Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 10: | Line 10: | ||
<div style="display: flex; align-items: center; justify-content: center; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">Cybersecurity Practitioners[[File:Peregrine_falcon_2.png|frameless|75px|center|link=]]<br><br></div> | <div style="display: flex; align-items: center; justify-content: center; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">Cybersecurity Practitioners[[File:Peregrine_falcon_2.png|frameless|75px|center|link=]]<br><br></div> | ||
<div style="position:relative; text-align:left; font-weight:bold; font-size:100%; z-index: 1;"> | <div style="position:relative; text-align:left; font-weight:bold; font-size:100%; z-index: 1;"> | ||
* [[Threat Taming Tools Collection (T3C)|Threat Taming Tools Collection (T3C)]] | * New: [[Threat Taming Tools Collection (T3C)|Threat Taming Tools Collection (T3C)]] | ||
* [[Top Threats|Top Threats]] | * [[Top Threats|Top Threats]] | ||
* [[Enhanced Protection|Enhanced Protection]] | * [[Enhanced Protection|Enhanced Protection]] |
Revision as of 15:20, 9 July 2024
|
|
|
---|