Trace: » security.html

[Hemmerling] Security

Free Trainings

Events, Fairss & Conferences

EU / Germany Cyber Laws, Cybersecurity Laws & Regulations

IT Sicherheitsgesetz 2.0 (IT SiG 2.0)

NIS2 Richtlinie

Cyber Resilience Act (CRA)

EU General Data Protection Regulation ( GDPR )

Tools

    • For websites/apps - Privacy and Cookie Policy Generator.
    • For websites/apps - Cookie Solution. Manage consent preferences for the ePrivacy, GDPR, and CCPA. Integrated with the IAB TCF and US Privacy Framework.
    • For websites/apps - Terms and Conditions Generator. Create your terms and conditions in minutes.

Resources

Security Iniatives and Societies, Official State Offices

Security News

Information Security Management System ( ISMF )

Security Tools

Security Online Services

Free Security Online Services

E-Mail & Password Leaks Database

Just-Commercial Security Online Services

  • ExploitHub - “The First Legitimate Marketplace For Validated, Non-Zero-Day Exploits For Security Professionals”.

Free Security Tools

Secure Data Exchange

    • “An open-source software and data exchange layer that provides a secure, standardized, and unified way for organizations (public and private) to exchange data over the internet, ensuring confidentiality, integrity, and interoperability using features like encryption, digital signatures, and access controls”.
    • The software was mentioned on the event “IT-Sicherheitstag NRW 2025” in Dortmund, Germany.

Commercial Security Tools

  • Neuber Software - the commercial “Network Security Taskmanager” / “Security Task Manager” - “Shows detailed information about all running processes: file path, description, security risk rating, start time, icon”.

Resources

AntiVirus and Firewall Software

Free and comercial AntiVirus software

Free Firewall Software

Just-Commercial, Affordable AntiVirus software

Resources

Microsoft Security Technologies

General Security

Telemetry, Privacy

Telemetry, Privacy Resources

Internet and Software Application Security

Password Recovery Tools

Free Password Recovery Tools

Free General Tools

Secure Connections

Internet Protocol Security ( IPsec )

Certificates & Certificate Generation

Transport Layer Security ( TLS ) / Secure Sockets Layer ( SSL )

VPN

OpenVPN
Commercial VPN Services
Resources

Zero Trust Security ( the Successor of VPN )

Top Critical Errors / Vulnerabilities

CWE - Common Weakness Enumeration

CVE - Common Vulnerabilities and Exposures

OWASP

SANS Institute

Software & Software Frameworks

BSI Projekt 625

    • “An Architecture for Matching CSAF Documents on Industrial Asset Inventories. Daniel Rittershofer (Fraunhofer IOSB): We present BSI’s project 625 on CSAF matching in industrial environments. The aim of the project is to match an industrial asset inventory with a CSAF document database so that operators can efficiently identify relevant security advisories for the assets contained in their plants. We present our system architecture and implementation as well as our approach to matching CSAF documents to device and software asset information. The open-source asset inventory NetBox serves as our asset inventory. We integrate the interaction with the CSAF matching system as well as the processing and tracking of the processing status of matches into NetBox as a plugin”.
  • NetBox Labs - “The world’s platform for network and infrastructure management”.

CSAF - Common Security Advisory Framework

DevGuard

  • The commercial DevGuard - “Develop Secure Software. Get full transparency of your Software-Supply-Chain”.
    • GitHub "l3montree-dev / devguard" - “DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your Vulnerability Scanners, Security Framework Documentation made easy - OWASP Incubating Project”.
  • The software was mentioned on the event “IT-Sicherheitstag NRW 2025” in Dortmund, Germany.

GUAC Trustify

Resources

Security For Automation

Security Protocols and Security Frameworks ( for Software Development )

Software Development

Trusted Computing

Online Magazines

Literature

Books & Publications

General

Automation & Process Industry

Paper Magazines

Experts

Services

Accountability in IT Business

  • “Cloud Computing” = “Auftragsdatenverarbeitung”, according to $11 of “Bundesdatenschutzgesetz” ( BDSG ).

Scam

  • Anti-Scam-Forum, Germany - “TEILE KEINEM SCAMMER MIT, DASS SIE HIER GELISTET SIND. Die, die es tun erhalten sofort Verbannung” :-).
  • DragonLadies.org BBS - “A forum for the collection, and publication of information on female internet romance scammers from Asia”.
  • Blog ScumAlert.

Resources

Forums, Newsgroups, Communities

Appropriate OpenDirectory Directory Pages

 
en/security.html.txt · Last modified: 2025/12/13 23:28 (external edit) · []
Recent changes RSS feed Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki