auria advances complex space, missile, and cyber operations with visionary solutions and software. We assemble leading experts and brilliant teams capable of tackling the most challenging missions in

3.8(1)
CamCERT

CamCERT

KH flag

Security Operations

CamCERT is the national Computer Emergency Response Team for Cambodia. CamCERT provides a point of contact for dealing with computer security incidents affecting the Internet community in Cambodia.

3.8(1)
Aim Security

Aim Security

Israel flag

Security Operations

AI Red TeamingLeverage Aim for a safety and security assessment of your GenAI applications. Aim can assess your LLM deployments for vulnerabilities to adversarial attacks, data leakage, and safety ris

3.8(1)
NetRise

NetRise

United States flag

Security Operations

NetRise was founded as a direct result of the many shortcomings currently in the device security market, specifically targeting the firmware of devices. NetRise is shifting the paradigm when it comes

3.8(1)
Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer

United Kingdom flag

Security Operations

Freshfields Bruckhaus Deringer is a global law firm with a long-standing track record of successfully supporting the world's leading national and multinational corporations, financial institutions and

3.8(1)
ACPL Systems

ACPL Systems

India flag

Compliance Consulting

We offer leading-edge technology solutions, expert professional and managed services and proven methodologies to ensure your business risks are reduced, data is protected and business objectives are a

3.8(1)
LEPHISH

LEPHISH

France flag

Security Awareness Training

LePhish is a French cybersecurity solution specializing in automated phishing campaigns. Through realistic and tailored scenarios, we help your employees recognize and avoid cyberattacks and intrusion

3.8(1)
Intrinsic-ID

Intrinsic-ID

United States flag

Industrial Control System Security

Intrinsic-ID is the world’s leading digital authentication company and the inventor of SRAM Physical Unclonable Function or SRAM PUF. Intrinsic-ID leverages inherent manufacturing variations in chips

3.8(1)
Ergon Informatik

Ergon Informatik

Switzerland flag

Security Operations

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite. Ergon provide a fraud detect

3.8(1)
SyberFort

SyberFort

Canada flag

Brand Protection

SyberFort offers a suite of SAAS-based platforms designed to fortify your digital defenses. Threat Intelligence PlatformStay informed about emerging cyber threats with SyberFort's advanced threat int

3.8(1)
Clarabot Nano

Clarabot Nano

HU flag

Data Loss Prevention

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties. Data sharing is implemented with transparent, temporary caches. The identity of

3.8(1)
Alan Boswell Group

Alan Boswell Group

United Kingdom flag

Security Operations

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover. In insurance terms, Cyber Insurance is a relatively new product,

3.8(1)
Aspen Insurance

Aspen Insurance

Belgium flag

Security Operations

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance. At Aspen, we are industry veterans who not only understand cyber insurance produc

3.8(1)
CLUSIF

CLUSIF

France flag

Security Operations

Clusif is the reference association for digital security in France. Its mission is to promote the exchange of ideas and feedback through working groups, conferences and publications. Created in 1992,

3.8(1)
AdvIntel

AdvIntel

United States flag

Threat Intelligence Platforms

AdvIntel is a next-generation threat prevention and loss prevention company launched by a team of certified investigators, reverse engineers, and security experts. We offer state-of-the-art solutions

3.8(1)
CyberFortress

CyberFortress

United States flag

Security Operations

CyberFortress is an insuretech startup offering a new kind of online business interruption policy designed for small business. Narrowly-focused and parametric in nature, this policy will begin paying

3.8(1)
HPE Aruba Networking

HPE Aruba Networking

United States flag

Security Operations

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise, Infrastructure services are offered as softwar

3.8(1)
Intech Security

Intech Security

United Kingdom flag

Governance Risk and Compliance Platforms

Intech Security is a UK-based cybersecurity and IT solutions provider committed to protecting businesses, law firms, and charities from evolving digital threats. Specializing in Cyber Essentials and C

3.8(1)
Rambus Security Division

Rambus Security Division

United States flag

Data Loss Prevention

Rambus Security Division is dedicated to enabling an economy of digital trust for a connected world. Integrating technologies from Cryptography Research, Bell ID and Ecebs, our innovative solutions sp

3.8(1)
International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on

PT flag

Security Operations

The International Conference on Information Systems Security & Privacy (ICISSP) aims at creating a meeting point for researchers and practitioners that address security and privacy challenges that con

3.8(1)
Zluri

Zluri

United States flag

Security Operations

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance. Zluri empowers IT and Security teams to gain visibility into their SaaS landscape, u

3.8(1)
Invariant Labs

Invariant Labs

Switzerland flag

Security Operations

Invariant Labs are a team of technical experts with broad experience ranging from academia to big tech on a mission to unlock the potential of AI systems by making them robust, reliable and secure.

3.8(1)
Coralogix

Coralogix

United States flag

Security Operations

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing. By

3.8(1)
Gilsbar

Gilsbar

United States flag

Security Operations

For more than half a century, Gilsbar has offered insurance service solutions and support for businesses and their employees. Cyber Liability InsuranceAs more businesses go virtual, so do their risks

3.8(1)
High Technology Crime Investigation Association (HTCIA)

High Technology Crime

United States flag

Security Operations

The High Technology Crime Investigation Association (HTCIA) was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes. As such,

3.8(1)
Argo Group

Argo Group

Belgium flag

Security Operations

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services. The Argo Digital platform provide

3.8(1)
Herbert Smith Freehills

Herbert Smith Freehills

United Kingdom flag

Security Operations

Herbert Smith Freehills is a leading professional services business offering legal services in specialist areas including data protection and privacy. Our data protection and privacy practice is comp

3.8(1)
UKON

UKON

United States flag

Security Operations

Inspired by the Yukon River. Vast. Powerful. Once impossible to navigate. Cyber insurance has been the same. UKON helps businesses navigate cyber risk with clarity and control. UKON is the free cyber

3.8(1)
Adaptive Security

Adaptive Security

United States flag

Security Awareness Training

Adaptive is a next-generation cybersecurity platform. We're working with pioneering security teams to protect critical systems from AI-powered cyber attacks. One platform to prevent GenAI social engi

3.8(1)
Futurex

Futurex

United States flag

Data Loss Prevention

Futurex is a globally recognized provider of enterprise-class data encryption solutions. More than 15,000 customers worldwide have trusted Futurex's innovative technology to provide market-leading so

3.8(1)
Upfort

Upfort

United States flag

Security Operations

Upfort (formerly Paladin Cyber) unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions. We’re a customer-obsessed team of security, insurance, softwar

3.8(1)
Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER) - USA

Department of Energy

United States flag

Security Operations

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today by improving ene

3.8(1)
Armo

Armo

Israel flag

Security Operations

ARMO is bringing the future of developer-driven Kubernetes security, today. Our patented technology and tools fit natively within the CI/CD pipeline and existing development tools, assuring DevOps, De

3.8(1)
aeCERT

aeCERT

United Arab Emirates flag

Security Operations

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates. aeCERT os operated by the UAE Telecommunications & Digital Government Regulatory Authority (TDRA). The TDRA was e

3.8(1)
Atlantica Digital

Atlantica Digital

Italy flag

Compliance Consulting

Since 1987, Atlantica we have been developing reliable, scalable, and secure IT infrastructures and solutions with passion and dedication. We transform your IT “costs” into formidable business tools.

3.8(1)
Appalachia Technologies

Appalachia Technologies

United States flag

Compliance Consulting

Appalachia is a full service Managed Services Provider with a focus on cybersecurity, backed by the best engineers. Our highly-certified cybersecurity experts are dedicated to protecting businesses o

3.8(1)
ADNET Technologies

ADNET Technologies

United States flag

Managed Security Service Providers

ADNET Technologies is a SOC 2, Type II Compliant IT management and cybersecurity firm. We work closely with clients to provide industry-leading service across three core areas—Managed IT Services, Cyb

3.8(1)
Atropos

Atropos

United States flag

Security Operations

AI-powered vulnerability detection and custom fixes for photovoltaic systems. Protect your assets and the grid from evolving cyber threats. The rapid expansion of solar energy has created a dangerous

3.8(1)
BeckTek

BeckTek

Canada flag

Backup as a Service

BeckTek specialize in IT Cyber Security & Support, helping clients run their businesses faster, easier and more profitably. BeckTek is New Brunswick’s leader in cyber security solutions. We can evalu

3.8(1)
Axiler

Axiler

Singapore flag

Cloud Security

Axiler is a visionary cybersecurity company, where innovation meets resilience. Through the elegance of AI-driven self-healing architecture, we seamlessly detect, patch, and neutralize threats in real

3.8(1)
BCN Group

BCN Group

United Kingdom flag

Backup as a Service

BCN Group is an agile IT solutions provider. We are experts in delivering and managing business-critical technology solutions. Our Managed IT support services provide a fully managed solution for all

3.8(1)
Xtel Communications

Xtel Communications

United States flag

Compliance Consulting

Xtel is a specialist in providing innovative voice and data solutions including Unified Communications, Network Security, Cybersecurity, Network Connectivity and Voice services. CybersecurityOur team

3.8(1)
BI.ZONE

BI.ZONE

Russia flag

Brand Protection

3.8(1)
Dataprovider.com

Dataprovider.com

Netherlands flag

Brand Protection

Dataprovider's Brand Protection Suite gives you the principal tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately

3.8(1)
Beta Systems Software

Beta Systems Software

Germany flag

Governance Risk and Compliance Platforms

Beta Systems automate IT-based business processes, control access rights across all platforms securely and reliably, monitor processes, secure the network and optimize the infrastructure management of

3.8(1)
BioCatch

BioCatch

Israel flag

Security Operations

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud. Founded in 2011 by experts in neural sc

3.8(1)
National Response Centre for Cyber Crime (NR3C) - Pakistan

National Response Centre

PK flag

Security Operations

National Response Centre for Cyber Crime (NR3C) is a law enforcement agency in Pakistan dedicated to fighting cyber crime. NR3C, is the latest introduction to mandate of the Federal Investigation Age

3.8(1)
European Network for Cyber Security (ENCS)

European Network for

Netherlands flag

Industrial Control System Security

ENCS’s core focus is around educating and solving cyber security challenges in the development and operation of energy grids and other critical infrastructure grids across Europe. The European Networ

3.8(1)
Armolon

Armolon

United States flag

Backup as a Service

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients. At Armolon, our goal is t

3.8(1)
DeNexus

DeNexus

United States flag

Industrial Control System Security

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification. Powered by probabilistic inferenc

3.8(1)
Boston Government Services (BGS)

Boston Government Services

United States flag

Compliance Consulting

Boston Government Services (BGS) is an engineering, technology, and security firm providing mission-focused solutions for the clean energy, nuclear, and federal programs markets. Our unique capabiliti

3.8(1)
360° Online Brand Protection

360° Online Brand

Germany flag

Brand Protection

360° Online Brand Protection (360° OBP) have developed a response to monitor counterfeiting and piracy activity at the online point of sale. We hunt down the forgers of your brands and products – abus

3.8(1)
HiddenLayer

HiddenLayer

United States flag

Security Operations

HiddenLayer is a provider of security solutions for machine learning algorithms, models and the data that power them. HiddenLayer was founded by ML professionals and security specialists with first-h

3.8(1)
CyberASAP

CyberASAP

United Kingdom flag

Security Operations

CyberASAP, funded by DCMS in collaboration with Innovate UK & KTN, helps academics in UK universities commercialise their cyber security ideas. CyberASAP provides expertise, knowledge and support to

3.8(1)
Dale Peterson

Dale Peterson

United States flag

Compliance Consulting

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS that runs an organization’s critical in

3.8(1)
Gidisync Solutions

Gidisync Solutions

United Kingdom flag

Cloud Security

From cloud security and incident response to strategic leadership and compliance, our comprehensive suite of cybersecurity services protects your business at every level.

3.8(1)
Memcyco

Memcyco

Israel flag

Brand Protection

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients. Our sol

3.8(1)
VT Group (VTG)

VT Group (VTG)

United States flag

Compliance Consulting

VTG delivers force modernization and digital transformation solutions that expand America’s competitive advantage in the modern battlespace. Our broad portfolio of capabilities includes C5ISR systems

3.8(1)
Becrypt

Becrypt

United Kingdom flag

Data Loss Prevention

With a heritage of creating National Cyber Security Centre certified products, Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisa

3.8(1)
BlackOwlCybers

BlackOwlCybers

United States flag

Compliance Consulting

BlackOwlCybers is a dedicated cybersecurity firm providing comprehensive solutions to protect businesses from evolving digital threats. With our experienced team and cutting-edge technologies, we prio

3.8(1)
Acmetek Global Solutions

Acmetek Global Solutions

United States flag

Data Loss Prevention

Acmetek is a Global Distributor and a Trusted Advisor of PKI /IOT & SSL Security Products and a Managed Services Company.

3.8(1)
Certification Europe

Certification Europe

Ireland flag

Security Operations

Certification Europe (now Amtivo Ireland) is an accredited certification body which provides International Organization for Standardization (ISO) management system certification, including ISO 27001,

3.8(1)
BriskInfosec Technology & Consulting

BriskInfosec Technology &

India flag

Compliance Consulting

BriskInfosec provides information security services, products and compliance solutions to our customers. Our associates are our strength - with commitment and deep domain expertise, we offer competiti

3.8(1)
Blockchain Slovakia

Blockchain Slovakia

SK flag

Security Operations

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia. Our am

3.8(1)
ABL Cyber Academy

ABL Cyber Academy

United States flag

Security Awareness Training

ABL provides experts in the cyber security field working with civilian and government organizations. Working with your point of contact, we manage the training schedule, handle all attendance registr

3.8(1)
Codeproof Technologies

Codeproof Technologies

United States flag

Security Operations

3.8(1)
Cysmo Cyber Risk

Cysmo Cyber Risk

Germany flag

Security Operations

Cysmo is an innovative cyber risk assessment platform specifically designed for the needs of the German insurance industry. Cysmo is establishing itself as the standard in German-speaking countries a

3.8(1)
CyberSafe

CyberSafe

PT flag

Compliance Consulting

CyberSafe is a Portuguese company with a focus on cybersecurity solutions and services. We are providers of the most advanced SIEM, Security Analytics, Advanced Persistent Threats (APT) Protection, A

3.8(1)
DNV

DNV

Norway flag

Compliance Consulting

DNV are the independent expert in assurance and risk management. We deliver world-renowned testing, certification and technical advisory services. DNV combines specialist knowledge of your industry w

3.8(1)
Huawei

Huawei

China flag

Security Operations

Huawei is a leading global ICT solutions provider. Driven by a commitment to sound operations, ongoing innovation, and open collaboration, we have established a competitive ICT portfolio of end-to-end

3.8(1)
Privacera

Privacera

United States flag

Governance Risk and Compliance Platforms

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data. As a member of the IT

3.8(1)
Academia the Technology Group

Academia the Technology

United Kingdom flag

Compliance Consulting

Academia specialise in the supply of software, IT hardware, training and service solutions to the public sectors, business and pro media markets. We combine next generation technology with cost effec

3.8(1)
Zeron

Zeron

India flag

Governance Risk and Compliance Platforms

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios. Zeron serves as t

3.8(1)
Approachable Certification

Approachable Certification

United Kingdom flag

Security Operations

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards. We audit and provide certification

3.8(1)
CleanCloud by SEK

CleanCloud by SEK

Brazil flag

Cloud Security

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations, including ISO

3.8(1)
AMETIC

AMETIC

Spain flag

Security Operations

AMETIC, the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies, champions the interests of Spanish businesses in a hyper-sector t

3.8(1)
Billington CyberSecurity

Billington CyberSecurity

United States flag

Security Awareness Training

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity. The company's flagship event is the Annual Billington CyberSecurity Summit. Since 2010,

3.8(1)
Evoke Security

Evoke Security

United States flag

Security Operations

Evoke Security helps organizations secure agentic AI. Control Your Agentic Security Risks. Discover, monitor, and defend your AI systems and Agents. Current tooling makes it impossible to know your A

3.8(1)
NetMotion Software

NetMotion Software

United States flag

Security Operations

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise. Our secure mobility solution keeps your sensitive information safe, no m

3.8(1)
Codean

Codean

Netherlands flag

Security Operations

The Codean Review Environment automates mundane software analysis tasks, so security experts can focus on finding vulnerabilities. Software is getting more complex, the amount of criminal hackers is

3.8(1)
Awantec

Awantec

MY flag

Compliance Consulting

Awantec is a prominent provider of Information and Communication Technology services in Malaysia. Our mission is to advance and accelerate the adoption of digitalization throughout Malaysia, driving p

3.8(1)
Cienaga Systems

Cienaga Systems

United States flag

Threat Intelligence Platforms

Cienaga Systems is a leader in autonomous cyber threat hunting technology. Cienaga Systems' DejaVu is the easiest way for organizations to deploy world-class threat hunting and security monitoring an

3.8(1)
Geordie AI

Geordie AI

United Kingdom flag

Security Operations

Geordie lights the way to safely scale Agentic AI - equipping Security teams with the visibility, risk intelligence and control needed to say "Yes" to innovation. AI Agents promise transformative ben

3.8(1)
Casaba Security

Casaba Security

United States flag

Penetration Testing

Casaba are specialists in software security providing fully managed Software Development Lifecycle services as well as products for application security testing.

