Companies similar to OWASP FOUNDATION
Sign up to Download

1-30 of 6,758,136 results

  • wiki.owasp.org
  • 30
  • 2
  • 24
The OWASP Foundation came online on December 1st, 2001 it was established as a not-for-profit charitable organization in the United States on April 21, 2004, to ensure the ongoing availability and support for our work at OWASP. OWASP is an..

Relevance: 22.620018
  • sechow.com
Bricks is brought to you by OWASP, a free and open software security community focusing on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed..

Relevance: 20.262882
  • protergo.id
  • 1
Protergo is the only OWASP partner in South East Asia and selected as Corporate Partner in supporting OWASP in the penetration testing research and development activities...

Relevance: 19.800333
  • beforethebreach.com
  • 1
  • 1
We are proud to be an authorized provider of CIS Controls information security assessment services. Our team can help measure your posture with un-equaled expertise... We are proud to be qualified assessors for regulated environments under HIPAA,..

Relevance: 19.197271
  • primorgroup.com
Primor Group was founded in 2005, we are a veteran-owned full-service, cyber-security, New York firm. We focus on meeting our clients' goals through smart strategies, best practices, and the utilization of some of the best Razor edge technologies in..

Relevance: 16.753004
  • www.security4web.ch
  • 1
This project is a continuation of the bachelor thesis (Master Thesis - Applied Computer Science Albert-Ludwigs-Universität Freiburg im Breisgau - "Development of the Security Framework based on OWASP ESAPI for JSF2.0" by Rakeshkumar Kachhadiya)..

Relevance: 16.683807
  • www.whiterhinolabs.com
  • 1
We have special expertise in vulnerability assessments and security testing. We work with our clients as third party assessors and/or training development staff on secure coding concepts and best practices. We can also act as internal pen testers and..

Relevance: 16.68003
  • www.samuraiwtf.com
OWASP SamuraiWTF is a complete linux desktop for use in application security training. It is free and open-source, distributed both as pre-built VMs and as source code. The source is consisting of a Vagrantfile, static assets, and build scripts...

Relevance: 16.563519
  • purpleridge.ai
  • 2
PurpleRidge Security™ is an automated website security testing service designed for organizations without dedicated security or IT teams, yet require security testing. The service is also used by businesses to verify their websites stay protected.....

Relevance: 16.426743
  • www.paranoihack.com
ParanoiHack is a consulting company dedicated to cybersecurity with a particular focus on application security and penetration testing (OWASP, code review, pentest, red teaming, appsec, blockchain, smart contract, SAST, DAST, security champions,..

Relevance: 16.35898
  • thecipherkey.wordpress.com
The OWASP Top 10 Web Application Security Risks - 2017 was released recently. It characterizes a comprehensive consensus about the most critical security risks to web applications...

Relevance: 16.353586
  • owaspsamm.org
  • 1
OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in..

Relevance: 16.301998
  • s3infosoft.com
We at S3 Infosoft provide customer-centric solutions for resolving Software Product development bottlenecks. We offer Cybersecurity solutions that include assessing Maturity Models as well as VAPT services... With a certified and experienced team of..

Relevance: 16.255358
  • open-security-summit.org
  • 1
The Open Security Summit is focused on the collaboration between, Developers and Application Security. Using the same model as the previous OWASP Summits, this 5-day event will be a high-energy experience, during which attendees get the chance to..

Relevance: 16.085337
  • cyclonedx.org
Strategic direction of the specification is managed by the CycloneDX Core Working Group. CycloneDX is backed by the OWASP Foundation, the global information security community, and Ecma Technical Committee 54 (Software & System Transparency).....

Relevance: 15.804047
  • hub.leviathansecurity.com
  • 1
The MASA framework incorporates the OWASP Mobile Application Security Verification Standard (MASVS) as a foundational guideline for ensuring data security and privacy in mobile applications... The Assessment Hub is your centralized solution for..

Relevance: 15.6455
  • www.luxmiamilisting.com
Bricks is brought to you by OWASP, a free and open software security community focusing on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed..

Relevance: 15.625521
  • www.cyclonedx.org
CycloneDX provides the ability to describe components and their dependency on other components. The dependency graph is capable of representing both direct and transitive relationships. Components that depend on services can be represented in the..

Relevance: 15.453151
  • www.hackmiami.org
  • 1
HackMiami is the premier resource in South Florida for the recruitment of highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of information technology and security. HackMiami is..

Relevance: 15.422716
  • www.practical-devsecops.com
  • 3
  • 2
Our expert Instructors have more than 1000+ hours of teaching experience in various organizations and international conferences like Blackhat, OWASP AppSec, DevSecCon and many more... World class DevSecOps Training and Certifications.Learn devsecops..

Relevance: 15.295139
  • www.dependencytrack.com
  • 1
  • 6
We offer a cost-effective solution to your software bill-of-materials (SBOM) analysis needs that help you reduce your risks quickly by identifying them at built time before they become threats. You will get productive and gain insights into your..

Relevance: 15.2793045
  • www.dependencytrack.com
  • 1
  • 6
We provide Github Actions and interfaces for traditional toolchains, like Jenkins, to create an SBOM for you from your source-code libraries. We also simplify the pushing of your created SBOM to our OWASP® Dependency-Track service for analysis. For..

Relevance: 15.216184
  • www.edrockwell.com
Guiding team towards removing Snowflake servers so environments from QE through PROD are identical... Scan, review and remediate external vulnerabilities as they relate to PCI and OWASP top 10... Maintain and deploy Proto Labs websites and lead PCI..

Relevance: 15.011183
  • securityreporter.app
  • 1
Tip: Use the built-in templates such as OWASP Top 10, PCI-DSS, and SANS guidelines to reduce setup time and costs... Supercharge your pentest reporting with collaboration tools, retest/review flows, templates, a client portal, and more...

Relevance: 14.914933
  • www.toolwar.com
  • 1
Note - On ToolWar website, everything provide only for educational purpose. In case of any misuse we're not responsible. ToolWar provide all the licensed and Open source tools by linking... ToolWar Provides You Information of New Updated, Released..

Relevance: 14.71992
  • www.modsecurity.org
Trustwave is announcing the transfer of ModSecurity custodianship to OWASP effective January 25, 2024... The full Trustwave announcement is available here: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/trustwave-transfers-..

Relevance: 14.596471
  • securetea.org
The OWASP SecureTea Project is an application designed to help secure a person's laptop or computer / server with IoT (Internet Of Things) and notify users (via various communication mechanisms), whenever someone accesses their computer / server...

Relevance: 14.580084
  • www.deccaninfotech.in
  • 1
DIPL was incorporated in 1996 with the HQ in Bengaluru and specialises in Information Security Services and consultancy... With a measured and steady growth, DIPL is proud to be associated with over 2500 companies for Information Security..

Relevance: 14.201219
  • websecurityworkbook.com
  • 1
  • 1
  • 1
This workbook is based on intensive research and evaluated by a master's thesis created by Moritz Hüther at the Technical University of Munich in cooperation with msg Research... It describes common vulnerabilities in developing and operating web-..

Relevance: 14.178812
  • omitas.com
  • 1
  • 3
Omitas are experts in Information Security Management, Custom Enterprise Software Development, Security Audits, Penetration Tests, Cyber Defense... Omitas was created by Enterprise software developers, IT/IS administrators, security professionals to..

Relevance: 14.112792