Explore >> Select a destination


You are here

www.nomtek.com
| | www.kusari.dev
3.0 parsecs away

Travel
| | What are you defending against? From upstream dependencies to code repositories, threat modeling ensures you're prepared to mitigate risks, reduce vulnerabilities, and avoid costly compromises.
| | www.creativehuddle.co.uk
2.9 parsecs away

Travel
| | Designed byJ.P. Guilfordin 1967, the Alternative Uses Test asks you to think of as many uses as possible for a simple object, like a brick or a shoe or a paperclip.
| | www.kusari.dev
2.8 parsecs away

Travel
| | Explore holistic software supply chain security beyond CVE counting. Learn Kusari's comprehensive approach to identify and mitigate complex vulnerabilities effectively.
| | www.lloydslistintelligence.com
59.4 parsecs away

Travel
|