There are numerous tools available for developers to use to aid in rugged development but what about management and those who support them?
An app to disminish spies
Reimagining the Rugged Approach to Combat Phishing Calls: Secured and Seamless
Identifies all IoT devices on a network using MAC or DHCP fingerprinting. Checks device identity with CVEs via a database API, returning a table of devices and their associated vulnerability status.
The T-Mobile Cookie Monster (T-CoMo) informs users of the cookies tracking their personal data across the Internet.
An iOS app that allows you to test URL's for certain security features through a virtual server to keep the user's device out of harm's way.
As software involves, so do the types of phishing attempts. GoPhish educates the user on how to be the last line of defense and differentiate between phishing and non phishing attempts.
Secure authentication platform with accessibility to promote a more inclusive society.
Hackers Among Us is a fun and engaging multiplayer game that introduces basic cybersecurity concepts and promote rugged development principles.
Make sure your projects are secure at all stages of its lifecycle!
Blockchain Application Telephone Service, provides a secure VOIP communication channel for users to avoid robo call scams and phishing texts.
Don't surf the web alone - let SecureSurf help keep an eye over your daily interacations
HappyPaws is a simple web application designed to help newly-adopted pets travel to permanent homes via a network of volunteers.
1 – 14 of 14