diff --git a/Data Encryption.png b/Data Encryption.png new file mode 100644 index 0000000..de41a5d Binary files /dev/null and b/Data Encryption.png differ diff --git a/Deception.png b/Deception.png new file mode 100644 index 0000000..97979a1 Binary files /dev/null and b/Deception.png differ diff --git a/EnterpriseFuzzing.png b/EnterpriseFuzzing.png new file mode 100644 index 0000000..e697512 Binary files /dev/null and b/EnterpriseFuzzing.png differ diff --git a/Incident Response (2).png b/Incident Response (2).png new file mode 100644 index 0000000..6979f69 Binary files /dev/null and b/Incident Response (2).png differ diff --git a/Incident Response.png b/Incident Response.png new file mode 100644 index 0000000..b67dd4b Binary files /dev/null and b/Incident Response.png differ diff --git a/Malware Detection.png b/Malware Detection.png new file mode 100644 index 0000000..6219c2c Binary files /dev/null and b/Malware Detection.png differ diff --git a/OSINT.png b/OSINT.png new file mode 100644 index 0000000..e25e9c3 Binary files /dev/null and b/OSINT.png differ diff --git a/Privacy & Compliance.png b/Privacy & Compliance.png new file mode 100644 index 0000000..f6bc150 Binary files /dev/null and b/Privacy & Compliance.png differ diff --git a/Responsible Disclosure.png b/Responsible Disclosure.png new file mode 100644 index 0000000..adb1694 Binary files /dev/null and b/Responsible Disclosure.png differ diff --git a/SecurityAudits.png b/SecurityAudits.png new file mode 100644 index 0000000..27df985 Binary files /dev/null and b/SecurityAudits.png differ diff --git a/cypsec-logo-white-transparent.webp b/cypsec-logo-white-transparent.webp new file mode 100644 index 0000000..76824b1 Binary files /dev/null and b/cypsec-logo-white-transparent.webp differ diff --git a/index.html b/index.html index b0a05f1..247fd9f 100644 --- a/index.html +++ b/index.html @@ -3,50 +3,113 @@
-Click on any card to explore our security measures and programs
+ + + ++ Featuring CypSec's security measurements and security programs. +
+
- Click to learn more
- Click to learn more
- Click to learn more
- Click to learn more
- Click to learn more
- Click to learn more
- Click to learn more
- Click to learn more
- Click to learn more
+
- Click to learn more
-Our dedicated team ensures rapid response to security incidents with comprehensive monitoring and automated mitigation systems.
-Engineering sovereign cybersecurity that protects, adapts, and sustains critical digital infrastructures.
+ +Contact
+ +