3.8(1)
Cybersecurity Competence Center (C3)

Cybersecurity Competence Center

LU flag

Security Operations

The Cybersecurity Competence Center (C3) was created to further strengthen the Luxembourg economy in the field of cybersecurity. C3 is the missing piece in helping Business to face cyber risks Luxembo

3.8(1)
Chaos Computer Club (CCC)

Chaos Computer Club

Germany flag

Security Operations

For more than thirty years we are providing information about technical and societal issues, such as surveillance, privacy, freedom of information, hacktivism, data security and many other interesting

3.8(1)
CHERI Alliance

CHERI Alliance

United Kingdom flag

Security Operations

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry. CHERI signif

3.8(1)
Canadian Cyber Threat Exchange (CCTX)

Canadian Cyber Threat

Canada flag

Threat Intelligence Platforms

The CCTX is Canada’s not-for-profit, private-sector cyber threat sharing hub and collaboration centre. The CCTX was created to build a secure Canada where all organizations, both private and public,

3.8(1)
French Expert Center Against Cybercrime (CECyF)

French Expert Center

France flag

Security Operations

Centre Expert contre la Cybercriminalité Français (CECyF) is a centre of excellence for countering cybercrime in France. CECyF is an association that allows law enforcement agencies, researchers from

3.8(1)
ZEBOX

ZEBOX

France flag

Security Operations

ZEBOX is an international incubator & accelerator of innovative startups founded on the initiative of Rodolphe Saadé, CEO of CMA CGM and led by Matthieu Somekh, an expert on entrepreneurship and innov

3.8(1)
Dark Reading

Dark Reading

United States flag

Security Operations

Dark Reading is the most trusted online community for security professionals. Our community members include thought-leading security researchers, CISOs, and technology specialists, along with thousand

3.8(1)
CyberOwl

CyberOwl

United Kingdom flag

Compliance Consulting

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems. We are on a mission to leverage data and analytics to shift

3.8(1)
Cyntegra

Cyntegra

United Kingdom flag

Backup as a Service

Cyntegra enables fast, local and complete recovery from ransomware and other cyber attacks. Restore business operations and staff productivity in hours and minutes instead of days, weeks, or months wi

3.8(1)
Cyberstarts

Cyberstarts

Israel flag

Security Operations

3.8(1)
Allurity

Allurity

Sweden flag

Compliance Consulting

Allurity is a group of tech-enabled cybersecurity service providers, comprised of best-in-class experts with a common mission to enable a safe digital world. Through our group of companies, we offer

3.8(1)
vpnMentor

vpnMentor

UN flag

Data Loss Prevention

We started vpnMentor to offer users a really honest, committed and helpful tool when navigating VPNs and web privacy. We are a team of cybersecurity researchers, writers, and editors, all dedicated t

3.8(1)
AirDroid Business

AirDroid Business

Singapore flag

Security Operations

AirDroid Business is an unconventional Mobile Device Management (MDM) software that comes with powerful remote control and device monitoring capabilities like no other. It allows businesses and IT tea

3.8(1)
DefCamp

DefCamp

RO flag

Security Operations

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe. Every year brings together the world’s leading cyber security doers to share latest researc

3.8(1)
BicDroid

BicDroid

Canada flag

Data Loss Prevention

BicDroid is a world leader in data and cyber security with innovative solutions that protect your data anywhere, anytime, against everything. Built on six pillar technologies including post-quantum s

3.8(1)
ZDL Group

ZDL Group

United Kingdom flag

Compliance Consulting

At ZDL (fromerly ZeroDayLab) we believe that effective risk management requires a holistic 360° approach. We take a comprehensive view of our clients cyber security risks and provide quality services

3.8(1)
Backup Systems

Backup Systems

United Kingdom flag

Backup as a Service

At Backup Systems we have become the leading backup and disaster recovery systems providers across the UK, and pride ourselves on the efficiency and quality of our services. Always keep your business

3.8(1)
B&L PC Solutions

B&L PC Solutions

United States flag

Backup as a Service

B&L PC Solutions is a trusted managed IT services provider on Long Island, NY, and St. Petersburg, FL. Since 1997, We have delivered expert IT support to all sized businesses, offering services like c

3.8(1)
Garner Products

Garner Products

United States flag

Security Operations

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination. Our products ensure your data is unrecoverable. Our global technical support team an

3.8(1)
EOL IT Services

EOL IT Services

United Kingdom flag

Security Operations

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction. Since day one we’ve been helping clients big and small with a knowledge and i

3.8(1)
ZeroNorth

ZeroNorth

United States flag

Governance Risk and Compliance Platforms

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs. Our “mission-co

3.8(1)
Authentic8

Authentic8

United States flag

Security Operations

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

3.8(1)
International Data Sanitization Consortium (IDSC)

International Data Sanitization

UN flag

Security Operations

International Data Sanitization Consortium is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry. Our purposes is

3.8(1)
CORDIS

CORDIS

LU flag

Security Operations

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results in the broadest sense. This includes a large nu

3.8(1)
Liquis Inc.

Liquis Inc.

United States flag

Security Operations

Data Destruction ServicesLiquis provides data destruction services that businesses can count on to keep their data handling practices compliant with Sarbanes-Oxley, HIPAA, and other industry-specific

3.8(1)
Adaptive Shield

Adaptive Shield

Israel flag

Cloud Security

Addaptive Shield - Complete Control For Your SaaS Security. Proactively find and fix weaknesses across your SaaS platforms, and maintain continuous security for all global settings and user privileges

3.8(1)
Nitrokey

Nitrokey

Germany flag

Data Loss Prevention

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication. All Nitrokeys are produced

3.8(1)
CryptoCurrency Certification Consortium (C4)

CryptoCurrency Certification Consortium

Canada flag

Security Operations

The CryptoCurrency Certification Consortium (C4) establishes cryptocurrency standards that help ensure a balance of openness & privacy, security & usability, and trust & decentralization. C4 s a non-

3.8(1)
Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for

United States flag

Industrial Control System Security

The goal of the Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS) is to conduct research and develop innovative cybersecurity technologies, tools, and methodologies that advanc

3.8(1)
Automotive Information Sharing & Analysis Center (Auto-ISAC)

Automotive Information Sharing

United States flag

Industrial Control System Security

Auto-ISAC is an industry-driven community to share and analyze intelligence about emerging cybersecurity risks to the vehicle, and to collectively enhance vehicle cybersecurity capabilities across the

3.8(1)
972VC

972VC

Israel flag

Security Operations

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem. 972VC is a place for entrepreneurs and startups in Israel to se

3.8(1)
CircleCI

CircleCI

United States flag

Security Operations

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process. CircleCI enables developers to detect and fix bugs

3.8(1)
International Cybersecurity Forum (FIC)

International Cybersecurity Forum

France flag

Security Operations

The International Cybersecurity Forum (FIC) has established itself as the benchmark event in Europe in terms of digital security and trust. Its originality is to combine: a FORUM promoting reflection

3.8(1)
aFFirmFirst

aFFirmFirst

United Kingdom flag

Brand Protection

aFFirmFirst is a unique software solution offering a simple yet effective way for on-line businesses to protect and control their online images and logo. aFFirmFirst can prevent a company having its

3.8(1)
Fox-IT

Fox-IT

Netherlands flag

Compliance Consulting

Fox-IT prevents, solves and mitigates the most serious cyber threats with smart solutions for governmental bodies, defense, law enforcement, critical infrastructure, banking and large enterprises worl

3.8(1)
Steptoe & Johnson

Steptoe & Johnson

United States flag

Security Operations

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security. As one of the first US law firms to begin practicing

3.8(1)
AccuKnox

AccuKnox

United States flag

Cloud Security

Your cloud-native journey shouldn’t feel like a race against relentless cyber attacks. The fear of breaches, compliance failures, and unmanageable alerts can keep any security team up at night. AccuK

3.8(1)
Cyberscope

Cyberscope

GR flag

Security Operations

Cyberscope is a Web3 security firm specializing in smart contract audits, crypto security audits, and blockchain vulnerability assessments. Our team of cyber security engineers and compliance experts

3.8(1)
ZeroGPT

ZeroGPT

United States flag

Security Operations

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text. With its advanced algorithms and machine learning techniques, ZeroGPT.

3.8(1)
Marvel IT

Marvel IT

Australia flag

Backup as a Service

Marvel I.T. is a trusted local provider of IT support on Sydney's Northern Beaches, delivering fast, reliable, and security-focused solutions for small to medium-sized businesses. We specialise in ma

3.8(1)
7layers

7layers

Germany flag

Industrial Control System Security

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets. The Internet of Things exposes ever

3.8(1)
Zazz

Zazz

Canada flag

Cloud Security

Zazz is a trusted software engineering and IT services partner helping enterprises deliver secure, scalable, and high-impact technology initiatives. Our cyber security consultancy services span preve

3.8(1)
Labaton Sucharow

Labaton Sucharow

United States flag

Security Operations

Labaton Sucharow prosecutes precedent-setting class and direct actions, recovering billions of dollars on behalf of defrauded consumers and investors. Standing on the horizon of law and technology, o

3.8(1)
Avansic

Avansic

United States flag

Digital Forensics and Incident Response

Avansic is a leading provider of e-discovery and digital forensics services to attorneys, litigation support teams, and business communities. We take a scientific approach to providing e-discovery, di

3.8(1)
Cybersprint

Cybersprint

Netherlands flag

Brand Protection

Cybersprint's Digital Risk Protection platform continuously maps and monitors your digital footprint so you can make informed decisions on exposure to online threats, identify vulnerabilities and take

3.8(1)
AccessIT Group

AccessIT Group

United States flag

Cloud Security

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services that assist organizations with the design, implementation and operation of their se

3.8(1)
Digimune

Digimune

South Africa flag

Threat Intelligence Platforms

Digimune is an all-encompassing cloud-based cyber risk protection platform that provides comprehensive cyber intelligence and monitoring software for businesses, families and individuals – guarding yo

3.8(1)
Tymlez Software & Consulting

Tymlez Software &

Netherlands flag

Compliance Consulting

Our strength lies in helping clients to identify and deal with the impact of disruptive technologies on their business. We consult organizations on a variety of issues such as corporate strategy, orga

3.8(1)
ActiveCyber

ActiveCyber

United States flag

Security Operations

ActiveCyber is a source for news, reviews, learning, and technological innovation in the active cyber defense industry. We offer the latest cyber security tips and tricks, in-depth security product re

3.8(1)
Access Talent Today

Access Talent Today

United States flag

Security Operations

Access Talent Today is an AI/ML and cyber security talent provider. Our recruiters have a wide variety of expertise to enable focus on specialized skill-sets for our clients' individual needs. Over

3.8(1)
CyberForum

CyberForum

Germany flag

Security Operations

CyberForum supports businesses from the IT and high-tech industry in all stages of their development: from startup consulting to professional staffing and even location marketing campaigns. CyberForu

3.8(1)
Defence Innovation Accelerator for the North Atlantic (DIANA)

Defence Innovation Accelerator

United Kingdom flag

Security Operations

The NATO DIANA accelerator programme is designed to equip businesses with the skills and knowledge to navigate the world of deep tech, dual-use innovation. It provides an immersive curriculum and ‘bo

3.8(1)
AT&T Cybersecurity

AT&T Cybersecurity

United States flag

Compliance Consulting

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business. Cybersecurity Consulting ServicesM

3.8(1)
Earlybird Venture Capital

Earlybird Venture Capital

Germany flag

Security Operations

Founded in 1997, Earlybird invests in all development and growth phases of technology companies. Earlybird offers its portfolio companies not only financial resources, but also strategic and operation

3.8(1)
Dutch Innovation Park

Dutch Innovation Park

Netherlands flag

Security Operations

Dutch Innovation Park in Zoetermeer, near The Hague. The Dutch breeding ground for applied IT solutions in the field of cyber security, e-health, smart mobility and big data. For enthusiastic IT entre

3.8(1)
Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute

United States flag

Security Operations

3.8(1)
TEISS

TEISS

United Kingdom flag

Security Operations

Teiss.co.uk is a website dedicated to providing information about cyber security. TEISS also provide a series of conferences and events focused on cyber security. The Teiss website was created as a r

3.8(1)
Armorblox

Armorblox

United States flag

Security Operations

Tens of thousands of organizations use Armorblox to stop Business Email Compromise (BEC) and targeted phishing attacks, protect sensitive PII and PCI, and automate remediation of user-reported email t

3.8(1)
Highen Fintech

Highen Fintech

United States flag

Security Operations

We specialize in transforming the financial services industry through innovative technology solutions that empower businesses and consumers alike. At Highen, we recognize that each client has unique r

3.8(1)
Argenta Talent Acquisition

Argenta Talent Acquisition

United States flag

Security Operations

Argenta Talent Acquisition is a recruitment partner specializing in talented candidates serving the Space and Defense, Intelligence Community, all things Technical, Cyber, and Logistics fields. Argen

3.8(1)
DeuZert

DeuZert

Germany flag

Security Operations

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management) as well as IT security requirements catalogue under section 11(1a) of the German E

3.8(1)
Mill Pond Research

Mill Pond Research

United States flag

Security Operations

You deserve the ability to harness the full potential of AI while maintaining complete visibility and control. Mill Pond Research provides the infrastructure that empowers your teams to innovate confi

3.8(1)
Allthenticate

Allthenticate

United States flag

Security Operations

3.8(1)
Asvin

Asvin

Germany flag

Industrial Control System Security

Asvin provides secure update management and delivery for Internet of Things - IoT Edge devices. With asvin vendors can distribute updates secure and easily to keep IoT devices at the edge secure and h

3.8(1)
A10 Networks

A10 Networks

United States flag

Security Operations

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications. Our vision is to protect our customers with best-in-class

3.8(1)
EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers

United States flag

Compliance Consulting

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

3.8(1)
Airbus Protect

Airbus Protect

France flag

Compliance Consulting

Airbus Protect is an Airbus subsidiary bringing together the Company’s expertise in cybersecurity, safety and sustainability-related services. Our aim is to provide a unique global service offering t

3.8(1)
Fluency Security

Fluency Security

United States flag

Security Operations

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

3.8(1)
Barbara IoT

Barbara IoT

Spain flag

Industrial Control System Security

Barbara is the IoT device platform for professional IoT deployments. It offers the required security, support, maintenance and tools to manage a scalable IoT implementation. Barbara is an industrial

3.8(1)
CloudAlly

CloudAlly

Israel flag

Backup as a Service

CloudAlly provides online cloud to cloud backup and recovery solutions, which backs up daily changes in your SaaS to unlimited Amazon S3 storage and makes it available for restore or export. We make b

3.8(1)
Corsearch

Corsearch

United Kingdom flag

Brand Protection

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands. Trusted by thousands of customers worldwide, Corsearc

3.8(1)
Base Cyber Security

Base Cyber Security

Netherlands flag

Security Operations

Base Cyber Security is an information and cyber security talent service provider and career specialist. We advise and build information and cyber security teams for permanent and temporary employment

3.8(1)
Netarx

Netarx

United States flag

Security Operations

Netarx provide real-time deepfake detection for enterprise voice, video and email. Current security solutions are not effective against social engineering attacks. Our product, known as the “Flurp” i

3.8(1)
Zymbit

Zymbit

United States flag

Industrial Control System Security

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers. At Zymbit we’re passionate about securing the edge of innovation, where cyber

3.8(1)
Zeus Cloud

Zeus Cloud

United Kingdom flag

Cloud Security

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small. Take advantage of highly available, scalable and secure cloud infrastructure with Zeus Cloud's ZC2™

3.8(1)
Accelerator Frankfurt

Accelerator Frankfurt

Germany flag

Security Operations

Accelerator Frankfurt is an independent go-to-market program focused on Fintech, Cybersecurity and Digital B2B startups. The entrepreneurs are scouted mainly from Germany, Israel and the Nordics. We

3.8(1)
Acer Cyber Security Inc (ACSI)

Acer Cyber Security

Taiwan flag

Digital Forensics and Incident Response

3.8(1)
DMH Stallard

DMH Stallard

United Kingdom flag

Security Operations

DMH Stallard is a mid-market law firm with offices in London and the South East. Areas of expertise include cyber security and cyber crime. Our lawyers are experts in technology law and in eliminating

3.8(1)
Neural Defend

Neural Defend

United States flag

Security Operations

Neural Defend is a deepfake detection technology with proprietary algorithms and an AI agentic multi-layered of solution. Leveraging advanced multimodal algorithms, Neural Defend offers real-time det

3.8(1)
IAC

IAC

United Kingdom flag

Security Operations

IAC is a specialist Irecruitment consultancy covering Internal Audit, Risk, Controls, Governance, IT Audit, and Cyber Security roles. With IAC’s cyber security division, you are guaranteed to receive

3.8(1)
ACI Solutions

ACI Solutions

United States flag

Managed Security Service Providers

ACI Solutions is a managed IT services and network security provider working with diverse global commercial, government and public sector clients. We are committed to providing our commercial and fede

