Category Cybersecurity

Artificial Intelligence Security

This post discusses some aspects of artificial intelligence regarding security. AI Chatbot Security Concerns Summary of AI Chatbot Security Concerns Upload Sensitive Information Users or employees may upload sensitive information to the website. Malicious use of the Application This aspect…

Cl@ve

Cl@ve es un servicio público de identificación digital ofrecido por las Administraciones Públicas de España. Es la plataforma para la identificación, autenticación y firma electrónica mediante el uso de claves concertadas, común para todo el Sector Público Administrativo Estatal. Cl@ve…

Voice over IP

Voice over IP (VoIP) is a multilayer protocol that encapsulates in a tunnel audio video into IP packets to support voice calls an multimedia collaboration. VoIP is an alternative to the traditional public switched telephone network (PSTN). VoIP Protocols VoIP…

Content Management Database

A Content Management Database, CMDB, stores an inventory of configuration items (CIs), it means, hardware, software and network components within a scope, usually an organization, that can be configured. A CI represents an item under configuration management, such as a…

Link Checker Tools

This post feature domain, website or URL checker, inspection tool or scanner. List of Tools Tools: Any.run Any.run official website Check-host.net Check-host.net checks the country of origin of a host or server within the internet.

Penetration Testing

Penetration testing (pentesting) or offensive security is performed by the so-called red teams. A breach and attack simulation (BAS) platform is intended to automate some aspects of penetration testing. These systems are de designed to inject threat indicators on to…

Biometric Authentication

Biometric authentication is any authentication method that is based on human biometrics. Biomterics is part of the type 3 “something you are” of the primary authentication factors. Physiological Biometric Methods Physiological biometric methods featured on this post: Biometric Factor Error…

Federation Identity Management

This post features federation identity management or identity federation definitions. Federation Roles The identity provider holds all of the identities and generate a token for known users. The relying party (RP) consumes the tokens, and could be a service provider.…

Supply Chain IT Security

Supply chain security is the part of supply chain management that focuses on the risk management of external suppliers, vendors, logistics and transportation. Its goal is to identify, analyze and mitigate the risks inherent in working with other organizations as…