Leveraging AI to secure the Defense Industrial Base by helping small businesses with CMMC compliance.
Cyber Attack: The Ultimate Board Game of Strategic Cyber Warfare!
Cyber Attack is a game of attacker vs. defender in the cyber world. It can be played by 2...
Enjoy and benefit from strong cybersecurity of your home network through INHOME zero trust architecture based protection.
Open Privacy Bridge is a privacy threat intelligence platform for everyday web users that want a better understanding of how websites use, share, track and...
Open Zero Knowledge Integration: a zk-SNARK-based proof framework for developing privacy protecting components of a web application.
We have identified a vulnerability affecting over 10,000 applications with which an attacker can potentially steal logins, payment info, modify website content...
You should not trust your commercial VPN. Try GhostPRTCL instead.
Full Loop Privacy - Privacy by Design Integration and Automation
As a power plant operator, sleep soundly, knowing hunnypOT alerts you as soon as anyone touches your OT system, and distracts them before they...
DevOps requires that you shift left, even with PII protection in your application logs.
Next generation hardware security key that features malware detection, contextual multi-factor authentication (CMFA), theft resistance, and user defined...
There are many solutions to resolve issues with passwords, but our forward thinking approach, Password-Less as a Service (PLaaS), provides a password manager...
Helping small offices be HIPAA compliant