3.8(1)
Avanan

Avanan

United States flag

Cloud Security

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click. We 'cloudify' over 60 best-of-breed security solutions a

3.8(1)
AWARE7

AWARE7

Germany flag

Compliance Consulting

IT security for human and machine. With the help of our products and services, we work with you to increase the IT security level of your organization. Penetration Testing - We examine your infrastru

3.8(1)
Zerobait

Zerobait

UN flag

Brand Protection

Zerobait is a SaaS platform for brand protection. We process millions of data points and use AI/ML to detect phishing and impersonation sites targeting our clients, helping businesses prevent fraud an

3.8(1)
Idaho National Laboratory (INL)

Idaho National Laboratory

United States flag

Industrial Control System Security

INL is a science-based, applied engineering national laboratory dedicated to supporting the US Department of Energy's missions in energy research, nuclear science and national defense including critic

3.8(1)
Tracer

Tracer

United States flag

Brand Protection

Tracer (formerly Appdetex) is a next-generation brand protection solution. It constantly finds, analyzes, and stops brand abuse across Web2 and Web3 digital channels. Tracer’s Human-in-the-Loop AI br

3.8(1)
Arete

Arete

United States flag

Compliance Consulting

Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime. We are leaders in the cyber incident response business, havin

3.8(1)
Arsenal Recon

Arsenal Recon

United States flag

Digital Forensics and Incident Response

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence. Registry Recon - provides access to an enormous

3.8(1)
3B Data Security

3B Data Security

United Kingdom flag

Compliance Consulting

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services. Services we offer include proactive preventative security consulting,

3.8(1)
Athena Forensics

Athena Forensics

United Kingdom flag

Digital Forensics and Incident Response

Athena Forensics is one of the UK's leading providers of Computer Forensics, Mobile Phone Forensics, Cell Site Analysis and Expert Witness Services. We specialise in the examination and investigation

3.8(1)
Chartered Institute of Information Security (CIISec)

Chartered Institute of

United Kingdom flag

Security Awareness Training

The Chartered Institute of Information Security (CIISec) is the only pure play information and cyber security institution to have been granted Royal Charter status and is dedicated to raising the stan

3.8(1)
DeviceAssure

DeviceAssure

Ireland flag

Security Operations

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity. DeviceAssure offers a transparent way to validate the a

3.8(1)
Apicrypt

Apicrypt

France flag

Data Loss Prevention

Apicrypt enables secure communications between health professionals by using strong encryption technologies to protect the confidentiality of personal health care data. Apicrypt Secure Medical Messag

3.8(1)
ACROS Security

ACROS Security

SI flag

Penetration Testing

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements. Our in-depth security research pushes the boun

3.8(1)
Block Harbor Cybersecurity

Block Harbor Cybersecurity

United States flag

Industrial Control System Security

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity. Now, we’re applying nearly a decade of service by building the Vehicle Security Engineer

3.8(1)
Cyacomb

Cyacomb

United Kingdom flag

Digital Forensics and Incident Response

Cyacomb (formerly Cyan Forensics)  helps police forces catch criminals by finding digital evidence fast. Cyacomb provides digital forensics software to help police forces find evidence on computers m

3.8(1)
Boecore

Boecore

United States flag

Compliance Consulting

Boecore is an aerospace and defense engineering company that specializes in software solutions, systems engineering, cybersecurity, enterprise networks, and mission operations. Cybersecurity Operatio

3.8(1)
2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

United Kingdom flag

Cloud Security

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs. We help organisations to increase their cyb

3.8(1)
DestructData

DestructData

United States flag

Security Operations

DestructData is a leading independent provider of End of Life data destruction/security solutions. As a pioneer in this challenging  field, we have worked with the industry’s leading vendors, data re

3.8(1)
Hayes Connor Solicitors

Hayes Connor Solicitors

United Kingdom flag

Security Operations

Hayes Connor Solicitors is a specialist data breach and cybercrime law firm.

3.8(1)
MirrorTab

MirrorTab

United States flag

Security Operations

MirrorTab is a cyber security company providing advanced web security solutions that defend web applications against cyber threats like hacking and malware. By eliminating the client-side browser att

3.8(1)
AdEPT Technology Group

AdEPT Technology Group

United Kingdom flag

Threat Intelligence Platforms

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK. We specialise in convergi

3.8(1)
British Blockchain Association (BBA)

British Blockchain Association

United Kingdom flag

Security Operations

British Blockchain Association (BBA) is a not-for-profit organisation that promotes evidence-based adoption of Blockchain and Distributed Ledger Technologies (DLT) across the public and private sector

3.8(1)
Wiz

Wiz

Israel flag

Cloud Security

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads. No agents. No sidecars. Wiz is a cloud native solution that u

3.8(1)
HackControl

HackControl

Poland flag

Brand Protection

HackControl's main focus is delivering cybersecurity services including penetration tests, security audits, block chain audits and brand and anti-phishing protection to our clients. The cyber securit

3.8(1)
ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

United States flag

Data Loss Prevention

ARIA Cybersecurity Solutions are designed and manufactured by the High Performance Products Division of CSP Inc.

3.8(1)
CredShields

CredShields

Singapore flag

Security Operations

CredShields secure smart contracts, protocols, and enterprise applications with AI-powered audits and global compliance standards. At CredShields, we don’t just react to hacks, we predict and prevent

3.8(1)
CIRCL

CIRCL

LU flag

Security Operations

CIRCL is the national Computer Incident Response Center of Luxembourg The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to gather, review, report and

3.8(1)
Norton Rose Fulbright

Norton Rose Fulbright

United Kingdom flag

Security Operations

Norton Rose Fulbright is a global business law firm. Practice areas include Data protection, Privacy and Cybersecurity.

3.8(1)
Get Indemnity

Get Indemnity

United Kingdom flag

Security Operations

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

3.8(1)
Bechtel

Bechtel

United States flag

Industrial Control System Security

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure such as equipment that contr

3.8(1)
ALTR

ALTR

United States flag

Data Loss Prevention

ALTR provide software-embedded solutions for data security and privacy. ALTR's programmable data security and governance embeds directly into application code, neutralizing privacy and breach risks f

3.8(1)
CloudInsure

CloudInsure

United States flag

Security Operations

CloudInsure is a Cloud Insurance platform designed to specifically address emerging liabilities within the Cloud environment.

3.8(1)
Frontal

Frontal

United Arab Emirates flag

Security Operations

Frontal is a specialized unit in Blockchain and Web3.0 cybersecurity. Securing Digital Assets, Cryptocurrency, DeFi, Blockchain and Web3.0 ecosystem. Helping digital asset trading, crypto exchanges an

3.8(1)
Elitecyber Group

Elitecyber Group

United Kingdom flag

Security Operations

Elitecyber group is a team of Cyber Security recruitment experts who work for Cyber Security and Cyber Defence clients and candidates throughout Europe. With a European-wide presence, our recruitment

3.8(1)
APrivacy

APrivacy

Canada flag

Data Loss Prevention

APrivacy provides information and communication security products for the financial services industry. Any Device or Platform - Any mobile device (IPhone, Android) and any operating platform (Windows

3.8(1)
Bureau Veritas

Bureau Veritas

France flag

Security Operations

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide the certification and training services you need to reduce risk and inspire confidence. Data Protection - Our Da

3.8(1)
DigitalStakeout

DigitalStakeout

United States flag

Brand Protection

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and return on inv

3.8(1)
Ciphertex Data Security

Ciphertex Data Security

United States flag

Data Loss Prevention

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems. Ciphertex designs and manufactures powerful, secure and portable data

3.8(1)
Clearvision

Clearvision

United States flag

Compliance Consulting

As an Atlassian Platinum Solution Partner, Clearvision works with teams in the UK and US, providing solutions for the Atlassian stack, Git and open source tooling. Clearvision creates custom SDLC sol

3.8(1)
Antares NetlogiX

Antares NetlogiX

Austria flag

Managed Security Service Providers

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services. Our long-standing customers include many of the top companies in Austr

3.8(1)
InsightCyber

InsightCyber

United States flag

Industrial Control System Security

InsightCyber is on a mission to keep the world’s critical infrastructure, supply chains, and manufacturing operations cyber-safe, helping to prevent attacks that can have catastrophic human and econom

3.8(1)
ASIS International

ASIS International

United States flag

Security Awareness Training

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information. Founded in 1955, ASIS is dedicated to increasing the

3.8(1)
Anzen Technology Systems

Anzen Technology Systems

United Kingdom flag

Data Loss Prevention

Anzen create software solutions which allows organisations to utilize the public cloud for sensitive or classified information, whilst increasing data security and retaining data sovereignty. Our tec

3.8(1)
Berkeley Varitronic Systems (BVS)

Berkeley Varitronic Systems

United States flag

Security Awareness Training

Berkeley Varitronics Systems is an engineering think tank delivering custom wireless RF engineering products and solutions including cyber security. Berkeley offers cybersecurity training, services a

3.8(1)
Kingsley Napley

Kingsley Napley

United Kingdom flag

Security Operations

Cyber crime is an area of growing legal complexity. Our team of cyber crime lawyers have vast experience of the law in this area and defending those accused of cyber crime, as well as those affected b

3.8(1)
Acrisure

Acrisure

United States flag

Backup as a Service

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world. Cyber InsuranceHelp protect yo

3.8(1)
Woz U

Woz U

United States flag

Security Awareness Training

Woz U provides best-in-class technology training for Learners, Higher-Ed Institutions and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber

3.8(1)
CENSUS

CENSUS

GR flag

Compliance Consulting

CENSUS is an internationally acclaimed Cybersecurity services provider offering high-quality services to organizations worldwide. Through cutting-edge IT & OT security research, CENSUS delivers state

3.8(1)
Abissi

Abissi

Italy flag

Compliance Consulting

Abissi supports organizations (critical infrastructures, government and large companies) in the assessment of their security posture, in the identification and prevention of cyber threats in general,

3.8(1)
Bitfury Group

Bitfury Group

Netherlands flag

Security Operations

Bitfury Group is the largest full-service blockchain technology company in the world. We develop and deliver cutting-edge software and hardware solutions necessary for businesses, governments, organiz

3.8(1)
CIS Secure

CIS Secure

United States flag

Compliance Consulting

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions. Our strategic capabilities

3.8(1)
Arxan Technologies

Arxan Technologies

United States flag

Industrial Control System Security

Arxan is the trusted global leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications. We help protect our customers a

3.8(1)
aiComply

aiComply

Italy flag

Governance Risk and Compliance Platforms

NavigateCyber, by aiComply, is the first NIST-Based Risk Management Framework Platform specifically designed to tackle NIST’s Cybersecurity Compliance Frameworks leveraging state-of-the-art technology

3.8(1)
Aurec

Aurec

Australia flag

Security Operations

Aurec provides specialist recruitment and contracting services, including ICT professionals. Aurec have created a specialist professional services divisions that focus on IT & Technology, Banking & F

3.8(1)
NordStellar

NordStellar

Netherlands flag

Security Operations

NordStellar is a threat exposure management platform that enables you to detect and respond to cyber threats targeting your company, before they escalate. Give your security teams visibility into how

3.8(1)
4Geeks Academy

4Geeks Academy

United States flag

Security Awareness Training

4Geeks Academy hosts coding bootcamps that provide students with job-ready tech skills. Our flexible programs include a part-time coding bootcamp, a full stack developer bootcamp, and a software engin

3.8(1)
Dutch Accreditation Council (RvA)

Dutch Accreditation Council

Netherlands flag

Security Operations

RvA (Raad voor Accreditatie) is the national accreditation body for the Netherlands, responsible for assessing the competence and capability of organisations that provide certification, testing, inspe

3.8(1)
European Society of Criminology (ESC)

European Society of

Switzerland flag

Security Operations

The ESC Working Group on Cybercrime is geared to the various aspects of cybercrime, including but not limited to: different forms that cybercrime can take (e.g., hacking, fraud, malicious software inf

3.8(1)
Barrier Networks

Barrier Networks

United Kingdom flag

Compliance Consulting

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security. Our unwavering commitment to our customers, both public and private, has solidifie

3.8(1)
Mailinblack

Mailinblack

France flag

Security Operations

Mailinblack protects your organisation against email threats with an innovative solution that meets your security requirements. Protect your business and employees against threats with the leading em

3.8(1)
CommuniTake

CommuniTake

Israel flag

Security Operations

CommuniTake is a software company that builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use. CommuniTake Intact Mobi

3.8(1)
Buchanan Technologies

Buchanan Technologies

United States flag

Backup as a Service

Buchanan Technologies is a leading IT consulting and outsourcing services firm. Our methodology transforms everyday technology investments into streamlined, secure and scalable solutions that support

3.8(1)
Asset Guardian Solutions (AGSL)

Asset Guardian Solutions

United Kingdom flag

Industrial Control System Security

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes. To achieve this, we offer the Asset Guardian s

3.8(1)
Smart Protection

Smart Protection

Spain flag

Brand Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology. We detect, analyze and eliminate onl

3.8(1)
ThetaRay

ThetaRay

Israel flag

Industrial Control System Security

ThetaRay’s solution for Industrial cyber security protects against unknown zero-day malware, targeted APT attacks, and sophisticated Stuxnet-like state sponsored cyber-attacks that target critical inf

3.8(1)
Halcyon Knights

Halcyon Knights

Australia flag

Security Operations

Halcyon Knights is a specialist executive search and IT recruitment agency in the APAC region. We’re experts across the following specialisations: IT Sales & Marketing, Digital, Cloud, CyberSecurity,

3.8(1)
BluescreenIT (BIT)

BluescreenIT (BIT)

United Kingdom flag

Compliance Consulting

BluescreenIT is an IT Security Consultancy and IT and Cyber Security Training company supporting industry, local authorities, MoD and governmental IT departments strategise, train and implement afford

3.8(1)
Cyberr

Cyberr

LU flag

Security Operations

We’re transforming cybersecurity recruitment with Cyberr Intelligence – the AI-driven platform that connects top cybersecurity talent, both freelance and permanent, with leading employers worldwide.

3.8(1)
XM Cyber

XM Cyber

Israel flag

Cloud Security

XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. Our award-winning Exposure Management platform lets you continuously see your

3.8(1)
Aleo

Aleo

United States flag

Data Loss Prevention

Aleo is building the world's leading developer platform for enabling absolute privacy on blockchains. With our vocal advocacy for privacy tech in the blockchain ecosystem, we are playing a major part

3.8(1)
CrashPlan

CrashPlan

United States flag

Backup as a Service

CrashPlan delivers secure, continuous endpoint backup and recovery for businesses of all sizes. Our solution ensures data resilience by protecting critical files from ransomware, accidental deletion,

3.8(1)
VRS Technologies

VRS Technologies

United Arab Emirates flag

Backup as a Service

VRS Technologies LLC is a leading IT solutions provider based in Dubai, offering a comprehensive range of services including IT support, cybersecurity, structured cabling, ELV solutions, AMC services,

3.8(1)
Cybi

Cybi

France flag

Security Operations

Proactively detect cyber threats before they occur. Cybi leverages artificial intelligence and cybersecurity expertise to offer a complete perspective on vulnerabilities and potential attacks. SCUBA,

3.8(1)
SecureDrives

SecureDrives

United Kingdom flag

Data Loss Prevention

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions from some of the world’s

3.8(1)
Actfore

Actfore

United States flag

Digital Forensics and Incident Response

Since 2022, Actfore has been offering legal counsel, insurance carriers, and corporations advanced AI/ML-powered data mining solutions to swiftly detect and uncover sensitive information compromised i

3.8(1)
F1 Security

F1 Security

KO flag

Threat Intelligence Platforms

F1 Security provides web security solutions developed by industry consulting experts in cyber security. We have a family of web-based solutions that contribute to building a more secure web environmen

3.8(1)
DevOcean

DevOcean

Israel flag

Security Operations

DevOcean, the leader in Cybersecurity Exposure Remediation, helps organizations cut through the chaos by automatically consolidating, prioritizing, and streamlining fixes faster across all teams and a

3.8(1)
Boldon James

Boldon James

United Kingdom flag

Data Loss Prevention

Boldon James are market leaders in data classification and secure messaging software. We give our clients confidence when it comes to controlling and protecting their data. We have over 30 years’ exp

3.8(1)
KDM Analytics

KDM Analytics

Canada flag

Governance Risk and Compliance Platforms

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems. Our products quantify a system’s exposure to cyber-attacks and he

3.8(1)
Cyan Securiy Group

Cyan Securiy Group

Germany flag

Security Operations

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use. Specialized in IT security and data analysis

3.8(1)
Cast Software

Cast Software

France flag

Security Operations

CAST is an independent software vendor that is a pioneer and world leader in Software Analysis and Measurement (SAM). With more than $120 million cumulative investment in R&D, CAST provides the most a

3.8(1)
CPP Group UK

CPP Group UK

United Kingdom flag

Security Operations

CPP Group UK develops products to help insurers add further value to their products and services through its innovative suite of new products in FinTech, InsurTech and cyber security. CPP Secure is a

Creative Destruction Lab (CDL)

Creative Destruction Lab

Canada flag

Security Operations

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies. The nine-month program empl

