hello
This commit is contained in:
3
.vscode/settings.json
vendored
Normal file
3
.vscode/settings.json
vendored
Normal file
@@ -0,0 +1,3 @@
|
||||
{
|
||||
"liveServer.settings.port": 5501
|
||||
}
|
||||
@@ -1540,17 +1540,6 @@
|
||||
</section>
|
||||
|
||||
|
||||
<!-- Introduction Section - More compact -->
|
||||
<section class="mb-8">
|
||||
<div class="bg-gray-900 rounded-lg p-4 border border-gray-800 tight-card">
|
||||
<p class="text-sm text-gray-300 mb-3 compact-text">
|
||||
Modern organizations face an environment defined by complexity, evolving threats, and growing digital dependency. Fragmented tools or isolated solutions are no longer enough. The CypSec Security Suite provides a unified, composable ecosystem of defense capabilities — designed to secure the entire lifecycle of systems, data, and operations.
|
||||
</p>
|
||||
<p class="text-sm text-gray-300 compact-text">
|
||||
Built on the principles of cyber-sovereignty, minimal trust, and security by design, the suite enables both small and large organizations to build a resilient, traceable, and adaptive security posture that evolves with the threat landscape.
|
||||
</p>
|
||||
</div>
|
||||
</section>
|
||||
|
||||
<!-- Section Title -->
|
||||
<section class="mb-8">
|
||||
@@ -1559,17 +1548,17 @@
|
||||
The CypSec Security Suite is made of interoperable components that can be deployed independently or integrated into a cohesive architecture. Organizations select the modules they need — and expand as they grow.
|
||||
</p>
|
||||
</section>
|
||||
|
||||
<!-- Included Capabilities Grid - More compact -->
|
||||
<!-- Included Capabilities Grid – cut-out middle slot for image -->
|
||||
<section class="mb-8">
|
||||
<h3 class="text-xl font-bold mb-4 text-white">Included Capabilities</h3>
|
||||
<div class="grid md:grid-cols-2 gap-3">
|
||||
<!-- Secure Communication & Email -->
|
||||
<h3 class="text-xl font-bold mb-4 text-white text-center">Included Capabilities</h3>
|
||||
|
||||
<!-- 3×3 grid with center cell replaced by image -->
|
||||
<div class="grid md:grid-cols-3 gap-3 max-w-4xl mx-auto">
|
||||
|
||||
<!-- row 1 -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">1</span>
|
||||
</div>
|
||||
<div class="w-6 h-6 justify-center flex-shrink-0"></div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Secure Communication & Email</h4>
|
||||
<p class="smaller-text text-gray-300">End-to-end encrypted messaging, file-sharing, secure vaults, protected communication channels for sensitive teams.</p>
|
||||
@@ -1577,12 +1566,9 @@
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Vulnerability Management & Hardening -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">2</span>
|
||||
</div>
|
||||
<div class="w-6 h-6 justify-center flex-shrink-0"></div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Vulnerability Management & Hardening</h4>
|
||||
<p class="smaller-text text-gray-300">Automated scanning, continuous monitoring, secure-by-design architecture, and remediation support.</p>
|
||||
@@ -1590,12 +1576,9 @@
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Deception & Active Defense -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">3</span>
|
||||
</div>
|
||||
<div class="w-6 h-6 justify-center flex-shrink-0"></div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Deception & Active Defense</h4>
|
||||
<p class="smaller-text text-gray-300">Honeypots, decoys, threat-interaction infrastructure, and behavioral monitoring to detect and contain advanced attacks.</p>
|
||||
@@ -1603,12 +1586,10 @@
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Threat Intelligence & OSINT -->
|
||||
<!-- row 2 – left box -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">4</span>
|
||||
</div>
|
||||
<div class="w-6 h-6 justify-center flex-shrink-0"></div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Threat Intelligence & OSINT</h4>
|
||||
<p class="smaller-text text-gray-300">Tailored intelligence feeds, targeted risk analysis, threat profiling, and scenario reports.</p>
|
||||
@@ -1616,12 +1597,25 @@
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Compliance & Governance Automation -->
|
||||
<!-- IMAGE SLOT (centre) -->
|
||||
<div class="flex items-center justify-center">
|
||||
<div class="relative w-[18.5rem] h-[10.5rem] rounded-xl overflow-hidden
|
||||
border border-gray-700 shadow-md
|
||||
before:absolute before:inset-0 before:rounded-xl
|
||||
before:ring-1 before:ring-blue-400/20
|
||||
hover:before:ring-blue-400/40 before:transition before:duration-300">
|
||||
<img src="ideogram-v3.0_A_high-end_corporate-style_Cyber_Insurance_Risk_Readiness_dashboard_interface_di-0.jpg"
|
||||
alt="Cyber Insurance Risk Readiness dashboard"
|
||||
class="w-full h-full object-cover rounded-xl
|
||||
transition-transform duration-300 ease-out
|
||||
hover:scale-[1.015]">
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- right box -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">5</span>
|
||||
</div>
|
||||
<div class="w-6 h-6 justify-center flex-shrink-0"></div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Compliance & Governance Automation</h4>
|
||||
<p class="smaller-text text-gray-300">Policy-as-code, audit trails, evidence collections, and guidance for regulatory frameworks (DSGVO/GDPR, NIS2, etc.).</p>
|
||||
@@ -1629,12 +1623,10 @@
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Incident Response & Recovery -->
|
||||
<!-- row 3 -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">6</span>
|
||||
</div>
|
||||
<div class="w-6 h-6 justify-center flex-shrink-0"></div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Incident Response & Recovery</h4>
|
||||
<p class="smaller-text text-gray-300">Rapid response teams, forensics, containment strategy, and post-incident strengthening.</p>
|
||||
@@ -1642,12 +1634,9 @@
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Malware Analysis & Secure Lab Environments -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">7</span>
|
||||
</div>
|
||||
<div class="w-6 h-6 justify-center flex-shrink-0"></div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Malware Analysis & Secure Lab Environments</h4>
|
||||
<p class="smaller-text text-gray-300">Controlled sandboxing environments for analyzing suspicious files and payloads.</p>
|
||||
@@ -1655,21 +1644,18 @@
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Secure Development & Architecture -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">8</span>
|
||||
</div>
|
||||
<div class="w-6 h-6 justify-center flex-shrink-0"></div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Secure Development & Architecture</h4>
|
||||
<p class="smaller-text text-gray-300">Design-phase threat modeling, secure architectures, and code review services.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</section>
|
||||
|
||||
<!-- Section Divider -->
|
||||
<div class="section-divider"></div>
|
||||
|
||||
|
||||
Binary file not shown.
|
After Width: | Height: | Size: 1.0 MiB |
Reference in New Issue
Block a user