IT Crime Regulations

This post discusses some aspects related to IT or computer crime. The post focuses on regulations that prosecute malicious behavior related to computers or IT. If you want to read more about regulations concerning IT security focused on the implementation…

OT Security Conventions

This post features some operational technology (OT) Security conventions. It is part of the main post about OT Security. List of OT Security Conventions OT Security Conventions: Official link IIoT World ICS Cybersecurity Day IIoT World ICS Cybersecurity Day is…

OT Security Frameworks

This post features some operational technology (OT) security frameworks and standards. List of OT Security Frameworks and Standards OT Security frameworks and standards that are featured on this post: ISA/IEC 62443 ISA/IEC 62443, sometimes referred as ISA 62443 or IEC…

System Virtualization

This post is an introduction to system virtualization. It is part of a series of articles about virtualization. Description of System Virtualization System virtualization implies that a system (such as an operating system is virtualized). Because it was the first…

Cloud Service Modules

This post features cloud service modules. List of Cloud Service Modules Cloud service modules featured on this post: Storage Archive Storage Amazon S3 Glacier Amazon S3 Glacier classes website Azure Archive Storage Azure Archive Storage Google Storage Coldline and Archive…

OT Security

Operational technologies (OT) are hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events.. You can read an introduction to OT on this post. OT Security (OT-Sec), Industrial…