Companies similar to HACKERS
Sign up to Download

91-120 of 5,856,234 results

  • www.desintl.com
  • 1
Diligent eSecurity helps its clients protect and safeguard their most critical information assets. We are a Small Business Association Small Disadvantaged Business (SDB) & Minority Business Enterprise (MBE) certified company, providing information..

Relevance: 11.922582
  • www.cismptrainingexperts.com
  • 1
BCS CISMP (Certificate in Information Security Management Principles) is a globally recognised and renowned certification provided by BCS. It is a foundation-level qualification that helps professionals attain the required knowledge of information..

Relevance: 11.913073
  • halilutkuyildirim.com
Certified Information Systems Security Professional with Master of Science degree and 10 years of professional work experience among different areas of information security...

Relevance: 11.91221
  • www.isexecutives.com
  • 1
Information Security Executives is a consulting firm that provides leadership in Information Security and Risk Management with a focus in regulated industries. Our typical client is interested in raising the bar when it comes to information security,..

Relevance: 11.901012
  • www.haipesecurity.com
  • 1
HAIPE Security combines proprietary methods for discovering compromises within an environment in an efficient and proactive method... HAIPE Security specializes in Information Security consulting services focused on promoting a healthy information..

Relevance: 11.880623
  • www.scs4ebiz.com
  • 1
  • 1
Sliktec Consultancy Services, Inc. was founded in 2001. We focus on Information Assurance, Security Architecture, and Design & Implementation... Sliktec's vision is to become comprehensive, trusted and advanced partner for cyber security and..

Relevance: 11.879296
  • www.aaatechnologies.co.in
  • 1
  • 1
  • 6
We are an Information Technology and Cyber Security Auditing & Consulting Company offering a platform that enables organizations to identify the issues of corporate governance of the information system in computerized environment and execute security..

Relevance: 11.878132
  • www.cisoadviser.com
  • 1
  • 1
  • 1
A chief information security officer (CISO) is a senior-level executive responsible for overseeing an organization's information security strategy and ensuring that the appropriate measures are in place to protect the confidentiality, integrity, and..

Relevance: 11.874898
  • www.ismbok.org
Information Security Management Body of Knowledge (ISMBoK) aims to compile knowledge scattered around that might be useful for information security management professionals...

Relevance: 11.868302
  • securityweekly.com
  • 9
  • 1
Security Weekly is a security podcast network for information security professionals, by information security professionals. We produce free podcasts!... Security Weekly establishes your category awareness and message through podcast advertising to..

Relevance: 11.866577
  • securepro.pl
  • 1
  • 2
SecurePro is a dynamically growing group of companies specialized in the wide IT security (information security systems, protection of the personal data, protection of confidential business information, protection of classified information,..

Relevance: 11.86137
  • www.kserv-enterprise.com
  • 1
  • 1
KServ Enterprise is an information technology and information security consulting firm offering services worldwide!... Our purpose is to form partnerships with organizations to provide industry leading, information technology infrastructure..

Relevance: 11.858264
  • www.coppermotor.com
  • 1
  • 2
Beijing Lianshan Technology Co., Ltd. was established in 2006 and entered the field of information security in 2010. It is a high-tech enterprise that focuses on independent and controllable information security technology and its applications. The..

Relevance: 11.857253
  • itcrypto.github.io
  • 17
Information-theoretic cryptography aims at achieving security in the presence of computationally unbounded adversaries... The design and implementation of cryptographic protocols and primitives with unconditional security guarantees... The usage of..

Relevance: 11.8571415
  • www.rise.pk
  • 1
  • 2
  • 9
RISE is a special initiative by Riphah International University to impart quality in education, professional training & consultancy in the field of Cyber Security. With a unique construct this institute out shines all the other educational institutes..

Relevance: 11.852451
  • kiteproservices.com
  • 1
  • 1
KITE Professional Services is a specialist information security services company set out to help organisations meet business objectives while not compromising speed and secure delivery of products and services... With experience spanning across..

Relevance: 11.85047
  • security.virginia.edu
  • 8
  • 4
  • 4
The University of Virginia Information Security office (InfoSec) supports the mission of the University by focusing on the continuous enhancement of information policies and security of UVA's diverse and decentralized computing environment. InfoSec..

Relevance: 11.850144
  • cybercic.com
  • 1
  • 1
Sys admin? Been there done that. Network migrations? Yep. Information assurance, IT certification and accreditation, computer security and all of the cybersecurity derivatives? Yep. Communications security, operations security, information security..

Relevance: 11.845259
  • opencert.ca
  • 5
OpenCERT Canada is Canada's first open national CERT (Computer Emergency Response Team) which providing services to Canadians. The goal of OpenCERT Canada is to provide information security based services to aid Canadian based organisations and..

Relevance: 11.842023
  • itcrypto.github.io
  • 17
Information-theoretic cryptography aims at achieving security in the presence of computationally unbounded adversaries... The design and implementation of cryptographic protocols and primitives with unconditional security guarantees... The usage of..

Relevance: 11.84
  • www.ct360ir.com
  • 1
  • 1
CT360 provides solution for building information security frameworks, following compliance with regulatory requirements, including conducting risk surveys, penetration test (PT), ongoing monitoring of organization's information security function (as..

Relevance: 11.83884
  • www.michaelrutt.net
  • 2
 A Chief Information Security Officer is instrumental in coordinating all manner of information security related issues. A vCISO drafts and approves policy, manages subject matter experts, coordinates incident response, develops information security..

Relevance: 11.837608
  • www.cke.io
  • 1
We are an information security firm offering services in information security testing, training and research...

Relevance: 11.832945
  • bligis.com
  • 1
I love information security. I have been working on IT and information security since 2001...

Relevance: 11.832945
  • cyberriskgroup.com
  • 1
The Cyber Risk Group is a global leader in cyber risk assessments, information and cyber security consulting and security program management... We specialize in information security consulting and cyber risk assessments for small and medium sized..

Relevance: 11.8254795
  • www.cmmiconsultantblog.com
The third edition (2022-10) of International Standard ISO 27001 arrived in the last week of October 2022. ISO 27001:2013, that became famous as the Information Security Management System Standard (ISMS), is now re-named ISO 27001:2022 - International..

Relevance: 11.8251505
  • ci-issa.org
  • 9
  • 9
Central Indiana ISSA The Information Systems Security Association (ISSA)® is a not-for-profit, inte... We are a group of seasoned Information Technology Security Professional's located in and around Indianapolis, IN, the Crossroads of America. We..

Relevance: 11.824526
  • bsidesoslo.no
  • 3
BSides Oslo is a independent, community-driven inclusive information security conference. A part of the global Security BSides network, the conference creates a space for members of the information security community to come together and share their..

Relevance: 11.821991
  • unicornconsulting.net
Unicorn Consulting, Incorporated (UCI) offers a wide variety of information security solutions in compliance with FISMA/NIST, ISO 27001, HIPPA, PCI DSS standards. The security of your greatest asset is paramount hence, our expertise in ensuring the..

Relevance: 11.820786
  • www.susanorrconsulting.com
  • 1
  • 1
  • 1
Susan Orr Consulting is a personalized financial services company with vast regulatory, risk management, and security best practice knowledge and expertise... Susan Orr Consulting, LLC. also provides targeted consulting and Virtual Information..

Relevance: 11.816921