Search results for:
-
Dec 7th, 2016
Oasis
The OASIS Cyber Threat Intelligence (CTI) TC was chartered to define a set of information representations and protocols to address the need to model, analyze, and share cyber threat intelligence.
-
Nov 18th, 2022
Okta
Okta is the leading independent identity provider. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With more than 7,000
-
Dec 7th, 2016
OpenC2
The Open Command and Control Forum promotes the global development and adoption of the OpenC2 language and reference material.
-
Oct 18th, 2019
OPSWAT
OPSWAT protects critical infrastructure. Our goal is to eliminate malware and zero-day attacks. We believe that every file and every device pose a threat. Threats must be addressed at all locations at
-
Nov 3rd, 2016
Optiv
Optiv is the largest comprehensive pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational ins
-
Jul 29th, 2016
Palo Alto Threat Intelligence
ThreatConnect® and Palo Alto Networks® have established a partnership to deliver validated threat intelligence to Palo Alto Networks next-generation firewalls, enabling security operations (SOC) tea
-
Nov 18th, 2022
Plyara
Plyara is an open source library for parsing Yara Rules.
-
May 21st, 2020
Polarity
If you had a photographic memory, how much faster would you be at your job? Now what if you had a collective memory across all members of your team, organization, or industry, how much better would yo
-
Apr 22nd, 2020
PolySwarm
PolySwarm is a file reputation tool specialized in detecting new and emerging malware. Powered by a crowdsourced network of threat detection engines that are highly specialized, R&D focused and fa
-
Nov 27th, 2019
Proofpoint
Proofpoint, Inc. (NASDAQ: PFPT) is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-base
-
Mar 30th, 2022
Qintel
Qintel solves hard cyber crime problems with innovative data and technology solutions. Qintel products and services range the CrossLink threat intelligence platform, built as a one-stop-shop for inves
-
May 10th, 2019
Qualys
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 12,200 customers and active users in more than 130 countries, including a majo
-
Feb 5th, 2024
Recorded Future
Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing
-
Jan 26th, 2016
Retail Cyber Intelligence Sharing Center (R-CISC)
The Retail Cyber Intelligence Sharing Center (R-CISC) is the cybersecurity community for all retailers and commercial services entities, connecting all aspects of consumer products, goods, and service
-
Aug 12th, 2015
Reversing Labs
ReversingLabs solutions drastically accelerate and broaden organizations’s ability to detect new threats, respond to incidents and gain intelligence on attacks. Large enterprises and security ve
-
Nov 18th, 2022
Robtex
With this Playbook app, you can automatically retrieve various kinds of research on IP addresses, Domain names, and more. Robtex uses various sources to gather public information about IP addresses, d
-
Aug 19th, 2016
RSA NetWitness
ThreatConnect is a software platform that unites your entire security team, your partners, and your industry peers together behind a cohesive, intelligence-driven defense. Working together in ThreatCo
-
Nov 18th, 2022
Screenshot Machine
Screenshot Machine is a free tool that, like its namesake, uses a screenshot API to take screenshots of any online website in a couple of seconds.