Companies similar to ENGAGING VULNERABILITY
Sign up to Download

31-60 of 6,092,779 results

  • immediately-vulnerable.github.io
  • 5
Through this question, we aimed to understand how many packages are immediately vulnerable, i.e. a vulnerability had already been found and published in a direct or indirect dependency at the time of the release. We also analyzed how many of such..

Relevance: 15.241605
  • incertint.com
Our mission is finding smart ways of using technology that will help build a better tomorrow for everyone, everywhere... Vulnerability research, exploit development and advanced cyber intelligence solutions are at the core of what we do at Incert..

Relevance: 15.2331085
  • www.loudmouth.io
  • 1
Loudmouth Security is one of Ottawa's elite cyber security consultancies. We perform vulnerability assessments, penetration testing, red teaming, vulnerability research and cyber security training... Since its establishment in 2016, Loudmouth..

Relevance: 15.222848
  • vaccine-research-institute.fr
  • 22
The VRI is also one of the research infrastructures of (i) the Digital Public Health Graduate Program (DPH) founded in 2018 at the Bordeaux Population Health Research Center and the Bordeaux School of Public Health (ISPED) and (ii) the Graduate..

Relevance: 15.162928
  • cve.icu
CVE.ICU is an innovative research project led by Jerry Gamblin. Aimed at facilitating a deeper understanding of Common Vulnerabilities and Exposures (CVE), this project is an automated system that systematically extracts all CVE-related data from the..

Relevance: 15.098822
  • www.xanthonus.com
I am a cybersecurity researcher located in Seattle. My interests span across multiple computer security topics and I have worked with many different technologies throughout my career. My research interests are in automated program analysis, program..

Relevance: 14.920442
  • www.4mosan.com
4MOSAn Vulnerability Management functions include IPv4 / IPv6 network scanning (IPv6 Capable Security Assessment), vulnerabilities evaluation, centralized risk assessment, It analyzes and examines the latent vulnerabilities and examines network..

Relevance: 14.885114
  • planintegration.com
  • 2
  • 27
Since its inception, the PIRS™ has been applied in research and practice, and employed to evaluate hundreds of neighborhoods in over 19 cities around the world... PIRS™ helps spatially evaluate networks of plans to reduce hazard vulnerability and..

Relevance: 14.84701
  • www.4mosan.com
4MOSAn Vulnerability Management functions include IPv4 / IPv6 network scanning (IPv6 Capable Security Assessment), vulnerabilities evaluation, centralized risk assessment, It analyzes and examines the latent vulnerabilities and examines network..

Relevance: 14.831093
  • www.steeltrade.exchange
  • 2
A vulnerability in the rdpsnddg_process() function in rdesktop could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability is due to an integer-underflow ..... A vulnerability in rdesktop could..

Relevance: 14.73541
  • www.staicu.org
Lightweight program analysis for vulnerability detection: in PLAS@CCS 2019 we study the impact of considering implicit flows in information flow analysis for vulnerability detection, in NDSS2018 we use intra-procedural data flow analysis for..

Relevance: 14.698696
  • www.norgald.com
  • 1
  • 3
Norgald is a cyber security company that works with vulnerability management for critical infrastructure... Elvira is a research-based software security tool. Our software application maps the system architecture of all connected components in a..

Relevance: 14.667676
  • typhooncon.com
  • 4
  • 1
TyphoonCon was founded in 2018 by SSD Secure Disclosure. The event was nearly cancelled due to a typhoon hitting Hong Kong, but took place nonetheless and was extremely successful and ultimately gave us the inspiration of changing the event's name to..

Relevance: 14.630424
  • www.condor-labs.com
Advisory IDRSN-SIP-1660 Vulnerability Information A vulnerability in the Session Initiation Protocol (SIP) of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote at..... Advisory..

Relevance: 14.57869
  • nexus-stack.com
  • 1
  • 1
Don't worry about the generic vulnerability descriptions across the world. We have our own vulnerability mappings...

