|
104 | 104 | sponsor: 4
|
105 | 105 | name: Detectify AB
|
106 | 106 | image: /assets/images/corp-member-logo/detectify.png
|
107 |
| - url: http://detectify.com/ |
| 107 | + url: https://detectify.com/ |
108 | 108 | description: Detectify is a domain monitoring and web application security startup. We automate hacker attacks to help businesses stay on top of emerging threats and secure applications. Today, we collaborate with over 150 handpicked white-hat hackers to continually improve our modern test bed of 1500+ security tests from the cutting edge of security. Go Hack Yourself!
|
109 | 109 | - member: false
|
110 | 110 | sponsor: 4
|
111 | 111 | name: ExtraHop
|
112 | 112 | image: /assets/images/corp-member-logo/extrahop.png
|
113 |
| - url: http://www.extrahop.com |
| 113 | + url: https://www.extrahop.com |
114 | 114 | description: ExtraHop gives you the perspective you need to understand your hybrid attack surface from the inside out. Our industry-leading network detection and response platform is purpose-built to help you rise above the noise of alerts, silos, and runaway technology so you can secure your future in the cloud.
|
115 | 115 | - member: true
|
116 | 116 | sponsor:
|
|
164 | 164 | sponsor: 4
|
165 | 165 | name: Lyft
|
166 | 166 | image: /assets/images/corp-member-logo/lyft.png
|
167 |
| - url: http://www.lyft.com/ |
| 167 | + url: https://www.lyft.com/ |
168 | 168 | description: At Lyft, community is what we are and it’s what we do. It’s what makes us different. To create the best ride for all, we start in our own community by creating an open, inclusive, and diverse organization where all team members are recognized for what they bring.
|
169 | 169 | - member: true
|
170 | 170 | sponsor:
|
|
182 | 182 | sponsor:
|
183 | 183 | name: NetSPI
|
184 | 184 | image: /assets/images/corp-member-logo/netspi_owler_20171208_205822_original.png
|
185 |
| - url: http://www.netspi.com/ |
| 185 | + url: https://www.netspi.com/ |
186 | 186 | description: NetSPI is a privately held information-security consulting company founded in 2001. By using its consulting team's deep security knowledge and its CorrelatedVM vulnerability management & reporting solution, the company is a trusted advisor to large enterprises. NetSPI provides a range of assessment and advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards. Clients include large financial services firms, retailers, healthcare organizations and technology companies.
|
187 | 187 | - member: false
|
188 | 188 | sponsor: 4
|
|
224 | 224 | sponsor:
|
225 | 225 | name: PwC
|
226 | 226 | image: /assets/images/corp-member-logo/pwc.jpg
|
227 |
| - url: http://www.pwc.co.uk/cybersecurity |
| 227 | + url: https://www.pwc.co.uk/cybersecurity |
228 | 228 | description: Our purpose is to build trust in society and solve important problems. In today's digital world that requires a focus on cyber security in order to build a secure digital society. We help clients across society to understand their cyber security risk; build and assure their defences; identify and respond to attacks, and to navigate the complex legal and regulatory environment for cyber security.
|
229 | 229 | - member: false
|
230 | 230 | sponsor: 4
|
|
260 | 260 | sponsor:
|
261 | 261 | name: SCSK Corporation
|
262 | 262 | image: /assets/images/corp-member-logo/SCSK.jpeg
|
263 |
| - url: http://www.scsk.jp/index_en.html |
| 263 | + url: https://www.scsk.jp/index_en.html |
264 | 264 | description: SCSK provides a full lineup of services to support any area of IT solution required for businesses from system integration to IT infrastructure implementation, IT management, BPO(business process outsourcing), and IT hardware and software sales.In addition, we take advantage of the capability to support a global IT system network for customers including Sumitomo Corporation, aiming for further leaps ahead as a global IT services company.
|
265 | 265 | - member: true
|
266 | 266 | sponsor: 3
|
|
309 | 309 | sponsor: 4
|
310 | 310 | name: Sqreen
|
311 | 311 | image: /assets/images/corp-member-logo/sqreen.png
|
312 |
| - url: http://www.sqreen.com/ |
| 312 | + url: https://www.sqreen.com/ |
313 | 313 | description: Sqreen is the application security platform for the modern enterprise. More than 800 organizations trust Sqreen to protect, observe and test their applications, APIs and microservices. As opposed to static pattern-based approaches, Sqreen analyses application execution logic in real time to deliver more robust security without compromising performance. This empowers security owners to easily extend protection and visibility across their entire application portfolio without requiring on-going maintenance and tuning.
|
314 | 314 | - member: true
|
315 | 315 | sponsor:
|
|
339 | 339 | sponsor: 4
|
340 | 340 | name: Tala Security
|
341 | 341 | image: /assets/images/corp-member-logo/tala.png
|
342 |
| - url: http://www.talasecurity.io/ |
| 342 | + url: https://www.talasecurity.io/ |
343 | 343 | description: Tala protects modern websites and web applications across the full spectrum of client-side vulnerability. No other solution offers similar breadth of security coverage. Tala’s analysis engine evaluates over 50 unique indicators of a web page’s behavior to continuously monitor and detect anomalous activity within the server, the website supply chain, or malicious code executing at the user’s browser. This dynamic AI-driven analytics engine works in conjunction an automation engine that activates standards-based capabilities, like CSP, SRI and HSTS to protect against a wide range of app layer attacks like magecart, cross-site scripting, clickjacking, iframe injection, session-redirects, client-side malware, etc.
|
344 | 344 | - member: true
|
345 | 345 | sponsor:
|
|
387 | 387 | sponsor: 4
|
388 | 388 | name: Waratek
|
389 | 389 | image: /assets/images/corp-member-logo/waratek.png
|
390 |
| - url: http://www.waratek.com/ |
| 390 | + url: https://www.waratek.com/ |
391 | 391 | description: "The Waratek ARMR Platform provides unique protection in the applications runtime environment. This unique security layer provides fast and accurate security in the compilation pipeline, providing protection that becomes part of your application – but never requires changes to source code."
|
392 | 392 | - member: true
|
393 | 393 | sponsor:
|
|
399 | 399 | sponsor: 4
|
400 | 400 | name: WhiteSource Software
|
401 | 401 | image: /assets/images/corp-member-logo/WhiteSource.png
|
402 |
| - url: http://www.whitesourcesoftware.com/ |
| 402 | + url: https://www.whitesourcesoftware.com/ |
403 | 403 | description: The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time. It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis. We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources.
|
404 | 404 | - member: false
|
405 | 405 | sponsor: 4
|
406 | 406 | name: ZeroNorth
|
407 | 407 | image: /assets/images/corp-member-logo/zeronorth.png
|
408 |
| - url: http://www.zeronorth.io/ |
| 408 | + url: https://www.zeronorth.io/ |
409 | 409 | description: ZeroNorth is the first company to deliver risk-based vulnerability orchestration across applications and infrastructure. By orchestrating scanning tools across the entire software lifecycle, ZeroNorth provides a comprehensive and continuous view of risk, and reduces costs associated with managing disparate technologies. ZeroNorth empowers customers across all industries to rapidly scale application and infrastructure security, while integrating seamlessly into developer environments to simplify and verify remediation.
|
0 commit comments