MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
CybersecurityCyberattackSecurity by designDefensive programmingInformation securityEndgame, inc.PersistenceCyberwarfare in the united statesHigh availabilityThreat actorCyberterrorismComputer security softwareDdos mitigationContinuous deploymentSecurity engineeringByzantine fault toleranceInformation integrityCyberwarfareCyber-physical systemRobustnessCyberweaponSecure by designIt operations architectureKyberComputer securityIt riskCybernationInformation assuranceCapability-based securityBackupRecovery testingSecurity testingAdvanced persistent threatDigital securityBrowser securityEmail encryptionDenial-of-service attackData integrity fieldRetrovirusStress testingContinuous monitoringAntivirusSecurity principalEncryption softwareSecurity applianceInformation security managementPrincipalResponsivenessInternet censorship circumventionEndpoint detection and responseContinuous deliveryAutonomic computingCapabilitySoftware development securityUptimeData-centric securityHyperscale computingIt security standardsRobustness testingQuantum byzantine agreementAssetReliabilityDisk encryptionAntivirus softwareMobile securityCybervandalismIt as a serviceElasticitySecurity systemBastion hostSecure codingData securityCyber-security regulationE-securityData exfiltrationSecure channelDurabilityControl-flow integritySecurity hackerEndpoint securityComputer emergency response teamSystem testingOnline and offlineSoftware systemAttack vectorNetwork securityExploit kitHardware-based encryptionContinuous testingInternet security awarenessEncryptionMultitaskingComputational trustCyberinfrastructureContinuationComputer systemBulletproof hostingTechnological literacyContent disarm & reconstructionCarrier grade