Category Cybersecurity

Access Control Models

This post summarizes access control models, as considered in cybersecurity and access control. List of Access Control Models Acces Control List (ACL) Access control list (ACL) Attribute-Based Control (ABAC) Attribute-Based Access Control (ABAC) Intent-based Access Control (IBAC) (IBAC) Host-based Access…

Cybersecurity News Sources from Spain

This post lists sources that broadcast news about information security and cybersecurity. List of Cybersecurity News Webs from Spain Cybersecurity News Web from Spain: RedSeguridad Official web Revista SIC Official web Ciberseguridad TIC Official web Securtecnia Official web CyberSecurityNews.es Official…

Cryptographic Standards and Guidelines

This post summarizes some cryptographic standards and guidelines. List of Cryptographic Standards and Guidelines Cryptographic Standards and Guidelines featured on this post: NIST’s Cryptographic Standards and Guidelines ENISA’s Recommended Cryptographic Measures CCN’s CCN-STIC 807 “Criptología de empleo en…

Capture the Flag Webs

This post summarizes some websites for capture the flag challenges or hackatons. List of Capture the Flag Webs Capture the flag webs featured on this post: HackTheBox Official website CTF365 Official website OverTheWire Official website HackingLab Official website External References

Cloud Security

This post covers some aspects of information security related to cloud services. Cloud Security Components On this section you can find different components that are relevant to cloud security. A Cloud Access Security Broker (CASB) scans the security between on-premise…