Category IT Security

Zero Trust Security

A key concept of zero trust security is that it assess security dynamically. Zero Trust Network (ZTN) Zero Trust Architecture (ZTA) Zero Trust Network Access (ZTNA) is an IT security solution that provides secure remote access to an organization’s applications,…

Cryptographic Standards and Guidelines

This post summarizes some cryptographic standards and guidelines. List of Cryptographic Standards and Guidelines Cryptographic Standards and Guidelines featured on this post: NIST’s Cryptographic Standards and Guidelines ENISA’s Recommended Cryptographic Measures CCN’s CCN-STIC 807 “Criptología de empleo en…

Capture the Flag Webs

This post summarizes some websites for capture the flag challenges or hackatons. List of Capture the Flag Webs Capture the flag webs featured on this post: HackTheBox Official website CTF365 Official website OverTheWire Official website HackingLab Official website External References

Cloud Security

This post covers some aspects of information security related to cloud services. Cloud Security Components On this section you can find different components that are relevant to cloud security. A Cloud Access Security Broker (CASB) scans the security between on-premise…

Database Support Lifecycle

This post provides links to check the Support Lifecycle, End of Life (EoL), End of Support (EoS), versioning or road map dates for popular databases. List of Databases Support Lifecycle Dates List of databases lifecycles featured on this post: Oracle…

Business Continuity

Business continuity should make focus on incidents that are not frequent but may cause a big impact on the organization. A Business Continuity Plan (BCP) is a plan used by an organization to respond to disruption of critical business process.…

Information Security Program

This post tries to explain what is an Information Security Program. What is an Information Security Program? According to ISACA, an information security program (ISP) is a set of activities that provide assurance that information assets are given a level…