Pablo Gallardo

Pablo Gallardo

Cybersecurity and IT professional. Find more info at pmgallardo.com

Free and Open Source Software

Free and open source software (FOSS) is software that uses a software license that is both recognized as “free” by the Free Software Foundation (FSF) and “open source” by the Open Software Initiative (OSI). The definitions of “free” (based on…

Copyleft Software Licenses

Copyleft licenses are also known as reciprocate, share-alike or restrictive licenses. These licenses allow you to modify the licensed code and distribute new works based on it, as long as you distribute any new works or adaptations under the same…

eIDAS

eIDAS (for “electronic IDentification, Authentication and trust Services”) is a set of European Union regulations. eIDAS Regulations There are different eIDAS regulations: eIDAS1 is regulated in EU Regulation 910/2014, that derogated EU Directive 1999 It is completely applied since 1…

Administración Electrónica del Sector Público en España

Este artículo resume los servicios o portales electrónicos comunes de la Administración General del Estado o administración estatal pública de España. La administración electrónica podría llamarse administración automática o automatizada, ya que nos referimos no solo a las comunicaciones con…

Enterprise Architecture Frameworks

Enterprise architecture (EA) is a conceptual blueprint that defines the structure and operation of organizations. Enterprise information security architecture (EISA) is a subset of enterprise architecture that focus on information security. You can read more about IS architecture frameworks on…

Permissive Software Licenses

Permissive licenses are also known as BSD-style or Apache-style licenses. They contain minimal requirements about how the software can be modified or redistributed, clauses that are not existent in public domain or public domain equivalent licenses.. Permissive licenses are more…

IPSec

Internet Protocol Security (IPSec) is a standard of IP security extensions that comprises a collection of protocols and that is used as an add-on for IPv4 and integrated into IPv6. Each IPsec VPN uses two security associations, one for encrypted…