Category Cybersecurity

Penetration Testing

Penetration testing (pentesting) or offensive security is performed by the so-called red teams. A breach and attack simulation (BAS) platform is intended to automate some aspects of penetration testing. These systems are de designed to inject threat indicators on to…

Biometric Authentication

Biometric authentication is any authentication method that is based on human biometrics. Biomterics is part of the type 3 “something you are” of the primary authentication factors. Physiological Biometric Methods Physiological biometric methods featured on this post: Biometric Factor Error…

Federation Identity Management

This post features federation identity management or identity federation definitions. Federation Roles The identity provider holds all of the identities and generate a token for known users. The relying party (RP) consumes the tokens, and could be a service provider.…

Supply Chain IT Security

Supply chain security is the part of supply chain management that focuses on the risk management of external suppliers, vendors, logistics and transportation. Its goal is to identify, analyze and mitigate the risks inherent in working with other organizations as…

Cryptanalytic Attack

A cryptographic analytic attack or cryptanalytic attack is an algebraic manipulation that attempts to reduce the complexity of a cryptographic algorithm. Analytic attacks focus on the logic of the algorithm itself. Cryptanalytic Attack Techniques Cryptanalytic attack techniques featured on this…

Cryptographic Attack

This post features cryptographic attacks. List of Cryptographic Attacks Cryptographic attacks featured on this post: Analytic An analytic attack is an algebraic manipulation that attempts to reduce the complexity of a cryptographic algorithm. Analytic attacks focus on the logic of…

Data Security Platforms

Data security can be also referred as data protection. This post is about data security platforms. Data governance List of Data Security Platforms Data security platforms featured on this post: Microsoft Purview Microsoft Purview is a proprietary solution to manage…