Com Olho

Com Olho

India flag

Brand Protection

Com Olho provides the measurement, analytics, quality assurance, and fraud protection technologies brands need for their business and customers. Com Olho is a leading cloud-based cyber security as a

SecureData

SecureData

United States flag

Data Loss Prevention

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives. Our SecureDrive product line of military-

6point6

6point6

United Kingdom flag

Compliance Consulting

6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security. At 6point6 we provide a range of cyber services. This includes preventativ

Encore Media Group

Encore Media Group

United Kingdom flag

Security Operations

Encore Media Group is a dynamic and entrepreneurial events company specialising in the technology marketplace. Producing an international enterprise technology event series exploring IoT, Blockchain A

Bavarian IT Security Cluster

Bavarian IT Security

Germany flag

Security Operations

The Bavarian IT Security Cluster e.V. works with companies from the IT industry, companies that use IT security technologies, universities, other research and education institutions and lawyers to ach

Bearer

Bearer

United States flag

Security Operations

Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams. We combine sensitive data context with static code a

Westminster Insight - Cyber Security Conference

Westminster Insight -

United Kingdom flag

Security Operations

1898 & Co

1898 & Co

United States flag

Compliance Consulting

1898 & Co., part of Burns & McDonnell, is a business, technology and security solutions consultancy where experience and foresight come together to unlock lasting advancements. Keep your critical ass

ClearedJobs.Net

ClearedJobs.Net

United States flag

Security Operations

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities. We offer valuable resources for both cleared job se

Awake Security

Awake Security

United States flag

Threat Intelligence Platforms

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist. Awake Security is the only advanc

Common Good Cyber

Common Good Cyber

United States flag

Security Operations

Common Good Cyber is a global initiative with the goal of identifying and implementing innovative models for sustaining groups, organizations, and individuals involved in critical cybersecurity functi

Zymr

Zymr

United States flag

Cloud Security

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration. Zymr has worked closely with several leading cloud sec

Lasso Security

Lasso Security

Israel flag

Security Operations

Lasso Security is a pioneer cybersecurity company safeguarding every Large Language Models (LLMs) touchpoint, ensuring comprehensive protection for businesses leveraging generative AI and other large

GrrCON

GrrCON

United States flag

Security Operations

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people. We keep GrrCON small wit

AppSec Labs

AppSec Labs

Israel flag

Penetration Testing

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

Saidot

Saidot

Finland flag

Security Operations

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations. Saidot’s SaaS (Software-as-a-Service) platform is

Airgap Networks

Airgap Networks

United States flag

Security Operations

Truepic

Truepic

United States flag

Security Operations

Truepic provides technologies that prevent fraud, identity theft, misinformation, and disinformation caused by generative, manipulated, or deepfake digital content. Truepic’s photo verification platf

CV-Library

CV-Library

United Kingdom flag

Security Operations

CV-Library is the UK’s largest independent job board, boasting a CV database of over 17 million CVs. Offering a competitive range of packages, CV-Library provides comprehensive hiring solutions for c

Forta

Forta

UN flag

Threat Intelligence Platforms

Forta is a real-time detection network for security & operational monitoring of blockchain activity. As a decentralized monitoring network, Forta detects threats and anomalies on DeFi, NFT, governanc

LegalByte

LegalByte

United States flag

Digital Forensics and Incident Response

LegalByte is a leading provider of comprehensive legal and forensic services dedicated to addressing the complex challenges of the digital age. With a specialized focus on cyber and crypto-related is

Downdetector

Downdetector

United States flag

Security Operations

Downdetector helps people all over the world understand disruptions to vital services such as the internet, social media, web hosting platforms, banks, games, entertainment, and more. With insight in

Baker McKenzie

Baker McKenzie

United States flag

Security Operations

Baker & McKenzie is an international law firm with a wide range of business and commercial practice areas including Data & Technology.

Bastion Networks

Bastion Networks

United Kingdom flag

Cloud Security

Bastion are a security-focussed managed solution provider and consultancy. We work with advanced cyber security vendors to produce managed security solutions that help you to protect your people, your

Whitaker Brothers

Whitaker Brothers

United States flag

Security Operations

Whitaker Brothers prides itself in being industry leaders with over 75 years of experience. Our data destruction equipment can be found in 115 countries and every single continent in the world, from

Boxphish

Boxphish

United Kingdom flag

Security Awareness Training

Boxphish provides a proven solution to reduce Human Error and Cyber Human Risk via automated learning journeys and intelligent phishing simulations. Our Mission is simple, we want to make our clients

CXI Solutions

CXI Solutions

United States flag

Backup as a Service

At CXI Solutions, we devise virtual security plans to safeguard your programs' confidential data and fence your enterprise against short and long-term online threats. Our all-inclusive service takes a

Brace168

Brace168

Australia flag

Compliance Consulting

Specialising in Cyber Security incident identification and response, Brace168 is uniquely positioned in todays market to provide a vast experience in managed security services to meet the needs of all

Com Laude

Com Laude

United Kingdom flag

Brand Protection

Com Laude is a domain name management company that provides strategic consulting to help companies strengthen digital brand, safeguard customers & protect brand IP. Safeguarding your brand is our bus

ADF Solutions

ADF Solutions

United States flag

Digital Forensics and Incident Response

ADF Solutions is the leading provider of digital forensic and media storage exploitation tools. These tools are used for processing and analyzing computers, external drives, drive images, and other me

01 Communique Laboratory

01 Communique Laboratory

Canada flag

Data Loss Prevention

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security. Our patent-pending Quantum-Safe Cryptographic system can be applied to secure virtually everything in

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange

United States flag

Security Operations

The mission of the CQE is to accelerate discovery and innovation in the rapidly developing areas of quantum technology, and to attract talent, funding, and industry to the Chicago area to become the s

BLUECYFORCE

BLUECYFORCE

France flag

Security Awareness Training

ZENDATA

ZENDATA

Switzerland flag

Compliance Consulting

ZENDATA are an innovative provider of intelligent, tailored cybersecurity solutions to global companies and public sector institutions. As one of Switzerland’s leading players in cyber security and o

Etalon Cyber

Etalon Cyber

United Kingdom flag

Backup as a Service

Etalon Cyber provides a range of advanced features to ensure the highest level of security for your website. Our AI-powered Etalon AI cloud platform continuously monitors your network 24/7, scanning

Swissbit

Swissbit

Switzerland flag

Industrial Control System Security

Swissbit AG is the leading European manufacturer of storage, security and embedded IoT solutions for demanding applications. The growing number of IoT devices need to be secured against interception

Bloc Ventures

Bloc Ventures

United Kingdom flag

Security Operations

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies. Its two founding investment partners have over 50 years’ experie

Evalian

Evalian

United Kingdom flag

Compliance Consulting

Evalian is a data protection services provider. We specialise in Data Protection, GDPR, ISO Certification & Information Security. We work with organisations of all sizes, working directly and through

PhishFort

PhishFort

Singapore flag

Brand Protection

PhishFort offers brand protection services to combat phishing, fake content, and IP infringements. PhishFort's mission is to make the internet a safer place by identifying and shutting down deceptive

Cybertrust Japan

Cybertrust Japan

Japan flag

Industrial Control System Security

Cybertrust Japan provides a comprehensive security certification and digital authentication service, enabling customers to build and manage highly secure IT infrastructures. Certification Authority &

Knostic

Knostic

Israel flag

Security Operations

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

Absa Cybersecurity Academy

Absa Cybersecurity Academy

South Africa flag

Security Awareness Training

Absa Cybersecurity Academy is an externally focused, corporate social responsibility initiative aimed at empowering marginalised South African youths to become certified cybersecurity specialists. Ad

Information Security Media Group (ISMG)

Information Security Media

United States flag

Security Operations

Information Security Media Group (ISMG) is the world’s largest media organization devoted solely to information security and risk management. Each of our media properties provides education, research

White Bullet

White Bullet

United Kingdom flag

Brand Protection

White Bullet’s risk profiling AI detects, dynamically scores and flags unsafe domains, apps and advertising. Get the most accurate infringement data and full transparency to help you secure your ad su

A-LIGN

A-LIGN

United States flag

Governance Risk and Compliance Platforms

A-LIGN is a technology-enabled security and compliance partner trusted by more than 2,500 global organizations to mitigate cybersecurity risks. A-LIGN was founded in 2009 to help companies like yours

ANSEC IA

ANSEC IA

United Kingdom flag

Compliance Consulting

ANSEC is a consultancy practice providing independent Information Assurance and IT Security focussed services to customers throughout the UK, Ireland and internationally. Established in May 2007, the

Zivver

Zivver

Netherlands flag

Data Loss Prevention

Zivver is the effortless, secure email platform, powering the next generation of secure communications. With the hyper acceleration of digital transformation, regulatory reforms and hybrid work, we a

Suzan AI

Suzan AI

France flag

Security Operations

Suzan is an AI-native governance, compliance and risk management tool that helps you build trust. Focus on innovation, we take care of regulations. Deploy AI you can trust. Suzan for AI is your AI-po

iNovex

iNovex

United States flag

Compliance Consulting

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions. We build comprehensive and in

CEPS

CEPS

Belgium flag

Security Operations

CEPS is a leading think tank and forum for debate on EU affairs, ranking among the top think tanks in Europe. With an exceptionally strong in-house research capacity and an extensive network of partn

Acumenis

Acumenis

Australia flag

Compliance Consulting

At Acumenis, we help organisations of all sizes to manage information security effectively. We believe that a successful security program is one that not only achieves compliance and manages security

Keeran Networks

Keeran Networks

Canada flag

Backup as a Service

Established in 1999 in Edmonton, Keeran offers businesses specialized IT support and solutions to optimize technology investments. Our tailored strategies enhance connectivity, communication, and secu

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

Cybersecurity Maturity Model

United States flag

Security Operations

CMMC COE is an IT-AAC sponsored and hosted public–private partnership that will be the focal point for coordination, communication, and collaboration in support of entities seeking to achieve the Cybe

Hive Pro

Hive Pro

United States flag

Security Operations

Hive Pro, we are a team of dedicated cybersecurity experts with a singular mission: to create a unified platform that brings full visibility to your asset security and empowers proactive defense again

CW Jobs

CW Jobs

United Kingdom flag

Security Operations

CWJobs.co.uk is a leading specialist IT recruitment website enabling permanent and contract IT jobseekers to search and apply for jobs across all skills and industry sectors throughout the UK and Irel

IndoSec

IndoSec

ID flag

Security Operations

IndoSec is an annual cybersecurity summit that powers an in-person gathering of cybersecurity leaders from Indonesia’s major corporations, leading businesses and key government entities. Focused towa

63Sats Cybertech

63Sats Cybertech

India flag

Compliance Consulting

63SATS is the cybersecurity business unit of 63 Moons Technologies (63MT), a world leader in providing next-generation technology ventures, innovations, platforms, and solutions.

AEWIN Technologies

AEWIN Technologies

Taiwan flag

Security Operations

A wealth of security options have evolved with the constantly changing landscape of cybersecurity threats. A network appliance acting as the basis to host a suite of security appliances is an attracti

Bounga Informatics

Bounga Informatics

Singapore flag

Digital Forensics and Incident Response

Bounga Informatics provides Digital Forensics, E-Discovery, and Endpoint Security software, hardware, and training in Singapore and other countries in Asia Pacific. Forensic services include digital

Competence Center for Applied Security Technology (CAST)

Competence Center for

Germany flag

Security Operations

CAST offers a range of services in the field of secure modern information technology and a contact point for all questions regarding IT security. Its network of competencies imparts knowledge of IT s

BotRx

BotRx

United States flag

Security Operations

BotRx is the only AI-enabled, automated fraud protection technology that allows fast & easy deployment - continually keeping invisible bad bots and agents at bay, so you can rest easy. BotRx fortifie

Darkscope

Darkscope

New Zealand flag

Security Operations

Darkscope is an award-winning personalised cyber intelligence service provider. We are a joint human and AI business dedicated to developing, training and using artificial intelligence to make our hum

iZOOlogic

iZOOlogic

United States flag

Brand Protection

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets. The iZOO

Centroid

Centroid

United States flag

Cloud Security

Centroid is a cloud services and technology company that provides Oracle enterprise workload consulting and managed services across Oracle, Azure, Amazon, Google, and private cloud.

The Legal 500

The Legal 500

United Kingdom flag

Security Operations

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity. The Hall

Alcon Maddox

Alcon Maddox

United Arab Emirates flag

Security Operations

Alcon Maddox is a niche recruitment and executive search firm specialised in sourcing exceptional Cyber Security sales and commercial leadership talent. Headquartered in Dubai, serving clients across

Innerworks

Innerworks

United Kingdom flag

Security Operations

Innerworks intelligent bot detection. Innerworks is building the future of behavioural data on web3. Innerworks has built 100% seamless behavioural biometrics technology to authenticate your communit

BCX

BCX

South Africa flag

Compliance Consulting

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations. BCX offers a complete service

American Cybersecurity Institute

American Cybersecurity Institute

United States flag

Security Awareness Training

The American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy. The Institute was

Internet Crime Complaint Center (IC3)

Internet Crime Complaint

United States flag

Security Operations

Since 2000, the IC3 has received complaints crossing the spectrum of cyber crime matters, to include online fraud in its many forms including Intellectual Property Rights (IPR) matters, Computer Intru

Hive

Hive

United States flag

Security Operations

Hive is a leading provider of cloud-based AI solutions to understand, search, and generate content, and is trusted by hundreds of the world's largest and most innovative organizations. Hive's technol

Adlink Technology

Adlink Technology

Taiwan flag

Industrial Control System Security

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation. ADLINK embedded IoT gateway platforms fully support Intel® Gateway S

ClearFocus Technologies

ClearFocus Technologies

United States flag

Compliance Consulting

ClearFocus Technologies provides advanced cybersecurity services that secure our nation’s most sensitive assets. ClearFocus is approved for all five GSA Highly Adaptive Cybersecurity Services (HACS)

Indeed

Indeed

United States flag

Security Operations

Indeed is a worldwide employment-related search engine for job listings covering job types in all industries, including cybersecurity. Coverage of jobs in the USA, UK, Europe and countries around the

European Recruitment

European Recruitment

United Kingdom flag

Security Operations

European Recruitment is an award-winning, international recruitment agency specialising in niche technology areas including Cyber Security. We provide intelligent recruitment solutions, advocating qua

Datplan

Datplan

United Kingdom flag

Governance Risk and Compliance Platforms

Datplan Cyber Control software provides a robust cyber security framework model and project plan. Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, a

Womble Bond Dickinson

Womble Bond Dickinson

United Kingdom flag

Security Operations

Womble Bond Dickinson is a transatlantic law firm, providing high-quality legal experience and outstanding personal service to a wide range of regional, national and international clients from key loc

CryptoDATA

CryptoDATA

RO flag

Data Loss Prevention

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields. CryptoDATA OS is specially designed to reinforce

CSI

CSI

United Kingdom flag

Backup as a Service

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries. Our portfolio of Advisory, Professional and Manage

ITRecycla

ITRecycla

New Zealand flag

Security Operations

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, environmentally friendly computer recycling and disposing of el

DataViper

DataViper

United States flag

Threat Intelligence Platforms

DataViper is a threat intelligence platform designed to provide organizations, investigators, and law enforcement with access to the largest collection of private hacker channels, pastes, forums, and

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation

AM flag

Security Operations

Austrian Trust Circle

Austrian Trust Circle

Austria flag

Security Operations

The Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the individual areas of the strategic information infrastru

Helmet Security

Helmet Security

United States flag

Security Operations

Building the Future of AI Security. Helmet Security is a team of security engineers and GRC experts dedicated to making agentic workflows safe for enterprise. Secure your AI infrastructure with the m

AlertEnterprise

AlertEnterprise

United States flag

Industrial Control System Security

AlertEnterprise uniquely eliminates silos and uncovers blended threats across IT Security, Physical Access Controls and Industrial Control Systems for true prevention of insider threat, fraud, theft,

CCX Technologies

CCX Technologies

Canada flag

Security Operations

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets. We’ve developed cybersecurity software and hardware plat

Verafin

Verafin

Canada flag

Security Operations

Verafin is one of the North American leaders in fraud detection and AML software. Verafin’s cloud-based, consolidated Financial Crime Management platform provides financial institutions with a comple

Clifford Chance

Clifford Chance

United Kingdom flag

Security Operations

Clifford Chance are one of the world's pre-eminent law firms, with significant depth and range of resources across five continents. As a single, fully integrated, global partnership, we pride ourselve

ArmorText

ArmorText

United States flag

Data Loss Prevention

ArmorText is a Secure Enterprise Messenger & Crisis Management Platform Built to Solve Real–World Problems. End–to–end encryption that still supports your retention & review, governance, and informati

Framatome

Framatome

France flag

Industrial Control System Security

Framatome is an international leader in nuclear energy recognized for its innovative solutions and low-carbon value added technologies. Framatome Cybersecurity portfolio is directly inspired by its u

Calian Group

Calian Group

Canada flag

Cloud Security

Calian is a diverse Canadian company offering professional services in areas including Advanced Technologies, Health, Learning and IT & Cyber Solutions. Cybersecurity - Keep your company and data saf

