Category Cybersecurity

Capture the Flag Webs

This post summarizes some websites for capture the flag challenges or hackatons. List of Capture the Flag Webs Capture the flag webs featured on this post: HackTheBox Official website CTF365 Official website OverTheWire Official website HackingLab Official website External References

Cloud Security

This post covers some aspects of information security related to cloud services. Cloud Security Components On this section you can find different components that are relevant to cloud security. A Cloud Access Security Broker (CASB) scans the security between on-premise…

Database Support Lifecycle

This post provides links to check the Support Lifecycle, End of Life (EoL), End of Support (EoS), versioning or road map dates for popular databases. List of Databases Support Lifecycle Dates List of databases lifecycles featured on this post: Oracle…

Business Continuity

Business continuity should make focus on incidents that are not frequent but may cause a big impact on the organization. A Business Continuity Plan (BPC) is a plan used by an organization to respond to disruption of critical business process.…

Windows 10 Hardening Guides

This post summarizes hardening guides, security baselines, guidelines or standards for Windows 10. List of Windows 10 Hardening Guides This section summarizes some guides, guidelines, recommendations or baselines to harden Windows 10 endpoints: Microsoft Security Baselines Microsoft Baselines are included in…