MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Common criteriaIt security standardsNist cybersecurity frameworkIso/iec 15504Cert coding standardsCobitIso/iec 27002Information technology auditSecurity testingRisk management frameworkCertificate transparencyIec 62443Fips 199Protection profileIso/iec 38500Computer security softwareSecurity engineeringIso/iec 27017Att&ckEvaluation assurance levelIt baseline protectionSecurity.txtInternet standardCapability-based securityDiscretionary access controlItilFips 140-3Iso/iec 12207Iso/iec 27000-seriesIso/iec 27001 lead auditorCredential managementIso/iec 15288Formal methodsFips 140Iso 15926Iso/iec 29119Formal specificationFips 140-2National vulnerability databaseTake-grant protection modelCommon weakness enumerationSoftware verificationAccess-control listInformation securityInformation security managementIso/iec 31010Iso 28000Digital signature standardIso 10303Opal storage specificationIntegrated architecture frameworkSoftware quality assuranceNsa product typesMisra cComputer architectureSystem requirements specificationTopcitComputer access controlStructured analysisTrademarkIso 50001Information assuranceInformation systemTest design techniqueIso 56000Password policyComputational trustSaml-based products and servicesHmg infosec standard no.1Computer-aided quality assuranceCyber-security regulationLogical access controlFedrampIso/iec 19770Common platform enumerationIso 13849Transport layer securityCryptographic protocolTps reportIec 61508Iso/iec 9126Data center securityIntrusion detection systemIec 62304It service managementSecurity information managementComputer securityIso/iec 7064Electronic key management systemIso/iec 42010Control flow analysisIso 2709Systems development life cycleThe open source definitionInformation rights managementRole-based access controlMicrosoft solutions frameworkIt lawAbuse caseCertification practice statement