Central Intelligence Agency (CIA) - USA

Central Intelligence Agency

United States flag

Security Operations

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities under the Directorate of Science &

AI-vidence

AI-vidence

France flag

Security Operations

The mission of AI-vidence is to make AI more explainable. Our conviction is that it is necessary to introduce a component of logical AI (reasoning based on rules) to enable the model to be robust and

CyberNews

CyberNews

UN flag

Security Operations

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives. Our CyberNews Investigation team uses white-hat hacking t

Wazuh

Wazuh

United States flag

Security Operations

Wazuh provides a security solution capable of monitoring your infrastructure, detecting threats, intrusion attempts, system anomalies, poorly configured applications and unauthorized user actions. It

Araxxe

Araxxe

France flag

Security Operations

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide. We operate our monitoring services in a ‘service bu

Blancco Technology Group

Blancco Technology Group

United States flag

Security Operations

Blancco Technology Group is a leading global provider of mobile device diagnostics and secure data erasure solutions. Blancco is the industry standard in data erasure and mobile device diagnostics. B

ReFirm Labs

ReFirm Labs

United States flag

Industrial Control System Security

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring. We are an elite team of former US Government cyber professionals with decades

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling &

United States flag

Security Operations

The vision of Sadoff E-Recycling & Data Destruction is to be the preferred choice in electronics recycling and data destruction. Our mission to accomplish this is to incorporate customer focus, attain

Aergo

Aergo

HK flag

Security Operations

Aergo offers an easier and more proven way to adopt blockchain and transform your business while building on your existing IT and cloud assets. The Aergo platform securely extends your business proce

IoT Now

IoT Now

United Kingdom flag

Industrial Control System Security

In the first global magazine of its kind, IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next

Bloombase

Bloombase

United States flag

Data Loss Prevention

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations. Bloombase Technologies formulated a vision of least invasive information security so

Wynyard Group

Wynyard Group

HK flag

Security Operations

Wynyard Group is a niche, technology-driven company specializing in Integrated Border Security solutions for enhanced public safety. We are a global leader in security solutions and provide state-of-t

Encode

Encode

United Kingdom flag

Security Operations

Encode is a leading provider of information security services & solutions with a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Servi

Caulis

Caulis

Japan flag

Security Operations

Caulis FraudAlert is a cyber security solution. It can detect fraud and identity theft based on users’ online behaviour. When our system detects unusual behaviour from individual users, it notifies t

GoPro Consultants

GoPro Consultants

United Kingdom flag

Backup as a Service

GoPro Consultants is a 3rd party IT technical support services provider. We focus on providing on-demand and well-managed IT support services around the globe, round the clock. Our highly technical sk

CyberCareers.gov

CyberCareers.gov

United States flag

Security Operations

CyberCareers.gov was created as part of the Federal Cybersecurity Workforce Strategy to provide a platform for Cybersecurity Job Seekers, Federal Hiring Managers and Supervisors, Current Federal Cyber

a1qa

a1qa

United States flag

Security Operations

a1qa has provided independent software QA and testing services across multiple industries, serving more than 500 global customers, including Fortune 500 companies. We specialize in the delivery of ful

Anjuna Security

Anjuna Security

United States flag

Data Loss Prevention

Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud. Unlike complex perimeter security solutions easily breached by in

Hadrian

Hadrian

Netherlands flag

Security Operations

Hadrian is an agentic AI offensive security platform that helps modern security teams prevent breaches before they begin. Agentic AI continuously discovers internet-facing assets, emulates attacker b

Exabeam

Exabeam

United States flag

Threat Intelligence Platforms

Exabeam is a global cybersecurity leader that delivers AI-driven security operations. High-integrity data ingestion, powerful analytics, and workflow automation power the industry’s most advanced sel

CERTuy

CERTuy

UY flag

Security Operations

CERTuy is the national Computer Emergency Response Team for Uruguay. CERTuy protects critical information assets of the State and promotes information security awareness in order to prevent and respo

Cybersecurity Professionals

Cybersecurity Professionals

United Kingdom flag

Security Operations

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms. Professionals - R

Secmation

Secmation

United States flag

Compliance Consulting

Secmation are an agile engineering services firm providing advanced DoD level security design and consultation services for both commercial and defense hardware and software applications. Secmation i

Arsen Cybersecurity

Arsen Cybersecurity

France flag

Security Awareness Training

On one hand, theoretical knowledge does not translate into practice when the employee is manipulated. On the other hand, threats continually evolve, and one cannot rely on occasional awareness operati

AIM Intelligence

AIM Intelligence

KO flag

Security Operations

AIM Intelligence focus on detecting, targeting, and eliminating risks in AI systems that support social infrastructure. We particularly concentrate on AI in healthcare, finance, robotics, and Compute

Zamna

Zamna

United Kingdom flag

Security Operations

Zamna (formerly VChain Technology) is an award-winning software company building GDPR compliant identity platforms for the aviation industry. Zamna empowers airlines to verify a passenger’s identity

Acutec

Acutec

United Kingdom flag

Backup as a Service

Acutec is an award winning IT support, services and solutions provider including managed IT Security and backup/disaster recovery. Acutec IT Security Services are designed to offer you the best solut

Identity Digital

Identity Digital

United States flag

Brand Protection

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities. We’re

Mosyle

Mosyle

United States flag

Security Operations

Businesses and educational institutions rely on Mosyle to manage and secure their Apple devices and networks. Mosyle is the only solution that fully integrates five different applications on a single

Acuvity

Acuvity

United States flag

Security Operations

Acuvity is the most comprehensive AI security and governance platform for your employees and applications. Secure your GenAI adoption with confidence. Acuvity is a team of security and AI experts who

BMS Group

BMS Group

United Kingdom flag

Security Operations

BMS is an independent, employee-owned specialist insurance broking group built around teams of experts in the fields of reinsurance, direct and wholesale business. Our in-house specialist cyber consu

CyberSN

CyberSN

United States flag

Security Operations

CyberSN is your essential partner in cybersecurity workforce risk management, offering cybersecurity talent intelligence solutions that empower leaders to diversify, acquire, retain, and develop their

Agari

Agari

United States flag

Brand Protection

Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks. Using applied data science and a diverse set of signals, Agari pro

Appgate

Appgate

United States flag

Penetration Testing

Appgate is the secure access company. We empower how people work and connect by providing solutions purpose-built on Zero Trust security principles. This people-defined security approach enables fast

Lexsynergy

Lexsynergy

United Kingdom flag

Brand Protection

Lexsynergy is a global domain name management and online brand protection company. Our service enables clients to safeguard their brands online. Domain names are a core part of a brand’s Intellectual

CyberAcuView

CyberAcuView

United States flag

Security Operations

CyberAcuView is a company dedicated to enhancing cyber risk mitigation efforts across the insurance industry. Through the collective expertise of its members, CyberAcuView will compile and analyze cyb

Onsist

Onsist

Netherlands flag

Brand Protection

Onsist brand protection services provide proactive defense against fraudulent use of your brand online. We make it a point to safeguard the brand equity, web traffic and reputation of brands from eve

Active Countermeasures

Active Countermeasures

United States flag

Security Awareness Training

Active Countermeasures is a group of like-minded geeks that believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable

Alpha Omega Integration

Alpha Omega Integration

United States flag

Compliance Consulting

Alpha Omega creates new possibilities through intelligent end-to-end mission-focused government IT solutions. Whether it’s intelligent automation, custom agile software development, cloud solutions,

Verosint

Verosint

United States flag

Security Operations

Verosint (formerly 443ID) provides real-time account fraud prevention that reveals fraudsters hiding in user accounts and proactively blocks them before their attacks can cause harm. We’re committed

Igloo Security

Igloo Security

KO flag

Managed Security Service Providers

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services); providing intuitive secur

6clicks

6clicks

Australia flag

Governance Risk and Compliance Platforms

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards. Hundreds of businesses trust

NXP Semiconductors

NXP Semiconductors

Netherlands flag

Industrial Control System Security

NXP is a world leader in secure connectivity solutions for embedded applications and the Internet of Things. NXP enables secure connections and infrastructure for a smarter world, advancing solutions

CyberCube

CyberCube

United States flag

Security Operations

CyberCube provide world-leading cyber risk analytics for the cyber insurance market. CyberCube’s data and analytics platform supports multiple applications to enable (re)insurance placement, underwri

Cyberbit

Cyberbit

Israel flag

Industrial Control System Security

Cyberbit is revolutionizing the SOC, with the first analytics-driven product suite for managing the entire incident lifecycle, from detection to incident response, and for simulated SOC team training,

CyberProof

CyberProof

United States flag

Governance Risk and Compliance Platforms

CyberProof delivers threat-led, co-managed security operations with the belief that better security is achieved through the right partnerships, technology and client experiences. CyberProof’s Threat-

Bsquare

Bsquare

United States flag

Industrial Control System Security

Bsquare DataV software solutions can be deployed by a wide variety of enterprises to create business-focused Internet of Things (IoT) systems that more effectively monitor device data, automate proces

Match Systems

Match Systems

Singapore flag

Governance Risk and Compliance Platforms

Match Systems is a provider of technology-driven solutions for financial crime detection, compliance and risk management. Match Systems is the Data provider of information about cryptocurrency addres

WizNucleus

WizNucleus

United States flag

Industrial Control System Security

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and to remain compliant

Technation

Technation

Canada flag

Security Operations

As the leading national technology industry association, Technation (formerly Information Technology Association of Canada - ITAC) proudly represents Canadian technology companies that are furthering

GE Digital

GE Digital

United States flag

Industrial Control System Security

GE Digital is a leading software company for the Industrial Internet. Products include Industrial Cyber Security for Operational Technology (OT). GE Digital’s Cyber Security Solutions are built with

BitRaser

BitRaser

United States flag

Security Operations

BitRaser is a plug and play software that permanently erases data beyond the scope of data recovery. It provides audit reports for fulfilling internal / external corporate audit requirements and compl

Altaro Software

Altaro Software

MT flag

Backup as a Service

Altaro provide backup solutions that are intuitive, easy to use, well-priced and backed by outstanding 24/7 support as part of the package. With Altaro VM Backup, you can install and run your first v

AGAT Software

AGAT Software

Israel flag

Security Operations

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions. The company’s core product suite is based on a reverse proxy application

Certus Software

Certus Software

Germany flag

Security Operations

Our Secure Data Erasure solutions cost effectively protects customer data confidentiality by completely erasing it from data storage devices and conforming to internationally certified standards (Comm

Charterhouse Müller UK

Charterhouse Müller UK

United Kingdom flag

Security Operations

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal. With over 20 years’ experience in the market, our priority is en

Griffeshield

Griffeshield

Italy flag

Brand Protection

Griffeshield is a company specialised in new information technologies used to protect Intellectual Property. We fight all forms of counterfeiting and online infringement, protecting your image and the

CyberUK

CyberUK

United Kingdom flag

Security Operations

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community. It demonstrates what we can do together as teams, as departments and as

e-End

e-End

United States flag

Security Operations

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

Dell Technologies Capital

Dell Technologies Capital

United States flag

Security Operations

At Dell Technologies Capital we lead investment in disruptive, early-stage startups in enterprise and cloud infrastructure. World-class entrepreneurs have chosen to partner with us for our deep domain

SafeBrain.AI

SafeBrain.AI

France flag

Security Operations

SafeBrain.AI is a major player in the deployment of generative AI within organizations. Our goal is to enable all companies to benefit from the power of AI, while controlling its governance. Your AI

Adili Group

Adili Group

KE flag

Compliance Consulting

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.

Howden Broking Group

Howden Broking Group

United Kingdom flag

Security Operations

Howden provides a range of specialist insurance solutions to clients around the world including Cyber Liability insurance. Cyber Liability addresses the first and third-party risks associated with e-

Code42

Code42

United States flag

Backup as a Service

Code42 is best known for CrashPlan, an enterprise SaaS solution that backs up all distributed end-user data on a single, secure platform. Through continuous, automatic collection via a lightweight ag

Critifence

Critifence

Israel flag

Industrial Control System Security

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems which allow to monitor and control OT network easily and totally passivel

C3i Hub

C3i Hub

India flag

Industrial Control System Security

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety. From analysing security vulnerabilities and developing tools to address them at various levels of system

AHAD

AHAD

United Arab Emirates flag

Compliance Consulting

AHAD provides cybersecurity, digital transformation, and risk management services and solutions. AHAD was founded to provide cybersecurity solutions to Government, Fortune 500, And Start-Up Companies

Deepinfo

Deepinfo

France flag

Security Operations

Deepinfo is a Continuous Threat Exposure Management Platform. Continuously detect, analyze, and mitigate threats across your digital landscape. Stay ahead with real-time insights, 24/7 monitoring, and

Harmonic Security

Harmonic Security

United States flag

Security Operations

Harmonic Security helps companies to adopt Generative AI without risking the security and privacy of their data. Harmonic Security gives security teams the tools to protect sensitive data without the

C3.ai

C3.ai

United States flag

Security Operations

C3.ai is a leading enterprise AI software provider for accelerating digital transformation. C3.ai delivers a comprehensive and proven set of capabilities for rapidly developing, deploying, and operati

Action Fraud

Action Fraud

United Kingdom flag

Security Operations

Action Fraud is the UK’s national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced cyber crime. We provide a central point o

Worldline

Worldline

France flag

Industrial Control System Security

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready). We combine a rich set of functional

BLOCX

BLOCX

United States flag

Threat Intelligence Platforms

BLOCX is designed to address the ever-growing challenges of managing and securing digital devices, from personal computers to corporate networks. BLOCX is a cutting-edge digital device management and

Appsian Security

Appsian Security

United States flag

Data Loss Prevention

Appsian provides powerful solutions that help organizations take control of their business critical data and financial transactions. Our unique approach that combines data security with controls for

BeamSec

BeamSec

United Kingdom flag

Security Awareness Training

BeamSec is a cybersecurity solutions provider committed to addressing the human element of risk against the evolving landscape of email-based cyber threats. Our holistic approach to securing inbound a

Cisilion

Cisilion

United Kingdom flag

Cloud Security

Cisilion's mission is simple – to transform and connect business with next-generation IT infrastructure. Our expertise includes enterprise networking, security, data centre & cloud, managed services a

Protect AI

Protect AI

United States flag

Security Operations

Protect AI is a cybersecurity company focused on AI & ML systems. Through the delivery of innovative security products and thought leadership in MLSecOps, we help our customers build a safer AI powere

Bit Sentinel

Bit Sentinel

RO flag

Compliance Consulting

Bit Sentinel is an information security company. We help companies like yours discover, prioritize, and effectively remediate potential cybersecurity risks. From penetration testing to incident respo

BreakPoint Labs

BreakPoint Labs

United States flag

Digital Forensics and Incident Response

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations. Powered by highly-motivated, experienced cybersecurity professional

Cybersecurity Tech Accord

Cybersecurity Tech Accord

UN flag

Security Operations

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies committed to protecting their customers and users and helping them defend again

Amiseq

Amiseq

United States flag

Compliance Consulting

Amiseq – Your Tech Partner delivers transformational IT Consulting Services enabling customers achieve a competitive edge. At Amiseq, we believe in specialized services enabling our clients to create

AUCyber

AUCyber

Australia flag

Cloud Security

AUCyber is a leading provider of managed cyber security solutions and consultancy services, specialising in supporting Australian organisations and Government agencies with the latest security advice,

X-Ways Software Technology

X-Ways Software Technology

Germany flag

Digital Forensics and Incident Response

X-Ways is a leading developer and supplier of computer forensics software outside of the US. Our software is used for computer forensics, electronic discovery, data recovery, low-level data processing

certSIGN

certSIGN

RO flag

Data Loss Prevention

certSIGN develop innovative software for information security and information systems protection. We help protect electronic information, from contracts and online transactions to information stored

Australian Information Security Association (AISA)

Australian Information Security

Australia flag

Security Awareness Training

As a not-for-profit organisation and charity, the Australian Information Security Association (AISA) champions the development of a robust information security sector by building professional capacity

Cenobe Cyber Security

Cenobe Cyber Security

GR flag

Governance Risk and Compliance Platforms

Cenobe provides customized solutions to keep you ahead of potential threats. Our suite of services, including penetration testing, vulnerability assessment, compliance audit, and red teaming, ensures

Fortaegis Technologies

Fortaegis Technologies

Netherlands flag

Security Operations

Fortaegis is on a mission to secure humankind’s ability to operate. We are introducing a paradigm shift in the semiconductor industry with our 5nm Secure Processing Unit (SPU), designed to revolutioni

ABPGroup

ABPGroup

Singapore flag

Security Operations

ABPGroup is Asia’s leading cybersecurity technology provider focusing on providing best-of-breed solutions that address today’s pressing challenges. Founded in 2014 with its headquarter in Singapore,

CRI4DATA

CRI4DATA

France flag

Compliance Consulting

CRI4DATA's mission is to help organizations build their resilience to cyber risk. Our experts provide advice on holistic cyber risk assessment and the management of its possible transfer to insurers.

