Category IT

Penetration Testing

Penetration testing (pentesting) or offensive security is performed by the so-called red teams. A breach and attack simulation (BAS) platform is intended to automate some aspects of penetration testing. These systems are de designed to inject threat indicators on to…

Biometric Authentication

Biometric authentication is any authentication method that is based on human biometrics. Biomterics is part of the type 3 “something you are” of the primary authentication factors. Physiological Biometric Methods Physiological biometric methods featured on this post: Biometric Factor Error…

Collaborative Work Management Tools

List of collaborative work management tools Collaborative work management tools: Asana Asana is a collaborative work management app. It is proprietary. Asana official website WeKan WeKan is a FOSS kanban application. WeKan official website Kanboard Kanboard is a FOSS kanban…

DNS Security

This post provides resources to security aspects of domain network system (DNS). This post assumes that you already know how a DNS works. You can read an introduction to DNS on this post. Security Controls for DNS Security controls specific…

Enterprise Resource Planning

This post is about Enterprise Resoruce Planning (ERP). List of Enterprise Resource Planning ERPs featured on this post: Openbravo ERP Openbravo ERP was an ERP developed by the Spansih company Openbravo. It was FOSS. Openbravo ERP code repository It must…

Federation Identity Management

This post features federation identity management or identity federation definitions. Federation Roles The identity provider holds all of the identities and generate a token for known users. The relying party (RP) consumes the tokens, and could be a service provider.…

Content Management System

A content management system (CMS) is computer software used to manage the creation and modification of digital content. CMS Types There are different types of CMS: Web Content Management Web Content Management (WCM) is software for collaborative authoring of public…

IT Security Tools

This post summarizes tools used in IT security. It pretends to be an index for other systems. IT Security Tools by Category Network Scanning Tools List of network scanning tools System Virtualization Security Tools List of system virtualization security tools…

Supply Chain IT Security

Supply chain security is the part of supply chain management that focuses on the risk management of external suppliers, vendors, logistics and transportation. Its goal is to identify, analyze and mitigate the risks inherent in working with other organizations as…