🛡️

Cybersecurity & Digital Risk

Audit, pentest, hardening, compliance

Network Security
Secures networks from cyber threats and unauthorized access, ensuring safe and reliable data communication.
Endpoint Security
Protects devices like computers and mobiles from cyber threats, ensuring secure access and data safety.
Infrastructure & Cloud Security
Secures cloud systems and IT infrastructure from cyber threats, ensuring data protection and reliable operations.
Application Security (AppSec)
Parent Category Cybersecurity & Digital Risk Subcategory Name Application Security (AppSec) URL Slug application-security-(appsec) Icon / Image (Optional) Emoji or /uploads/... path Short Description (Optional)
Data Security & Privacy
Protects sensitive data and ensures privacy through encryption, access control, and secure data handling.
Identity & Access Management (IAM)
Manages user identities and controls access to systems, ensuring only authorized users can access resources securely.
Threat Detection & Hunting
Identifies and investigates cyber threats in real time to detect attacks early and prevent security breaches.
Incident Response & Forensics
Responds to cyber incidents and investigates attacks to minimize damage, recover systems, and identify root causes.
Threat Intelligence & Adversary Emulation
Analyzes threat data and simulates real-world attacks to anticipate risks and strengthen security defenses.
Third-Party & Supply Chain Risk
Assesses and manages security risks from vendors and partners to protect the overall supply chain from cyber threats.
Cyber Governance, Risk & Compliance (GRC)
Ensures cybersecurity policies, risk management, and regulatory compliance to align security practices with business goals and standards.
External Attack Surface Management (EASM)
Monitors and manages all internet-facing assets to identify vulnerabilities and reduce exposure to external cyber threats.
Cyber Resilience & Recovery
Ensures systems can withstand cyberattacks and quickly recover operations with minimal disruption and data loss.
Operational Technology (OT) & Industrial IoT Security
Secures industrial systems and IoT devices used in critical operations to prevent disruptions, cyberattacks, and safety risks.
AI Security & Trust
Ensures AI systems are secure, reliable, and trustworthy by protecting them from attacks, misuse, and bias.
Product & IoT Security
Secures connected products and IoT devices by protecting them from cyber threats and ensuring safe, reliable operation.
Human Risk & Awareness
Reduces human-related security risks by educating users and building awareness against cyber threats and unsafe practices.