Toggle navigation
[日本語]
Login
Toggle navigation
Vulnerability Information
Vulnerability Search
JVN Vulnerability Search
NVD Vulnerability Search
CPE検索
List of CWE
Software Information
All
Operating Systems
Web Server
Database
Other Middleware
Programming language
Framework
CMS
Encryption
Virtualization
System Management Tool
Version Update History
Support Expiration Information
Information gathering
Provide Information Site
CheatSheet
Response Header
Directory Traversal
Network related
Information about Port numbers
Protocol Information
Tools
Check Access Source Information
Generate Password
HTML Escape
HTML整形
Json整形
URL Encode・Decoding
Base64 Encode・Decoding
Numeric Character Reference Encoding・Decoding
About Secualive
Provide Information Site
Select Genre
All
media_news
security_company
tool
blog
organization
convenient_service
conference
ctf_bug_bounty
Low
framework
vulnerable_site
wordpress
proxy
tamper_detect
vulnerability_notification_site
firewall
Security Advisary
Document
Education,Training
Cloud Security Posture Management
AI
Information Site Top
->
organization
This is a collection of sites about security.
The order is alphabetical.
Show Search Menu
URL
Name
Language
Number of items displayed
100
200
300
Add Tag
---------
News
Web Audit
Network Audit
Major
Tools
Foreign Country
Organization
Company
Celebrated Person
School
Government
Hacking
CMS
WordPress
Source Code Audit
Game Audit
Smartphone Audit
IoT Audit
Consulting
CTF
Qualifications
WAF
Education
Manipulation Detection
Endpoint Detection and Response(EDR)
Mail
Incident Response
Blog
Forensic
File Transfer
FW Audit
Pentest
E-Learning
Create Development Guidelines
Security enhancement support
Requirements Consulting
WAF Installation Support
Security Advisor
WordPress Security Enhancement
EC-CUBE Security Enhancement Support
Automatic Audit tools
System Development
Targeted Email Attack Training
Manipulation Detection
Windows
Linux/Unix
Mac OS
Open Source
Bug Bounty
SIEM
Vulnerability Management
Log Management
SOC
Hardware Audit
Android Application
Information Provision
Mail Security
Cloud Security
Database Audit
Support for PCIDSS
Building CSIRTs
Android
iOS
AWS
Open Source
Cheetsheet
Exploit
Cloud
Incorporated association
Automotive Audit
Virtual Currency Audit
Anti-tampering Audit
Smartphone App Development
Wireless LAN Audit
APT Attack Resistance Audit
Malware Audit
Building Active Directory
Secure app development environment
Website Malware Scan
Sandbox
ERP Security
Infra Security
Social engineering
MITB measures
Fraud Prediction Detection
SDK Development Kit
Countermeasures against malicious sites
FW Management
IDS/IPS Management
Active Directory Audit
Server Configuration Audit
Backup Service
DDos protection
Open Source Risk Detection
Database encryption
POS security
Blockchain Security
File Transfers
DNS security
Privacy Mark
Managed Security Service Provider (MSSP)
Managed Detection and Response (MDR)
Backups
Security Advisories
Antivirus software
Japan Corporation
Microsoft
Anti-virus software verification service
Documents
DevSecOps
OSS Security Detection
0Day Defense
RASP(Runtime Application Self Protection)
CDN
Data management and protection
Salesforce security Audit
IaaS Audit
Microsoft365 Audit
SaaS Audit
Sngle sign-on
Support for internalization of audit
Endpoint Audit
Monitoring
GDPR compliance
Cyber Security for Medical Institutions
Cyber Security Exercise
Antiphishing
ISO27001
Threat Intelligence
Law
IP address research
Fuzzing
Git
Google
Site Information Gathering
Malware and ransomware support
Server Robustness Support
AI
Vulnerability assessment Design document review
Physical Security
VOIP Audit
RedTeam
Wifi Audit
IPv6 Audit
Host Security Audit
Support for building a remote work environment
Ransomware resistance check
Wiretap and spy camera investigation
Performance survey
Support for acquisition of ISMS certification
Cyber Risk Management
Embedded Device Assessment
Insider Threat Assessment
Remote Security Assessment
Penetration Testing for Internal Attacks
AWS
AZUL
GCP
CSPM(Cloud Security Posture Management)
MISP
Internal information leakage countermeasures
System config and Management Support
Product Assessment
OSINT
1 / 1 - 合計 : 19
organization
No
Image
Name
URL
Description
Tag
1
Center for Internet Security
https://www.cisecurity.org/
At CIS®, we're harnessing the power of global IT community to safeguard public and private organizations against cyber threatssss
English
Foreign Country
Organization
Information Provision
2
Information-technology Promotion Agency
https://www.ipa.go.jp/
The National Institute of Information and Communications Technology (NICT) is an independent administrative agency that disseminates security information, fosters human resources, and organizes national certification examinations. People who are involved in work related to information processing are taken care of by the examinations. They send out a lot of information, so I recommend that you check for updates regularly.sss
Japanese
Organization
Government
Qualifications
Information Provision
3
JPCERT/CC
https://www.jpcert.or.jp/
The JPCERT Coordination Center (JPCERT/CC) compiles information on intrusions and other attacks on corporate networks in Japan, and provides information on defense methods and trends.sss
Japanese
Organization
Government
Incident Response
4
MISP Threat Sharing
https://www.misp-project.org/
As the MISP project expanded, MISP is not only covering the malware indicators but also fraud or vulnerability information. The name is now MISP, threat sharing which includes the core MISP software and a myriad of tools (PyMISP) and format (core format, MISP taxonomies, warning-lists) to support MISP. MISP is now a community project lead by a team of volunteers.sss
English
Foreign Country
Organization
Incident Response
Open Source
Data management and protection
Monitoring
Threat Intelligence
MISP
5
MITRE
https://www.mitre.org/
English
Organization
6
Mitre Shield
https://shield.mitre.org/
MITRE Shield is a knowledge base focused on active defense and adversary engagement. It provides insights into defensive strategies and tactics, such as cyber deception and adversary counteractions, based on over 10 years of experience. The platform helps defenders understand and apply various tactics and techniques to protect against cyber threats effectively.sss
