Types of Bluetooth Attacks
This post summarizes types of attacks through bluetooth. List of Bluetooth Attacks List of Bluetooth Attacks:
This post summarizes types of attacks through bluetooth. List of Bluetooth Attacks List of Bluetooth Attacks:
This post summarizes some cryptographic standards and guidelines. List of Cryptographic Standards and Guidelines Cryptographic Standards and Guidelines featured on this post: NIST’s Cryptographic Standards and Guidelines ENISA’s Recommended Cryptographic Measures CCN’s CCN-STIC 807 “Criptología de empleo en…
This post lists OT security certifications that can be achieved by professionals, i.e. people, not organizations. List of OT Security Certifications for Professionals OT security certifications featured on this post: ISA’s ISA/IEC 62443 Cybersecurity Certificate Program The ISA/IEC 62443 Cybersecurity…
This post summarizes some websites for capture the flag challenges or hackatons. List of Capture the Flag Webs Capture the flag webs featured on this post: HackTheBox Official website CTF365 Official website OverTheWire Official website HackingLab Official website External References
This post provides links to check the Support Lifecycle, End of Life (EoL), End of Support (EoS), versioning or road map dates for popular operating systems. List of Links to Operating System Lifecycle Support OSs featured on this post: Windows…
This post covers some aspects of information security related to cloud services. Cloud Security Components On this section you can find different components that are relevant to cloud security. Network Security Group A network security group, sometimes just referred as…
This post provides links to check the Support Lifecycle, End of Life (EoL), End of Support (EoS), versioning or road map dates for popular databases. List of Databases Support Lifecycle Dates List of databases lifecycles featured on this post: Oracle…
Business continuity is concerned with maintaining critical operations during any interruption in a service. It should make focus on incidents that are not frequent but may cause a big impact on the organization, such as a disaster. Disaster recovery focuses…
This post tries to explain what is an Information Security Program. What is an Information Security Program? According to ISACA, an information security program (ISP) is a set of activities that provide assurance that information assets are given a level…
This post discusses about policies, standards or guidelines to establish secure passwords in an IT system. List of Password Definition Standards List of password generation standards: NIST 800-63B NIST 800-63B is titled “Digital Identity Guidelines“. Official web SANS SPT Password…