Category IT Security

Capture the Flag Webs

This post summarizes some websites for capture the flag challenges or hackatons. List of Capture the Flag Webs Capture the flag webs featured on this post: HackTheBox Official website CTF365 Official website OverTheWire Official website HackingLab Official website External References

Cloud Security

This post covers some aspects of information security related to cloud services. Cloud Security Components On this section you can find different components that are relevant to cloud security. Network Security Group A network security group, sometimes just referred as…

Database Support Lifecycle

This post provides links to check the Support Lifecycle, End of Life (EoL), End of Support (EoS), versioning or road map dates for popular databases. List of Databases Support Lifecycle Dates List of databases lifecycles featured on this post: Oracle…

Business Continuity

Business continuity is concerned with maintaining critical operations during any interruption in a service. It should make focus on incidents that are not frequent but may cause a big impact on the organization, such as a disaster. Disaster recovery focuses…

Information Security Program

This post tries to explain what is an Information Security Program. What is an Information Security Program? According to ISACA, an information security program (ISP) is a set of activities that provide assurance that information assets are given a level…

Password Definition Standards

This post discusses about policies, standards or guidelines to establish secure passwords in an IT system. List of Password Definition Standards List of password generation standards: NIST 800-63B NIST 800-63B is titled “Digital Identity Guidelines“. Official web SANS SPT Password…

Windows 10 Hardening Guides

This post summarizes hardening guides, security baselines, guidelines or standards for Windows 10. List of Windows 10 Hardening Guides This section summarizes some guides, guidelines, recommendations or baselines to harden Windows 10 endpoints: Microsoft Security Baselines Microsoft Baselines are included in…