Relevance: 14.576523
  • brenebrown.com
  • 3
  • 1
The Daring Way™ is an empirically based training and certification program for helping professionals, based on the research of Dr. Brené Brown. The work focuses on courage building, shame resilience, and uncovering the power of vulnerability. The..

Relevance: 14.562529
  • www.totalsecurity.center
Check whether your website, application or server has been reported for any vulnerability or is being exploited by hackers... Check the vulnerability status of your website or server.Check whether your web application has been reported for..

Relevance: 14.52035
  • www.vulnerabilitymarketingboard.com
  • 1
  • 1
The Vulnerability Marketing Board was created to enable security researchers to better market their product and increase consumption and thus prices... Our launch goal is to provide a Computer Security Vulnerability Naming Authority that will allow..

Relevance: 14.436958
  • www.tai-us.com
Founded in 1993, Tridex Associates Inc (TAI) specializes in providing telecommunications and security services to industry and federal government agencies. TAI provides high quality engineering services in a wide degree of telecommunication fields..

Relevance: 14.419929
  • www.hackmiami.org
  • 1
HackMiami is the premier resource in South Florida for the recruitment of highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of information technology and security. HackMiami is..

Relevance: 14.319478
  • www.vicesolutions.in
  • 2
  • 2
VES is a total training solutions provider with a sharp focus on B2B training needs. The learning services offered today are IT, Behavioural & Leadership trainings... Our Vision is to maximize VOTI (Value On Training Investment) for our customers by..

Relevance: 14.319224
  • core-lab.weebly.com
  • 11
  • 1
  • 15
Our research work connects civil/coastal engineering and various science disciplines (e.g., oceanography, hydrology, meteorology, climatology) to better understand the vulnerability of coastal societies, built infrastructure, and fragile ecosystems..

Relevance: 14.288602
  • www.vulnerabilitymap.org
  • 2
  • 1
This product was created by the Vulnerability Mapping and Analysis Platform (VMAP), a system designed to streamline complex geospatial and statistical analysis for social, medical, and environmental vulnerability. VMAP implements current and..

Relevance: 14.288383
  • www.contradictorydesign.co.uk
With a background in critical design, research and theory, our work aims to question perspectives, to create dialogue around often neglected concepts (such as vulnerability, wellbeing, relationships, ethics, inbetweeness, and intangibility) or..

Relevance: 14.269068
  • zeifan.my
NLab Security is an independent security research based in Malaysia specialised in cutting edge research such reverse engineering, vulnerability research, fuzzing, exploit development and Penetration testing and has conduct training related to their..

Relevance: 14.214649
  • secinnova.com
  • 2
  • 1
SecInnova offers customized cyber security solutions to enterprises as cyber Vulnerability Management-as-a-Service(VMaaS). Our VMaaS platform includes dedicated cloud native web portal for businesses to identify and manage security risks.....

Relevance: 14.201234
  • jeroensmits.info
  • 1
  • 2
  • 2
His major research interests are (all forms of) inequality, development, social cohesion, climate vulnerability, database building and the development of knowledge instruments. He published over 100 studies on social issues in low and middle income..

Relevance: 14.166586
  • www.vulmon.com
  • 1
  • 2
Vulmon is a vulnerability search engine with vulnerability intelligence features. Vulmon conducts full text search in its database; therefore, you can search everything related to vulnerabilities. It includes CVE ID, vulnerability types, vendors,..

Relevance: 14.097404
  • www.islandvulnerability.org
  • 1
The information provided on the Island Vulnerability webpages is not intended to be comprehensive. Instead, it is indicative of the vulnerabilities and resiliences which islands experience, how to deal with the challenges, and how to create and..

Relevance: 14.049492
  • www.vulnerableinamerica.org
  • 1
  • 1
  • 1
"Vulnerable" is a local, national and global strategy to minimize vulnerability and maximize thriving. Vulnerability is what we are targeting to minimize. Thriving is what we are targeting to maximize. "via" Strategy and Model, supported by..

Relevance: 14.026003