Overview of existing mappings from and to cyber security controls
Build an enterprise-level AI agent operating system enabling cross-departmental and cross-system intelligent collaboration.
#计算机科学#A powerful log management and compliance tool designed for IT professionals and enterprises. Centralized log collection, AI-driven analytics, GDPR, ISO 27001, and NIS2 compliance.
Windows Defender contains several functions for tools to secure Windows machine and get compliant with common regulations.
ISO 27001 Security Security Compliance.
Build an enterprise-level AI agent operating system enabling cross-departmental and cross-system intelligent collaboration.
Cloudit automates compliance with evidence collection. Cloudit streamlines vulnerability tracking, audit workflows, and compliance reporting by gathering artifacts, comparing findings, and generating ...
Pulls scan results using the AWS Inspector API, combines various AWS Inspector scan results, and formats them scan results into an organized output that is POAM-ready.
Scenario-based risk is a method of identifying and assessing potential risks and hazards that may impact an organization. It involves identifying potential threats, assessing their likelihood and impa...
TenableTrawler (Cloud OR FedCloud) is a Python project that pulls scan results via the Tenable API, laying them into organized, POAM-ready outputs. It supports various scans and exports in formats lik...