English
Organization
7
National Vulnerability Database
https://nvd.nist.gov/
The National Vulnerability Database (NVD) is a comprehensive U.S. government repository that provides data on vulnerabilities. It includes standardized vulnerability information and metrics, allowing organizations to manage vulnerabilities, automate security processes, and comply with various regulations. The NVD is a valuable resource for tracking security threats and understanding their impact.sss
English
Organization
Government
8
NICT: National Institute of Information and Communications Technology
http://www.nict.go.jp/
The National Institute of Information and Communications Technology (NICT), as Japan's only public research organization specializing in the field of information and communication, promotes research and development of information and communication technologies from an integrated perspective, from basic to applied, and at the same time, cooperates with universities, industries, local governments, and research institutes in Japan and overseas. At the same time, we collaborate with universities, industry, local governments, and research institutions in Japan and overseas, with the aim of returning the results of our research and development to society at large and creating innovation. Excerpt from [https://www.nict.go.jp/about/greetings.html]sss
Japanese
Organization
Government
9
Japan Network Security Assciation
http://www.jnsa.org/
It is a non-profit organization (NPO) that organizes the Security Contest (SECCON). In addition to disseminating information on network security, it has many social activity groups and engages in a wide range of activities.sss
Japanese
Organization
10
OWASP
https://www.owasp.org/
The Open Web Application Security Project is an online community that creates freely available articles, methodologies, documentation, tools, and techniques in the field of web application security.sss
English
Organization
11
OWASP JAPAN
https://www.owasp.org/index.php/Japan
He conducts security activities in Japan such as study sessions and translation of documents. They have translated the "OWASP Top 10" released by OWASP.sss
Japanese
Organization
12
Sans
https://www.sans.org/jp_ja/
SANS Institute provides world-class cybersecurity training and certification programs. They offer live online and in-person courses on various topics, from ethical hacking to incident response. The platform also provides resources such as webinars, white papers, and specialized tools to help cybersecurity professionals stay ahead of emerging threats.sss
Japanese
Organization
Qualifications
Education
13
WAS Forum
https://wasforum.jp/
It is a non-profit, voluntary organization established in 2004. The purpose of its activities is to research issues related to web application security, share information on how to improve security, and disseminate and educate effective information on appropriate measures and construction methods. [Excerpt from the website]sss
Japanese
Web Audit
Organization
14
フィッシング対策協議会
https://www.antiphishing.jp/
The Anti-Phishing Council of Japan (APC) works to raise awareness and provide resources to combat phishing attacks. The website offers guidelines, reports, and updates about phishing scams, helping both consumers and businesses protect against cyber threats. It also features information on how to report phishing incidents and tips for staying safe online.sss
Japanese
Organization
Information Provision
15
国民のための情報セキュリティサイト
https://www.soumu.go.jp/main_sosiki/cybersecurity/kokumin/index.html
This is a website from the Ministry of Internal Affairs and Communications (MIC) that provides easy-to-understand explanations about information security.The site describes risks, accident cases, and countermeasures for information security used in daily life such as the Internet, smartphones, and Wi-Fi.sss
Japanese
Organization
Government
Information Provision
16
日本サイバー犯罪対策センター
https://www.jc3.or.jp/
The Japan Cybercrime Control Center (JC3) focuses on addressing cybercrime and improving national cybersecurity. Their website provides information on various cyber threats, best practices, and recent trends. JC3 works to protect citizens and businesses by offering research, alerts, and collaboration with other organizations to combat cybercrime in Japan.sss
Japanese
Organization
Government
17
日本シーサート協議会
https://www.nca.gr.jp/
CSIRT (Computer Security Incident Response Team) is a generic term for an organization that deals with computer security incidents. It constantly collects and analyzes incident-related information, vulnerability information, and information on predictive signs of attacks, and works to formulate response policies and procedures. Excerpt from [https://www.nca.gr.jp/outline/index.html]sss
Japanese
Organization
Building CSIRTs
18
経済産業省 - 情報セキュリティ政策
https://www.meti.go.jp/policy/netsecurity/
The Ministry of Economy, Trade and Industry (METI) in Japan focuses on cybersecurity policies aimed at improving the nation's security infrastructure. Their website offers resources and guidelines on various cybersecurity topics, including vulnerability management, risk reduction, and incident response. METI works with organizations to strengthen cybersecurity measures and protect critical infrastructure.sss
Japanese
Organization
Government
19
警視庁 サイバー犯罪対策プロジェクト
https://www.npa.go.jp/bureau/cyber/index.html
The Cyber Police Bureau of the National Police Agency (NPA) in Japan focuses on preventing and investigating cybercrimes. Their website offers information on various cyber threats, prevention measures, and public safety initiatives. The Cyber Police Bureau also provides guidelines for reporting incidents and ways to protect against digital threats, including ransomware and phishing.sss
Japanese
Organization
Information Provision
1 / 1 - 合計 : 19
×
Display Dashboard Setting
The selected informational sites can be displayed on the dashboard.
You can easily access them from your dashboard by selecting the sites you are interested in.
×