Category IT

Cloud Security

This post covers some aspects of information security related to cloud services. Cloud Security Components On this section you can find different components that are relevant to cloud security. Network Security Group A network security group, sometimes just referred as…

GitHub

This post explains how to set up a GitHub project. What is GitHub? GitHub is a repository service based on code control version system (CVS) Git. GitHub has many things in common with Git, so it is important to be…

Database Support Lifecycle

This post provides links to check the Support Lifecycle, End of Life (EoL), End of Support (EoS), versioning or road map dates for popular databases. List of Databases Support Lifecycle Dates List of databases lifecycles featured on this post: Oracle…

Cloud Service Providers

A Cloud Service Provider (CSP) is a provider of services in the cloud. This post summarizes some CSPs. List of Cloud Service Providers Cloud Service Providers featured on this post: Amazon Web Services (AWS) Amazon Web Services (AWS) is a…

Business Continuity

Business continuity is concerned with maintaining critical operations during any interruption in a service. It should make focus on incidents that are not frequent but may cause a big impact on the organization, such as a disaster. Disaster recovery focuses…

Directory Services

This post summarizes some standards and implementations of Directory Services. List of Directory Services Directory services featured on this post: X.500 X.500 is a set of standards related to directory services. One of them is Directory Access Protocol (DAP). It…

Introduction to Digital Transformation

This post add some notes on digital transformation. What is Digital Transformation? Digital Transformation Models: Stages of growth model Stages of growth model or Nolan’s model is a model developed by Richard L. Nolan in the early 1970s. Its final…

Information Security Program

This post tries to explain what is an Information Security Program. What is an Information Security Program? According to ISACA, an information security program (ISP) is a set of activities that provide assurance that information assets are given a level…