Feitian Technologies

Feitian Technologies

China flag

Security Operations

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises. Its full product portfolios and solut

Kennedys

Kennedys

United Kingdom flag

Security Operations

Kennedys is a global law firm with expertise in litigation/dispute resolution and advisory services, particularly in the insurance/reinsurance and liability sectors, including cyber risk. Our global

European Cyber Security Conference

European Cyber Security

Belgium flag

Security Operations

The European Cyber Security Conference organised by Forum Europe will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for

CESAR

CESAR

Brazil flag

Security Operations

CESAR is one of the premier R+D and innovation centers in Brazil. We have a multidisciplinary team of more than 1,100 associates who are highly educated and skilled in advanced technologies such as bl

Assura

Assura

United States flag

Compliance Consulting

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors. Our unique capabilitie

Meta 1st

Meta 1st

United Kingdom flag

Security Awareness Training

Meta 1st are a progressive SAAS enterprise, dedicated to harnessing the power of AI to address the most critical vulnerabilities in the world of cybersecurity: the Human Layer. Analyse 1stAn AI-drive

Bionic

Bionic

United States flag

Governance Risk and Compliance Platforms

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently. Bionic Streamlines Security ReviewsWith

Austrian Institute of Technology (AIT)

Austrian Institute of

Austria flag

Security Awareness Training

AIT is Austria's largest research and technology organisation and a specialist in key infrastructure issues of the future including data science and cybersecurity. The AIT Cyber Range CaSTLE (Cyber S

Hodgson Russ

Hodgson Russ

United States flag

Security Operations

Hodgson Russ is a US law firm providing business-focused legal counsel to clients in the USA and Canada. Practice areas include Privacy, Data Breach & Cybersecurity. Through sophisticated cyber-prote

World Informatix Cyber Security (WICS)

World Informatix Cyber

United States flag

Compliance Consulting

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute

United States flag

Security Operations

The California Cybersecurity Institute (CCI) is a multi-agency effort to protect California through enhanced cybercrime forensics and statewide tactical response training. Our partners are the Califor

360 Advanced

360 Advanced

United States flag

Governance Risk and Compliance Platforms

360 Advanced is a relationship-focused cybersecurity and compliance firm offering integrated compliance solutions customized to meet your business’ needs. We work with organizations that are seeking t

Blackmere Consulting

Blackmere Consulting

United States flag

Security Operations

Blackmere Consulting is a Nationwide Technical and Executive Recruiting firm dedicated to Cyber Security and Information Technology. From Fortune 100 companies to emerging growth organizations, our fo

Attivo Networks

Attivo Networks

United States flag

Threat Intelligence Platforms

Attivo Networks is an award winning provider of deception for in-network threat detection, attack forensic analysis, and continuous threat response. Stop attackers in their tracks with the real-time

DeepKeep

DeepKeep

Israel flag

Security Operations

DeepKeep's AI security safeguards machine learning pipelines, promoting secure, unbiased, error-free, explainable and trustworthy AI solutions. This includes vision data models, LLM and tabular model

Accertify

Accertify

United States flag

Security Operations

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions. Our software-as-a-service platform was designed from the ground up to be scalable, simple, e

ABB

ABB

Switzerland flag

Industrial Control System Security

ABB is a pioneering technology leader in industrial digitalization. Services include cyber security for industrial control systems IoT. ABB works closely with customers to create a defense-in-depth a

Cider Security

Cider Security

Israel flag

Security Operations

It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering. After spending our entire careers in the security trenches, we est

Crossword Cybersecurity

Crossword Cybersecurity

United Kingdom flag

Security Operations

Crossword Cybersecurity is a technology commercialisation company focusing exclusively on the cyber security sector. We work with research intensive European university partners to identify promising

Nuke From Orbit

Nuke From Orbit

United Kingdom flag

Security Operations

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen. We make this a reality for our users through networked security, data integrity and community bu

Future of Cyber Security Europe

Future of Cyber

United Kingdom flag

Security Operations

Future of Cyber Security Europe is a European wide event examining the latest cyber security strategies and technologies. The conference and exhibition is aimed at board level executives and senior I

Barracuda

Barracuda

United States flag

Managed Security Service Providers

Barracuda provides a comprehensive cybersecurity platform to protect organizations from all major attack vectors that are present in today’s complex threats. Block advanced threats with Barracuda’s c

CyberNut

CyberNut

United States flag

Security Awareness Training

CyberNut are a security awareness training solution built exclusively for schools. CyberNut's automated campaigns train your school's faculty, staff, & students to recognize and report phishing email

Buchanan & Edwards

Buchanan & Edwards

United States flag

Compliance Consulting

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions. Our innovative solutions help our defense, intelligence and feder

Cribl

Cribl

United States flag

Security Operations

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy. Powered by a data processing engine purpose-built for IT and Security, Cribl’s product suite is a

ExchangeDefender

ExchangeDefender

United States flag

Security Operations

ExchangeDefender provides cybersecurity services that secures your company email and data, and guarantees 24/7 email access. ExchangeDefender has been providing email security, compliance, and busine

Blattner Technologies

Blattner Technologies

United States flag

Compliance Consulting

Blattner Technologies mission is to be the leading provider of predictive transformation services and tools in the Data Analytics, Artificial Intelligence and Machine Learning industry. With our proje

Texplained

Texplained

France flag

Security Operations

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks. Invasive attacks are a major threat to information technology sector. T

Berwick Partners

Berwick Partners

United Kingdom flag

Security Operations

Berwick Partners’ Cyber Security Practice is a leading recruiter of senior management positions in this field; we have an exceptional understanding of the constantly changing Cyber landscape. We are

Gatefy

Gatefy

United States flag

Security Operations

Getfy is a cybersecurity company specialized in artificial intelligence and machine learning. We work to solve challenging issues, especially those involving email security. Improve your company's da

Reed Smith LLP

Reed Smith LLP

United States flag

Security Operations

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

Mobile Mentor

Mobile Mentor

New Zealand flag

Security Operations

Mobile Mentor is an independent provider of enterprise mobility solutions in New Zealand and Australia. Our range of services allow enterprises to take advantage of the opportunities mobile technology

Ashley Page

Ashley Page

United Kingdom flag

Security Operations

Ashley Page has been at the forefront of providing cyber insurance solutions for more than 10 years. Using our experience and expertise, we have developed a unique cyber insurance and risk management

CyberArmor

CyberArmor

Switzerland flag

Industrial Control System Security

Cyber Armor defend everyday IT and OT systems, from government agencies to critical infrastructure, from system integrators to small industries. Our challenge is to provide every single of them the be

ZINAD

ZINAD

United States flag

Security Awareness Training

ZINAD is a leading provider of cutting-edge security awareness and Human Threat Intelligence solutions that empower organizations to build a human firewall against cyber threats. We combine AI-powered

Zigrin Security

Zigrin Security

Poland flag

Penetration Testing

Zigrin Security are cybersecurity experts, who offer comprehensive, hands-on security testing of networks, applications, cloud-based solutions, e-commerce applications, and mobile devices. The list of

ClearSale (CLSA3)

ClearSale (CLSA3)

Brazil flag

Security Operations

Clearsale’s innovative fraud solutions combine advanced technology with a passionate team of seasoned experts that understand every client’s unique needs. ClearSale, with more than two decades of exp

Identifi Global Recruitment

Identifi Global Recruitment

United Kingdom flag

Security Operations

Based at Bletchley Park – the cradle of modern computing – identifi matches business IT, cyber security and digital professionals with roles that suit their knowledge, skills, temperament, and goals.

Aardwolf Security

Aardwolf Security

United Kingdom flag

Penetration Testing

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare. We help UK businesses identify security risks and

Darwinium

Darwinium

United States flag

Security Operations

Darwinium is a Cyberfraud Prevention Platform that provides scalable customer journey protection without complexity. Security and fraud solutions typically risk-assess specific digital interactions r

Conatix

Conatix

United States flag

Security Operations

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity. The Conatix CYberSecurity ANAlytics (CYSANSA)

GoGeekz Inc

GoGeekz Inc

Canada flag

Cloud Security

Elevate your business with GoGeekz, a leading IT consulting firm in Toronto. We offer comprehensive IT services, from cybersecurity to cloud solutions and web development, tailored to meet your specif

Braintrace

Braintrace

United States flag

Managed Security Service Providers

Braintrace is a privately held, boutique, sole source cybersecurity provider.  Braintrace’s services include Managed Detection and Response (MDR), Managed SIEM, SIEM-as-a-Service, SOC-as-a-Service, Ad

Arcserve

Arcserve

United States flag

Backup as a Service

With Arcserve, your business data is in safe hands. Our best-in-class, next-gen solutions ensure your assets are secure—everywhere, anywhere, every time. Defend your data with all-in-one data protecti

Chainguard

Chainguard

United States flag

Governance Risk and Compliance Platforms

Founded by the industry's leading experts on open source software, security and cloud native development, Chainguard are on a mission to make the software supply chain secure by default. Chainguard I

Conference-Service

Conference-Service

Austria flag

Security Operations

Conference-Service.com provides a categorised calendar of conferences and events which includes Information Security & Privacy. Visit the website and select Informatics > Information Security & Priva

Atlantic Council Digital Forensic Research Lab (DFRLab)

Atlantic Council Digital

United States flag

Digital Forensics and Incident Response

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digita

Aspisec

Aspisec

Italy flag

Security Operations

Aspisec is a cybersecurity company specialized in Firmware Security and Critical Infrastructure Protection. Aspisec was born from the union of experts and professionals in the field of security and t

Athreon

Athreon

United States flag

Threat Intelligence Platforms

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions. Our metho

CyberSat Summit

CyberSat Summit

United States flag

Security Operations

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry. Serving two sides of the same conversation coin, CyberSatCo

SecurWeave

SecurWeave

India flag

Threat Intelligence Platforms

SecurWeave addresses the threat of advanced persistent malware. Conceived by industry veterans with decades of experience in building safety and security critical systems, we are committed in building

DeepCyber

DeepCyber

Italy flag

Threat Intelligence Platforms

DeepCyber supports its customers, with an “intelligence-driven” approach, to improve their proactive detection and response "capability" of cyber threats. It is specialized in Advanced Intelligence (s

Aceiss

Aceiss

United States flag

Security Operations

Aceiss empowers access security, providing unprecedented visibility and insights into user access. Aceiss gives your company unprecedented visibility and insights into user access across all your tec

DataVisor

DataVisor

United States flag

Threat Intelligence Platforms

DataVisor provide big data analytics solutions for fraud detection and anti-money laundering. DataVisor’s patent-pending Big Data security analytics engine for fraud detection will analyze your event

Utimaco

Utimaco

Germany flag

Governance Risk and Compliance Platforms

UTIMACO is a global platform provider of trusted Cybersecurity and Compliance solutions and services. UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key managem

BestDefense

BestDefense

United States flag

Governance Risk and Compliance Platforms

BestDefense offers proactive cybersecurity solutions that adapt in real-time to outpace evolving threats and ensure resilient protection for your critical assets. At BestDefense, we are a collective

AuthX

AuthX

United States flag

Security Operations

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations. Our scalable authentication solution grants access to any application on any platform to any end

Blackfoot Cybersecurity

Blackfoot Cybersecurity

United Kingdom flag

Compliance Consulting

At Blackfoot, we work in partnership with you to deliver on-demand cyber security expertise and assurance, keeping you one step ahead of threats & compliant with regulations. Since 2008, we’ve contin

CyberTech Network

CyberTech Network

United States flag

Security Operations

CyberTECH is a global cybersecurity, Internet of Things (IoT) and Smart City network ecosystem providing resources, strategic programs and thought leadership events across the nation. CyberTECH's mis

Aiden Technologies

Aiden Technologies

United States flag

Governance Risk and Compliance Platforms

Aiden simplifies your IT process, giving you peace of mind and security by ensuring your computers get exactly the software they need and nothing else. Our Mission is to automate compliance and elimin

ZARIOT

ZARIOT

Ireland flag

Industrial Control System Security

Zariot's mission is to restore order to what is becoming connected chaos in IoT by bringing unrivalled security, control and quality of service. Implementing IoT solutions in an existing system can b

Jeffer Mangels Butler & Mitchell LLP (JMBM)

Jeffer Mangels Butler

United States flag

Security Operations

JMBM is a full service law firm providing counseling and litigation services in a wide range of areas including cyber security. JMBM’s Cybersecurity and Privacy Group is known both for legal expertis

Covenant Technologies

Covenant Technologies

United States flag

Security Operations

Make Covenant Technologies the only choice for your IT and cybersecurity recruitment needs. We have the experts, the accountability, and the commitment to deliver quality candidates at the forefront o

A&O Shearman

A&O Shearman

United Kingdom flag

Governance Risk and Compliance Platforms

A&O Shearman was formed in 2024 via the merger of two historic firms, Allen & Overy and Shearman & Sterling. We’re a law firm at the forefront of the forces changing the current of global business: e

Banshie

Banshie

Denmark flag

Compliance Consulting

Banshie is an independent cyber security company with a small team of recognized specialist that are among the best in their field. Our team has experience in building network monitoring solutions, a

BalkanID

BalkanID

United States flag

Security Operations

BalkanID is an Identity governance solution that leverages data science to provide visibility into your SaaS & public cloud entitlement sprawl, all while automating your access review process. Our sol

CyberNet Albania

CyberNet Albania

AL flag

Backup as a Service

Cybernet Albania has been providing IT support and services to small businesses since 2016. We strive to eliminate your IT issues before they cause downtime and impact your operations. We let you foc

Aztek

Aztek

United Kingdom flag

Compliance Consulting

Aztek is one of the UK’s leading Managed Service Providers, providing customer-focused IT, Communication and Cyber Security solutions to help transform and grow your business. Our extensive range of

Xoriant

Xoriant

United States flag

Cloud Security

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create technology products, as well as for enterprises that use those products

Cipher Tooth

Cipher Tooth

United States flag

Data Loss Prevention

CipherTooth’s unique methodology allows it to detect Man in the Middle (MItM) attacks in real time. We keep all the good stuff and get rid of the weaknesses in HTTPS. CipherTooth can even run over the

BIND 4.0

BIND 4.0

Spain flag

Security Operations

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields. It’s a public-private initiative that

OpenOrigins

OpenOrigins

United Kingdom flag

Security Operations

OpenOrigins was founded with the mission to create a global trust infrastructure for all organizations and individuals that need real, human, and provable content to function. Deepfakes and Fabricate

EBRAND Services

EBRAND Services

LU flag

Brand Protection

EBRAND, the European experts for brand protection on the Internet, offer a full set of dedicated services: domain name counseling and management, cybermonitoring, fighting counterfeiting offences and

Vitrociset

Vitrociset

Italy flag

Security Operations

Vitrociset design and manage complex systems for defence, homeland security, space and transport and infrastructure.  Activities include secure communications and cybersecurity. To ensure maximum sec

Zeroport

Zeroport

Israel flag

Security Operations

Zeroport is the first non-IP secure remote access solution provider. Using a patented physical bridge deployed at the gateway of an organization’s network, Zeroport enables only human interactions in

Realsec

Realsec

Spain flag

Data Loss Prevention

RealSec is an international company and is a developer of encryption and digital signature systems and Blockchain for the Banking and Methods of Payment sectors, Government and Defense and Multisector

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence

Canada flag

Security Operations

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection. CSIS works

Berezha Security Group (BSG)

Berezha Security Group

UA flag

Penetration Testing

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing. Application Security Assessment aims to find vulnerabilities that malicious actors

App-Ray

App-Ray

Austria flag

Security Operations

App-Ray is the leading provider of automated Android application security scanning. App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches

Deutsche Gesellschaft für Cybersicherheit (DGC)

Deutsche Gesellschaft für

Germany flag

Compliance Consulting

As a leading provider of cyber security, DGC supports companies in taking advantage of the opportunities offered by the digital transformation – and in minimizing the associated risks. With our holis

Deeper Network

Deeper Network

United States flag

Data Loss Prevention

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet. Deeper Network Inc. was founded in 2019 with the vision of leverag

Cigniti Technologies

Cigniti Technologies

India flag

Penetration Testing

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing. Cigniti is the world’s first IST Services Company to be appraised at CMMI-SVC v1.3, Matu

Zemana

Zemana

Turkey flag

Threat Intelligence Platforms

Zemana was established in 2007 to provide the world with innovative cyber-security solutions. It's our job to deal with complex malicious software and other cyber threats by producing simple solution

Copper Horse Solutions

Copper Horse Solutions

United Kingdom flag

Industrial Control System Security

Copper Horse specialises in mobile and IoT security, engineering solutions throughout the product lifecycle from requirements to product security investigations. We offer security training and have a

CQS (Certified Quality Systems)

CQS (Certified Quality

United Kingdom flag

Security Operations

CQS (Certified Quality Systems) Ltd is an organisation specialising in ISO assessment and certification, including ISO 27001, along with other management system standards. Our team of vastly experien

Verichains

Verichains

VN flag

Security Operations

Verichains Lab is a pioneer and leading APAC blockchain security firm with extensive expertise in the areas of security, cryptography and core blockchain technology. We offer trusted and secure block

Police CyberAlarm

Police CyberAlarm

United Kingdom flag

Security Operations

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning. Police CyberAlarm acts a

at-yet (@-yet)

at-yet (@-yet)

