Skip to content

Commit af16b26

Browse files
author
Harold Blankenship
committed
https only
1 parent e7c4480 commit af16b26

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

assets/sitedata/corp_members.yml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -104,13 +104,13 @@
104104
sponsor: 4
105105
name: Detectify AB
106106
image: /assets/images/corp-member-logo/detectify.png
107-
url: http://detectify.com/
107+
url: https://detectify.com/
108108
description: Detectify is a domain monitoring and web application security startup. We automate hacker attacks to help businesses stay on top of emerging threats and secure applications. Today, we collaborate with over 150 handpicked white-hat hackers to continually improve our modern test bed of 1500+ security tests from the cutting edge of security. Go Hack Yourself!
109109
- member: false
110110
sponsor: 4
111111
name: ExtraHop
112112
image: /assets/images/corp-member-logo/extrahop.png
113-
url: http://www.extrahop.com
113+
url: https://www.extrahop.com
114114
description: ExtraHop gives you the perspective you need to understand your hybrid attack surface from the inside out. Our industry-leading network detection and response platform is purpose-built to help you rise above the noise of alerts, silos, and runaway technology so you can secure your future in the cloud.
115115
- member: true
116116
sponsor:
@@ -164,7 +164,7 @@
164164
sponsor: 4
165165
name: Lyft
166166
image: /assets/images/corp-member-logo/lyft.png
167-
url: http://www.lyft.com/
167+
url: https://www.lyft.com/
168168
description: At Lyft, community is what we are and it’s what we do. It’s what makes us different. To create the best ride for all, we start in our own community by creating an open, inclusive, and diverse organization where all team members are recognized for what they bring.
169169
- member: true
170170
sponsor:
@@ -182,7 +182,7 @@
182182
sponsor:
183183
name: NetSPI
184184
image: /assets/images/corp-member-logo/netspi_owler_20171208_205822_original.png
185-
url: http://www.netspi.com/
185+
url: https://www.netspi.com/
186186
description: NetSPI is a privately held information-security consulting company founded in 2001. By using its consulting team's deep security knowledge and its CorrelatedVM vulnerability management & reporting solution, the company is a trusted advisor to large enterprises. NetSPI provides a range of assessment and advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards. Clients include large financial services firms, retailers, healthcare organizations and technology companies.
187187
- member: false
188188
sponsor: 4
@@ -224,7 +224,7 @@
224224
sponsor:
225225
name: PwC
226226
image: /assets/images/corp-member-logo/pwc.jpg
227-
url: http://www.pwc.co.uk/cybersecurity
227+
url: https://www.pwc.co.uk/cybersecurity
228228
description: Our purpose is to build trust in society and solve important problems. In today's digital world that requires a focus on cyber security in order to build a secure digital society. We help clients across society to understand their cyber security risk; build and assure their defences; identify and respond to attacks, and to navigate the complex legal and regulatory environment for cyber security.
229229
- member: false
230230
sponsor: 4
@@ -260,7 +260,7 @@
260260
sponsor:
261261
name: SCSK Corporation
262262
image: /assets/images/corp-member-logo/SCSK.jpeg
263-
url: http://www.scsk.jp/index_en.html
263+
url: https://www.scsk.jp/index_en.html
264264
description: SCSK provides a full lineup of services to support any area of IT solution required for businesses from system integration to IT infrastructure implementation, IT management, BPO(business process outsourcing), and IT hardware and software sales.In addition, we take advantage of the capability to support a global IT system network for customers including Sumitomo Corporation, aiming for further leaps ahead as a global IT services company.
265265
- member: true
266266
sponsor: 3
@@ -309,7 +309,7 @@
309309
sponsor: 4
310310
name: Sqreen
311311
image: /assets/images/corp-member-logo/sqreen.png
312-
url: http://www.sqreen.com/
312+
url: https://www.sqreen.com/
313313
description: Sqreen is the application security platform for the modern enterprise. More than 800 organizations trust Sqreen to protect, observe and test their applications, APIs and microservices. As opposed to static pattern-based approaches, Sqreen analyses application execution logic in real time to deliver more robust security without compromising performance. This empowers security owners to easily extend protection and visibility across their entire application portfolio without requiring on-going maintenance and tuning.
314314
- member: true
315315
sponsor:
@@ -339,7 +339,7 @@
339339
sponsor: 4
340340
name: Tala Security
341341
image: /assets/images/corp-member-logo/tala.png
342-
url: http://www.talasecurity.io/
342+
url: https://www.talasecurity.io/
343343
description: Tala protects modern websites and web applications across the full spectrum of client-side vulnerability. No other solution offers similar breadth of security coverage. Tala’s analysis engine evaluates over 50 unique indicators of a web page’s behavior to continuously monitor and detect anomalous activity within the server, the website supply chain, or malicious code executing at the user’s browser. This dynamic AI-driven analytics engine works in conjunction an automation engine that activates standards-based capabilities, like CSP, SRI and HSTS to protect against a wide range of app layer attacks like magecart, cross-site scripting, clickjacking, iframe injection, session-redirects, client-side malware, etc.
344344
- member: true
345345
sponsor:
@@ -387,7 +387,7 @@
387387
sponsor: 4
388388
name: Waratek
389389
image: /assets/images/corp-member-logo/waratek.png
390-
url: http://www.waratek.com/
390+
url: https://www.waratek.com/
391391
description: "The Waratek ARMR Platform provides unique protection in the applications runtime environment. This unique security layer provides fast and accurate security in the compilation pipeline, providing protection that becomes part of your application – but never requires changes to source code."
392392
- member: true
393393
sponsor:
@@ -399,11 +399,11 @@
399399
sponsor: 4
400400
name: WhiteSource Software
401401
image: /assets/images/corp-member-logo/WhiteSource.png
402-
url: http://www.whitesourcesoftware.com/
402+
url: https://www.whitesourcesoftware.com/
403403
description: The leading solution for agile open source security and license compliance management, WhiteSource integrates with the DevOps pipeline to detect vulnerable open source libraries in real-time.  It provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis.  We support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources. 
404404
- member: false
405405
sponsor: 4
406406
name: ZeroNorth
407407
image: /assets/images/corp-member-logo/zeronorth.png
408-
url: http://www.zeronorth.io/
408+
url: https://www.zeronorth.io/
409409
description: ZeroNorth is the first company to deliver risk-based vulnerability orchestration across applications and infrastructure. By orchestrating scanning tools across the entire software lifecycle, ZeroNorth provides a comprehensive and continuous view of risk, and reduces costs associated with managing disparate technologies. ZeroNorth empowers customers across all industries to rapidly scale application and infrastructure security, while integrating seamlessly into developer environments to simplify and verify remediation.

0 commit comments

Comments
 (0)