Category IT

OT Security

Operational technologies (OT) are hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events.. You can read an introduction to OT on this post. OT Security (OT-Sec), Industrial…

Free and Open Source Software Foundations

There are foundations that support and get funds for free and open source software (FOSS). Foundations allow to have vendor-independent organizations that manage FOSS projects, improving neutrality. An example of vendor-dependent FOSS project is Java. This post features a list…

Computer Network Protocols

Network protocols can be classified by the OSI layer where they operate. Computer Network Protocols by OSI Layer This section informs lists computer network protocols by their OSI layer. OSI layer are, in incremental order: Data Link OSI Layer Protocols…

IT Security Legislation

This post features regulations related to IT security. The post focuses on regulations that establish IT security controls. If you want to know regulations that prosecute malicious behavior related to computers or IT and IT crime, please check this post.…

Infrastructure as Code

Infrastructure as Code (IaC) is the process of managing and provisioning computer data center resources through machine-readable definition files, rather than physical hardware configuration or interactive configuration tools. IaC is a technology that is related to configuration management. You can…