Germany flag

Compliance Consulting

at-yet (@-yet) are an interdisciplinary team of experts: every one of us is at the top of their field. We are all about achieving results, whatever the situation – an acute incident, risk minimisation

Kralos

Kralos

Germany flag

Data Loss Prevention

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions. As an innovative company, it is natural for us to think "out of the bo

TrueBees

TrueBees

Italy flag

Security Operations

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web. TrueBees was born in 2022 when U-Hopper, a deep-te

Cowbell Cyber

Cowbell Cyber

United States flag

Security Operations

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform. In today’s economy, cyber intrusion and loss is a

Zyxel Networks

Zyxel Networks

United Kingdom flag

Managed Security Service Providers

Zyxel Networks is a leading provider of secure, AI-powered networking solutions for small to medium businesses (SMBs) and the enterprise edge. We deliver seamless network connectivity and flexible sol

Bleam Cyber Security

Bleam Cyber Security

United Kingdom flag

Compliance Consulting

Since our inception, we have helped organisations spanning multiple industries including Financial Services, Health Care, Manufacturing, Construction, Technology & more, to protect their brand and rep

Boltonshield

Boltonshield

Switzerland flag

Governance Risk and Compliance Platforms

Boltonshield has an international outlook, seeking to help companies and organizations protect their assets and empower them to grow securely no matter where they are based around the globe. Boltonsh

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center

Germany flag

Security Operations

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security. We are

First Point Group (FPG)

First Point Group

United Kingdom flag

Security Operations

First Point Group provide a global technological recruitment service worldwide. Within that we have a specialist team of Cyber Security recruiters. Their expertise and experience in the cyber-security

Hexnode MDM

Hexnode MDM

United States flag

Security Operations

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content. We deliver a simple, easy-to-configure Unified End Poin

Threat Con

Threat Con

NP flag

Security Operations

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences. This community event is managed by Threat

Binary Security AS

Binary Security AS

Norway flag

Penetration Testing

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews. We specialize in finding bugs and imp

FoxGuard

FoxGuard

United States flag

Industrial Control System Security

FoxGuard develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors. FoxGuard provides a variety of services tha

WYBOT Cybersecurity

WYBOT Cybersecurity

France flag

Security Operations

WYBOT provides a solution that monitors the security of your network and information systems in real time. The system triggers alerts by SMS, e-mail and notification if any threats are detected. WYBO

Zilla Security

Zilla Security

United States flag

Governance Risk and Compliance Platforms

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation. Zilla is a SaaS platform for a

HancomWITH

HancomWITH

KO flag

Data Loss Prevention

Hancomwith is an information security company. We provide optimized blockchain solutions in various areas. In particular, through the expansion of businesses in blockchain and next-generation authenti

GlobalPlatform

GlobalPlatform

United States flag

Industrial Control System Security

GlobalPlatform is a non-profit industry association driven by approximately 90 member companies. Members share a common goal to develop GlobalPlatform’s specifications, which are today highly regarded

Avatu

Avatu

United Kingdom flag

Compliance Consulting

Avatu has more than 20 years experience advising and supporting UK organisations which are dealing with digital challenges. We started in digital forensics, but as the demand grew, our divisions have

Barquin Solutions

Barquin Solutions

United States flag

Compliance Consulting

Barquin Solutions is a full-service information technology consulting firm focused on supporting U.S. federal government agencies and their partners. Barquin Solutions provides the experience, person

Tier1Asset (T1A)

Tier1Asset (T1A)

Denmark flag

Security Operations

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment. When obsolete or

Glocomms

Glocomms

United Kingdom flag

Security Operations

Glocomms is a leading specialist recruitment agency for the tech sector, providing permanent, contract, and multi-hire recruitment from our global hubs all over the world. Extraordinary technological

Aigner Business Solutions

Aigner Business Solutions

Germany flag

Governance Risk and Compliance Platforms

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed. More than 20 years of experience have teached us the importance of data protection and IT secu

Compumatica

Compumatica

Netherlands flag

Industrial Control System Security

Compumatica secure networks is a leading European ICT security manufacturer for cybersecurity and encryption products. Solutions include network security, SCADA/ICS security, Mobile/BYOD and email enc

Diversified Search Group - Alta Associates

Diversified Search Group

United States flag

Security Operations

Diversified Search Group is an industry leader in recruiting diverse, inclusive and transformational leadership for clients. Deliberately different in our approach, the firm comprises a combination of

A&O IT Group

A&O IT Group

United Kingdom flag

Compliance Consulting

A&O IT Group provide IT support and services including  IT Managed Services, IT Project Services, IT Engineer Services and Cyber Security. We offer tried and tested solutions across the whole range o

astarios

astarios

Switzerland flag

Security Operations

astarios is a Swiss-based organization with development offices in Ukraine. We have over 20 years of experience in providing near-shore software development services and tech talent to companies all o

AUREA Technology

AUREA Technology

France flag

Data Loss Prevention

AUREA Technology provides the “best in class” Single Photon Counting Module and also the first “all-in-one” Time Correlated Single Photon Counting TCSPC Module. AUREA Technology works closely with its

Thomsen Trampedach

Thomsen Trampedach

Switzerland flag

Brand Protection

Thomsen Trampedach offers a tailored-made brand protection solution to each customer. Based on a wide initial investigation, we narrow down the monitoring and enforcement verticals to the main painpoi

BARQ Systems

BARQ Systems

Saudi Arabia flag

Compliance Consulting

BARQ Systems is a leading Information Technology services provider working with over 1000 businesses and governments across the MEA Region. Over the years, we have gained a reputation as a visionary

AgileBlue (Agile1)

AgileBlue (Agile1)

United States flag

Managed Security Service Providers

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response for cloud, digital infrastructures and applicat

Cube 5

Cube 5

Germany flag

Security Operations

The Cube 5 incubator, located at the Horst Görtz Institute for IT Security (HGI), supports IT security startups and people interested in starting a business in IT security. Supported by the German Fe

ABPCyber

ABPCyber

Singapore flag

Compliance Consulting

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization. ABPCyber is a

Nuvias Group

Nuvias Group

United Kingdom flag

Cloud Security

Nuvias Group is a specialist value-addedd IT distribution company offering a service-led and solution-rich proposition ready for the new world of technology supply. Nuvias was born from cyber securit

Internet Watch Foundation (IWF)

Internet Watch Foundation

United Kingdom flag

Security Operations

Protecting children is at the heart of everything we do. For over 28 years, since the early days of the internet, our job has been to help child victims of sexual abuse by hunting down and removing an

Cura Technology

Cura Technology

United Kingdom flag

Backup as a Service

At Cura Technology, we’re not just an IT managed service provider and value-added reseller. We are your technology partner, committed to delivering the best solutions for your business. Boost Your Cy

Adeptis Group

Adeptis Group

United Kingdom flag

Security Operations

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats. We offer an end-to-end solution for our cli

Zentek Digital Investigations

Zentek Digital Investigations

United Kingdom flag

Digital Forensics and Incident Response

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004. Our team consists of experts in the fields of computer forensics, mo

WhizHack Technologies

WhizHack Technologies

India flag

Digital Forensics and Incident Response

WhizHack's mission is to not only create a pipeline of cyber security products but also to empower people to sustainable innovation in securing digital assets of tomorrow. WhizHack is a product engin

Numalis

Numalis

France flag

Security Operations

Numalis empower the industry with international standards, rigorous methods, and disruptive solutions to deliver reliable AI systems that everyone can trust. Numalis helps industries to confidently a

Approov

Approov

United Kingdom flag

Threat Intelligence Platforms

Approov provides a comprehensive runtime security solution for mobile apps and their APIs, unified across iOS and Android. Approov Mobile App Protection verifies your app's authenticity and runtime s

CI-ISAC Australia

CI-ISAC Australia

Australia flag

Security Operations

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors. The primary object

South West Cyber Resilience Centre (SWCRC)

South West Cyber

United Kingdom flag

Governance Risk and Compliance Platforms

The South West Cyber Resilience Centre (SWCRC) is led by serving police officers, as part of a not-for-profit partnership with business and academia. Funded by the Home Office, the centre aims to hel

GISEC Global

GISEC Global

United Arab Emirates flag

Security Operations

GISEC Global provides vendors and companies from around the world with access to lucrative opportunity to capitalize on what's set to become one of the world's booming markets. GISEC Global brings to

CIO

CIO

United States flag

Security Operations

CIO provides technology and business leaders with insight and analysis on information technology trends CIO attracts the highest concentration of enterprise CIOs and business technology executives wi

Australian Cyber Collaboration Centre (Aus3C)

Australian Cyber Collaboration

Australia flag

Security Operations

The Australian Cyber Collaboration Centre (Aus3C) is committed to building cyber capacity and securing Australia's digital landscape. We envision a future where cyber resilience is accessible, afforda

CyberSecAsia

CyberSecAsia

PH flag

Security Operations

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia. CyberSecAsia is a distinguished platform tailored for security professionals a

Phosphorus Cybersecurity

Phosphorus Cybersecurity

United States flag

Industrial Control System Security

Connected Things have already far exceeeded the number of PC's and Servers combined globally. New techniques and technology are necessary to secure them. Phosphorus has fully automated remediation of

AppTec

AppTec

Switzerland flag

Security Operations

AppTec is a leading software vendor in the field of Unified Endpoint Management and Mobile Security. More than 3,800 companies and organizations utilize the APPTEC360 EMM platform to meet the challen

Feroot Security

Feroot Security

Canada flag

Threat Intelligence Platforms

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface. F

Business Hive Vilnius (BHV)

Business Hive Vilnius

LT flag

Security Operations

Business Hive Vilnius (BHV) is one of the oldest startup incubator and technology hubs in the Baltics. Primarily focused on hardware, security, blockchain, AI, fintech and enterprise software startups

Xopero Software

Xopero Software

Poland flag

Backup as a Service

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data. We are one of Europe’s leading providers of advanced backup solutions. Our of

Europol - European Cybercrime Centre (EC3)

Europol - European

Netherlands flag

Security Operations

The European Cybercrime Centre (EC3) was set up by Europol to strengthen the law enforcement response to cybercrime in the EU and thus to help protect European citizens, businesses and governments fro

Cyberint

Cyberint

Israel flag

Managed Security Service Providers

Powered by a unique combination of a SaaS platform and a world-class expert team, Cyberint, the Impactful Intelligence company, fuses open-deep-and darkweb Threat Intelligence with Attack Surface Mana

Appurity

Appurity

United Kingdom flag

Security Operations

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals – from legal to finance, hospitality to the NHS. Mobile security is increasingly essen

Purism

Purism

United States flag

Security Operations

We believe you should not be monitored, nor recorded, without your consent. We believe you should not surrender your freedom and your information to corporations for their profit. Here at Purism, we w

Astra Cybertech

Astra Cybertech

India flag

Compliance Consulting

At Astra Cybertech, we're more than just cybersecurity experts - we're your partners in safeguarding your digital assets. With a blend of security expertise and creative problem-solving, we're committ

Iceberg

Iceberg

United Kingdom flag

Security Operations

At Iceberg, we connect you with elite Cybersecurity and eDiscovery professionals faster than anyone else. Whether you’re a tech startup or a global enterprise, we help you hire and retain experts who

Cysurance

Cysurance

United States flag

Governance Risk and Compliance Platforms

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions. Cysurance-certified partners meet the most stringent requirements demanded by underwr

CSA Events

CSA Events

United Kingdom flag

Security Operations

The Cloud Security Alliance also conducts several CSA Summits each year. These are typically one day plenary events conducted in cooperation with CSA chapters, as well as being co-located with other p

Cybersecurity Association of Maryland (CAMI)

Cybersecurity Association of

United States flag

Security Operations

The Cybersecurity Association of Maryland, Inc. (CAMI) is a statewide, 501(c)(6) nonprofit organization formed in 2015 to identify Maryland’s cybersecurity product and service companies and facilitate

Western Balkans Cyber Capacity Centre (WB3C)

Western Balkans Cyber

ME flag

Security Operations

WB3C is a regional programme founded by France, Slovenia and Montenegro with the mission of building a secure and connected Western Balkans region through enhancing its cyber capabilities and resilien

12Port

12Port

United States flag

Security Operations

At 12Port, we believe security shouldn’t be complicated or out of reach for any business. Our goal is to provide enterprise-class security technology that is easy to deploy, scalable, and accessible f

Council of Europe Convention on Cybercrime

Council of Europe

France flag

Security Operations

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime and its Protocol on Xenophobia and Racism, the Cybercrime Convention Commi

Aite-Novarica Group

Aite-Novarica Group

United States flag

Compliance Consulting

Aite-Novarica Group is transforming the financial services and insurance industry by delivering unique intelligence, reliable insights, and unparalleled expert access, enabling smarter decisions and s

Charities Security Forum (CSF)

Charities Security Forum

United Kingdom flag

Security Operations

The Charities Security Forum is the premier membership group for information security people working for charities and not-for-profits in the UK, addressing the information security challenges faced b

AArete

AArete

United States flag

Compliance Consulting

AArete is a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and advisory services. Digital & TechnologyWe combine modern

BlackSignal Technologies

BlackSignal Technologies

United States flag

Security Operations

BlackSignal Technologies provides cybersecurity, digital signal processing and electronic warfare products to help DOD and IC agency customers counter near-peer threats and other national security cha

Thomas Miller Specialty

Thomas Miller Specialty

United Kingdom flag

Security Operations

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance. Cyber Risk - On behalf of Lloyd’s Underwriters, Thomas Miller

Bessemer Venture Partners (BVP)

Bessemer Venture Partners

United States flag

Security Operations

Bessemer Venture Partners was born from innovations in steel that literally forged modern building and manufacturing. Today, our team of investors works with people who want to create revolutions of t

Australian Signals Directorate (ASD)

Australian Signals Directorate

Australia flag

Security Operations

The Australian Signals Directorate (ASD, formerly DSD) is an intelligence agency in the Australian Government Department of Defence. ASDs role is to:◾collect and analyse foreign signals intelligence,

CybernetIQ

CybernetIQ

Canada flag

Security Operations

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one  umbrella and providing organizations faster, better and more accurate cybersecurity.

CS Group

CS Group

France flag

Compliance Consulting

CS Group offers a complete range of high security solutions and products from consultancy to security maintenance and from secure infrastructure design to security governance. CS supports its clients

Anatomy IT

Anatomy IT

United States flag

Governance Risk and Compliance Platforms

Anatomy IT empowers healthcare providers to deliver exceptional patient care with cutting-edge technology and cybersecurity solutions. Our expertly curated Security Suite is designed to secure, prote

Cybersecurity Coalition

Cybersecurity Coalition

United States flag

Security Operations

The mission of the Cybersecurity Coalition is to bring together leading companies to help policymakers develop consensus-driven policy solutions to achieve improvements in cybersecurity. Guided by it

Careerjet

Careerjet

United Kingdom flag

Security Operations

Careerjet is a leading online job search engine with a large presence worldwide, sourcing millions of job ads from thousands of websites from all over the world in areas including Cybersecurity. With

Experis

Experis

Sweden flag

Security Operations

Experis provide IT resourcing, project solutions and managed services. We enable organizations to cultivate individuals and teams prepared for the digital age. Experis is a global leader in IT profes

Cambray Solutions

Cambray Solutions

United States flag

Security Operations

Cambray Solutions specializes in locating and securing technical professionals, managers, and executives. Cambray Solutions technology specialty division is a national IT staffing organization, opera

Brighterion

Brighterion

United States flag

Security Operations

Brighterion solutions stop payment and acquirer fraud, reduce credit risk and delinquency, fight financial crime, prevent healthcare fraud, waste and abuse, and more. Brighterion deliver a leading ar

AppRiver

AppRiver

United States flag

Security Operations

AppRiver is a global provider of cloud-based email and web security solutions that protect businesses worldwide from today's ever-changing online threats. We offer spam and virus filtering, web protec

Varen Technologies

Varen Technologies

United States flag

Compliance Consulting

Varen Technologies is an innovative consulting partner that is trusted by its clients and employees to deliver intelligent insights and respond quickly to the ever-evolving needs with highly respected

CertX

CertX

Switzerland flag

Security Operations

CertX is a Swiss functional safety, cybersecurity and artificial intelligence certification body. We provide product, process and company certifications, personal trainings and certification. Experts

ClearDATA

ClearDATA

United States flag

Cloud Security

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise. Why ClearDATA?- The only healthcare

Zyber 365 Group

Zyber 365 Group

United Kingdom flag

Data Loss Prevention

Zyber 365 are providing a robust, decentralized, and cyber-secured operating system which adheres to the fundamental principles of environmental sustainability. We have designed our solutions to enab

Visa

Visa

United States flag

Security Operations

Visa is a global payments technology company that connects consumers, businesses, banks and governments in more than 200 countries and territories worldwide. Our technology and innovation make digita

Defence Logic

Defence Logic

United Kingdom flag

Compliance Consulting

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring. With cybercrime threats now

Guardtime

Guardtime

EE flag

Data Loss Prevention

Guardtime invented Keyless Signature Infrastructure (KSI),  a blockchain stack for generating cryptographic metadata  at scale. The metadata  proves the properties (time, identity, integrity, provenan

Aptiv

Aptiv

Ireland flag

Industrial Control System Security

Aptiv is a global technology company that develops safer, greener and more connected solutions enabling the future of mobility. We believe that the power of new mobility – moving safer, greener and m

Harvey Nash

Harvey Nash

United Kingdom flag

Compliance Consulting

Harvey Nash is a leading global provider of talent and technology solutions. We have a unique network that realises the potential where people and technology meet. It spans 2,800 colleagues across 16

CDW

CDW

United States flag

Cloud Security

CDW is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada. Our broad ar

Cybercrime Support Network (CSN)

Cybercrime Support Network

United States flag

Security Operations

Cybercrime Support Network (Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

Centro de Gestion

BO flag

Security Operations

Mission of CGII is to establish guidelines for the protection of critical information assets of the State and promote awareness in security, to prevent and respond to security incidents.

