Category Cybersecurity

Supply Chain IT Security

Supply chain security is the part of supply chain management that focuses on the risk management of external suppliers, vendors, logistics and transportation. Its goal is to identify, analyze and mitigate the risks inherent in working with other organizations as…

Cryptanalytic Attack

A cryptographic analytic attack or cryptanalytic attack is an algebraic manipulation that attempts to reduce the complexity of a cryptographic algorithm. Analytic attacks focus on the logic of the algorithm itself. Cryptanalytic Attack Techniques Cryptanalytic attack techniques featured on this…

Cryptographic Attack

This post features cryptographic attacks. List of Cryptographic Attacks Cryptographic attacks featured on this post: Analytic An analytic attack is an algebraic manipulation that attempts to reduce the complexity of a cryptographic algorithm. Analytic attacks focus on the logic of…

Data Security Platforms

Data security can be also referred as data protection. This post is about data security platforms. Data governance List of Data Security Platforms Data security platforms featured on this post: Microsoft Purview Microsoft Purview is a proprietary solution to manage…

Log Management

This post explains the concept of log management and provides Description of Log Management A log is a registry produced by a device or application about its internal use. Logs are helpful for debugging or monitoring IT security. Log management…

OpenSSF

Open Security (OpenSSF) is a non-profit organization It is part of the Linux Foundation. It was founded in 2020. OpenSSF Notable Projects OpenSSF Scorecard is a vulnerability scanner of FOSS projects. OpenSSF on the Social Networks Links to Social Networks:…

Data Privacy Standards

Data privacy standards featured on this post: ISO/IEC DIS 27701 ISO/IEC 27701 is an extension to ISO/IEC 27001 and 27002 (both about creating and maintaining an ISMS) that focuses on privacy. Version history: ISO/IEC DIS 27018 ISO/IEC DIS 27018 is…