Category IT

Identity and Access Management

Identity and Access Management (IAM) is one of the basics of information security. Concepts related to Authentication Continuous authentication Monitors user behavior continuously to ensure that the authenticated user remains the same throughout a session. Risk-based authentication analyzes user behavior…

Functional Programming Languages

This post discuss about functional programming languages, it means, programming languages that use the functional paradigm. List of Functional Programming Languages Functional programming languages featured on this post: Haskell Haskell is a purely functional programming language, and one of the…

Assembly Language

Types of computer codes, from more computer-friendly to human-friendly: Assembly language is sometimes known as assembler language or symbolic machine code. Early computer programs were written in assembly language, as programming languages did not exist yet. Assembly language is unique…

Cybersecurity News Sources from Spain

This post lists sources that broadcast news about information security and cybersecurity. List of Cybersecurity News Webs from Spain Cybersecurity News Web from Spain: RedSeguridad Official web Revista SIC Official web Ciberseguridad TIC Official web Securtecnia Official web CyberSecurityNews.es Official…