CybX Security LLC

CybX Security LLC

United States flag

Backup as a Service

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security. Our products exceed the normal standards of computer security, produc

Canadian Centre for Cyber Security (CCCS)

Canadian Centre for

Canada flag

Security Operations

The Cyber Centre is the single unified source of expert advice, guidance, services and support on cyber security for government, critical infrastructure owners and operations, the private sector and t

ISEC7 Group

ISEC7 Group

Germany flag

Security Operations

ISEC7 Group is a global provider of mobile business services and software solutions. The company was one of the first movers in mobilising company and business processes. ISEC7 has numerous renowned

AuthenticID

AuthenticID

United States flag

Security Operations

Our mission at AuthenticID is to combat fraud worldwide and help businesses protect their enterprise and valuable data assets. We provide the identity verification technology to allow anyone to prove

ACDS (Advanced Cyber Defence Systems)

ACDS (Advanced Cyber

United Kingdom flag

Governance Risk and Compliance Platforms

ACDS was founded in the belief that cyber security can be done better. We’re combining emerging technologies and proven methods to bring a new approach to tackling the growing and persistent threat la

IoTeX

IoTeX

United States flag

Industrial Control System Security

Building the connected world. IoTeX is a fast, secure, and decentralized platform that connects real world devices/data to the blockchain. IoTeX combines tamper-proof hardware and tamper-proof softwar

Apcon

Apcon

United States flag

Security Operations

Apcon's mission is to provide valuable network insights that enable security and network professionals to monitor, secure and protect their data in both physical and virtual environments. Maximize Ne

CyberSure

CyberSure

GR flag

Security Operations

CyberSure is a programme of collaborations and exchanges between researchers aimed at developing a framework for creating and managing cyber insurance policy for cyber systems. The purpose of creatin

archTIS

archTIS

Australia flag

Security Operations

archTIS specialises in the design and development of products, solutions and services for secure information sharing and collaboration. Our products and solutions have the ability to apply and enforce

Waterfall Security Solutions

Waterfall Security Solutions

Israel flag

Industrial Control System Security

Waterfall Security Solutions is the global leader in industrial cybersecurity, protecting critical industrial networks since 2007. Our mission is to revolutionize how entire industries protect physic

Atlas VPN

Atlas VPN

UN flag

Data Loss Prevention

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone. Our main driving force is to make digital privacy and security accessible to all

Anthropic

Anthropic

United States flag

Security Operations

Anthropic is a Public Benefit Corporation, whose purpose is the responsible development and maintenance of advanced AI for the long-term benefit of humanity. We Build Safer SystemsWe aim to build fro

Belden

Belden

United States flag

Industrial Control System Security

Belden is a global leader in signal transmission and security solutions for mission-critical applications in enterprise and industrial markets. Belden’s broad portfolio of industrial cyber security p

Zafran

Zafran

United States flag

Security Operations

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools. Zafran is the first solution to consider your existing security tools' configurations to

Celcom

Celcom

MY flag

Brand Protection

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses. Celcom's business solutions include Cyber Guard Device protection an

North East Business Resilience Centre (NEBRC)

North East Business

United Kingdom flag

Governance Risk and Compliance Platforms

The North East Business Resilience Centre (NEBRC) is a non-profit organisation here to support businesses in the North East of England in protecting themselves from cyber crimes and fraud. Establishe

Zeusmark

Zeusmark

United Kingdom flag

Brand Protection

Zeusmark are a digital brand security company. We work with ambitious brands to create a secure and responsible online environment that matters to business. We enable companies to successfully defend

IP Twins

IP Twins

France flag

Brand Protection

IP Twins offer a wide range of services related to domain names and online brand protection. At IP Twins, each dedicated account manager is an intellectual property lawyer and information technology

Council to Secure the Digital Economy (CSDE)

Council to Secure

United States flag

Security Operations

The Council to Secure the Digital Economy brings together companies from across the ICT sector to combat increasingly sophisticated and emerging cyber threats through collaborative actions. The digit

National Cyber Summit (NCS)

National Cyber Summit

United States flag

Security Operations

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat. Held in

Flexxon

Flexxon

Singapore flag

Data Loss Prevention

Flexxon is the industry leader to develop NAND flash storage devices. Our key focus is to innovate memory devices ensuring data security and reliability. The rate of data theft and cyber-attacks has

Cork

Cork

United States flag

Security Operations

Cork is a purpose-built cyber warranty company for managed service providers (MSPs) serving small businesses (SMBs) and the software solutions they manage. Cork was founded on the idea cyber insuranc

8MAN

8MAN

Germany flag

Data Loss Prevention

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments protecting companies against unauthorized access to sensitive data. The 8MAN core functions inclu

4iQ

4iQ

Spain flag

Governance Risk and Compliance Platforms

4iQ powers Cyber Risk Intelligence Centers for defense departments, law enforcement agencies, physical security service providers, managed security service providers and critical infrastructure compan

Maven Technologies

Maven Technologies

United States flag

Security Operations

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting. We manage every aspect of your company’s sensitive e-recycling needs,

BetaDen

BetaDen

United Kingdom flag

Security Operations

BetaDen is Worcestershire's first dedicated tech accelerator for entrepreneurs and scale up businesses. Co-located with one of the UK’s first 5G testbeds, we are situated at the forefront of testing

SCADAhacker

SCADAhacker

United States flag

Industrial Control System Security

SCADAhacker was conceived with the idea of providing relevant, candid, mission-critical information relating to industrial security of Supervisory Control and Data Acquisition (SCADA), Distributed Con

Delta Partners

Delta Partners

Ireland flag

Security Operations

Delta Partners is a venture capital firm investing in Ireland and the United Kingdom with a strong focus on early stage technology companies. We focus on Foundations:We invest at the beginning and pa

Axellio

Axellio

United States flag

Threat Intelligence Platforms

Axellio provides economic, end-to-end cyber security solutions designed for your team, environment, and security objectives, providing packet level visibility across your network. Axellio’s approach

XPO IT Services

XPO IT Services

United Kingdom flag

Security Operations

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services. We recognise the need to not only protect our customers’ data security, but the wider natural

Adzuna

Adzuna

United Kingdom flag

Security Operations

Adzuna is a search engine for job ads used by over 10 million visitors per month that aims to list every job everywhere, including thousands of vacancies in Cybersecurity. Adzuna covers jobs in the U

Anglo African

Anglo African

MU flag

Compliance Consulting

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services. Anglo African can assist

Fuel Recruitment

Fuel Recruitment

United Kingdom flag

Security Operations

Fuel Recruitment is a specialist recruitment company for the IT, Telecoms, Engineering, Consulting and Marketing industries. Fuel Recruitment is a privately owned technical recruitment consultancy. W

Association of Information Security Professionals (AISP)

Association of Information

Singapore flag

Security Operations

The Association of Information Security Professionals (AISP) represents the interests of information security professionals in Singapore. - To promote, develop, support and enhance the integrity, tec

Finnish Accreditation Service (FINAS)

Finnish Accreditation Service

Finland flag

Security Operations

FINAS is the national accreditation body for Finland, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration services.

D.med Software

D.med Software

Germany flag

Industrial Control System Security

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry. Founded in 2015 as a medical device consultancy company, D.med Softwar

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on

United Kingdom flag

Security Operations

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

WISeKey

WISeKey

Switzerland flag

Industrial Control System Security

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT respecting the Human as the Fulcrum of the In

DigitalPlatforms

DigitalPlatforms

Italy flag

Industrial Control System Security

DigitalPlatforms SpA is an Italian group born in 2018 with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to Defence, Public Administration and to the main

Schillings

Schillings

United Kingdom flag

Compliance Consulting

We are the only business in the world to deploy – under one roof – media experts, data protection lawyers, litigators, experts from military intelligence, former investigative journalists, internation

Cequence Security

Cequence Security

United States flag

Threat Intelligence Platforms

Cequence is a pioneer in API security and bot management, making the applications and APIs that organizations depend on AI-ready while protecting them from attacks, business logic abuse, and fraud. T

Cyrebro

Cyrebro

Israel flag

Managed Security Service Providers

CYREBRO (formerly CyberHat) was founded to help companies take cyber protection to new and unprecedented heights. CYREBRO is your online cybersecurity central command managed SOC that integrates all

Beyon Cyber

Beyon Cyber

BH flag

Compliance Consulting

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain. Our cyber defense services are reliable, effective, and ready to be rapidly deployed as turn-key

Cynalytica

Cynalytica

United States flag

Industrial Control System Security

Cynalytica combines a diverse set of industry expertise with decades of applied research and development experience to deliver pioneering cybersecurity and machine analytics technologies that help pro

BA-CSIRT

BA-CSIRT

Argentina flag

Security Operations

BA-CSIRT is a center which is dedicated to assist and raise awareness among citizens and the Government of the City of Buenos Aires in everything related to information security. It offers the communi

Control System Cyber Security Association International (CS2AI)

Control System Cyber

United States flag

Industrial Control System Security

Control System Cyber Security Association International (CS)²AI, pronounced “See-say”, is the premier global not for profit workforce development organization supporting professionals of all levels ch

CETIC

CETIC

Belgium flag

Security Operations

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems. CETIC’s mi

Xcelerate Solutions

Xcelerate Solutions

United States flag

Compliance Consulting

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions delivered through three service areas – Enterprise Security, Digital Transformation, and Strategi

Couno

Couno

United Kingdom flag

Backup as a Service

Couno is a trusted provider of IT support services throughout the UK and Europe. We’ve enjoyed significant growth over the years, which we think is down to our combination of technical know-how and gr

LogMeIn

LogMeIn

United States flag

Security Operations

LogMeIn’s category-defining products unlock the potential of the modern workforce by making it possible for millions of people and businesses around the globe to do their best work simply and securely

CYBERPOL

CYBERPOL

Switzerland flag

Security Operations

CYBERPOL is the leading Public Utility Agency for investigating cyber crimes and cyber attacks by criminals, international adversaries. CYBERPOL is a Swiss Federal approved agency by Royal Decree WL

ReadWrite

ReadWrite

United States flag

Security Operations

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

CyberSG TIG Centre

CyberSG TIG Centre

Singapore flag

Security Awareness Training

The CyberSG Talent, Innovation and Growth (TIG) Collaboration Centre is a collaborative venture between the National University of Singapore (NUS) and the Cyber Security Agency of Singapore (CSA) that

Canonic Security

Canonic Security

Israel flag

Security Operations

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data. Canonic automatically maps business applications’ interconnectivity, unc

Assure IT

Assure IT

Singapore flag

Governance Risk and Compliance Platforms

Assure IT is a Singapore company specialising in technology governance, risk and compliance. Cybersecurity is an important enterprise risk. Assure IT adopts a holistic, end-to-end framework to cybers

Security Current

Security Current

United States flag

Security Operations

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions. Security Current features i

Advenica

Advenica

Sweden flag

Data Loss Prevention

Advenica is a Swedish IT company that develops, manufactures and sells innovative cybersecurity solutions for encryption and secure information exchange.between applications, systems and domains withi

Auxilium Cyber Security

Auxilium Cyber Security

Germany flag

Compliance Consulting

Auxilium Cyber Security is independent information security consultancy company providing cyber security services tailored to meet the evolving needs of organizations worldwide. Consulting, design an

Backslash Security

Backslash Security

Israel flag

Security Operations

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability. This enables them to easily take action and significantly reduce Mean Time to R

Yelbridges

Yelbridges

KE flag

Compliance Consulting

Yelbridges are a cybersecurity company based in Kenya offering services in East Africa and beyond. We offer high quality IT security & risk management services to mitigate business risks in the form o

Zivaro

Zivaro

United States flag

Compliance Consulting

Zivaro provides transformational consulting and technology services to help clients attain real business value from their technology investments. Zivaro is your safeguard against hidden threats conce

BrainStorm

BrainStorm

United States flag

Security Awareness Training

Reinventing security awareness training. BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. No shame, no guilt. It’s a cutting-edge pla

COGITANDA Dataprotect

COGITANDA Dataprotect

Germany flag

Compliance Consulting

COGITANDA are a group of companies focused on dealing with cyber risks, managing them and insuring them. For us, cyber insurance is closely linked to risk prevention and professional claims handling.

Yellow Brand Protection

Yellow Brand Protection

Sweden flag

Brand Protection

Yellow Brand Protection operates 24/7 to protect brands' Intellectual Property (IP) from infringements on all kinds of online distribution channels. Offering the broadest online search capability in

Asavie

Asavie

Ireland flag

Industrial Control System Security

Asavie provide solutions for Enterprise Mobility Management and secure Internet of Things (IoT) Connectivity. Asavie PassBridge is a software defined network as a service platform that manages the co

SecurityLoophole

SecurityLoophole

United States flag

Security Operations

SecurityLoophole is an independent cyber security news platform with global coverage.  8 editors in 6 different countries are working round the clock to inform readers about the latest and most import

Interpol

Interpol

France flag

Security Operations

Interpol is the world’s largest international police organization, with 190 member countries. Our role is to enable police around the world to work together to make the world a safer place. Our high-t

Intelligence-sec

Intelligence-sec

United Kingdom flag

Security Operations

Intelligence-Sec is a fully integrated Conferences and Exhibitions Company managing and producing topical events for the security industry. Our mission is to become the most recognisable and well resp

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

India flag

Security Operations

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices. We provide an end-to

360Logica

360Logica

India flag

Security Operations

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems. - Component & Unit Testing- Core Testing Se

SydeLabs

SydeLabs

United States flag

Security Operations

At SydeLabs, our mission is to ensure the comprehensive security of your AI systems, allowing you to dedicate more time to building robust AI applications, free from concerns about security blind spot

Materna Virtual Solution

Materna Virtual Solution

Germany flag

Security Operations

Materna Virtual Solution security solutions are tailored to meet the requirements of an increasingly digital world and mobile society. We enable user-friendly, secure mobile working environments. The

CyberGuard Technologies

CyberGuard Technologies

United Kingdom flag

Managed Security Service Providers

CyberGuard Technologies provides a suite of fully managed end-to-end security services from its 24/7 UK security operations centre.  Our cyber defences protect against the potential devastation of an

it-sa 365

it-sa 365

Germany flag

Security Operations

it-sa 365 is a digital platform for connecting IT security vendors and experts with those who bear responsibility for IT security in management and technology. it-sa 365 covers the complete range of

Davis Wright Tremaine (DWT)

Davis Wright Tremaine

United States flag

Security Operations

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security. Technology, Privacy & Security Overview:

RCMP National Cybercrime Coordination Unit (NC3)

RCMP National Cybercrime

Canada flag

Security Operations

As set out in the Government of Canada's National Cyber Security Strategy, and in line with the RCMP Cybercrime Strategy, the RCMP has established the National Cybercrime Coordination Unit (NC3). Comp

Astra Security

Astra Security

India flag

Penetration Testing

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI. A comprehensive security solution that takes care of all your cyber security ne

Concorde Technology Group

Concorde Technology Group

United Kingdom flag

Backup as a Service

Concorde Technology Group is one of the UK’s leading IT support and services providers, delivering cost-effective and innovative IT solutions to businesses across the country. We add value and increa

AA Certification (AAC)

AA Certification (AAC)

United Kingdom flag

Security Operations

AA Certification Limited brings together many different assessment and certification skills in order to deliver a professional certification service. We know that achieving ISO Quality Management Sys

Binary Gecko

Binary Gecko

Germany flag

Penetration Testing

Binary Gecko GmbH provides tailor made cybersecurity solutions and services. Ourinternational team is made up of world class, highly technical professionals with a proven track record in the field. We

ComoNExT Innovation Hub

ComoNExT Innovation Hub

Italy flag

Security Operations

Cybersecurity Advisors Network (CyAN)

Cybersecurity Advisors Network

France flag

Security Operations

CyAN is the Cybersecurity and cybercrime Advisors Network : whether you seek support to protect and develop your organisation, or whether you want to contribute to increase cybersecurity and the fight

ABS Group

ABS Group

United States flag

Governance Risk and Compliance Platforms

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations. ABS Group provides a complete

Aricoma

Aricoma

CZ flag

Cloud Security

Aricoma are Architects of Digital. We aim to become a major player in end-to-end IT services and digital transformation in Europe. Aricoma incorporates the companies AEC, Komix, CES EA and Autocont w