Cybersecurity News Sources from Spain

This post lists sources that broadcast news about information security and cybersecurity. List of Cybersecurity News Webs from Spain Cybersecurity News Web from Spain: RedSeguridad Official web Revista SIC Official web Ciberseguridad TIC Official web Securtecnia Official web CyberSecurityNews.es Official…

Zero Trust Security

A key concept of zero trust security is that it assess security dynamically. Zero Trust Network (ZTN) Zero Trust Architecture (ZTA) Zero Trust Network Access (ZTNA) is an IT security solution that provides secure remote access to an organization’s applications,…

Network Access Control

Network Access Control (NAC) is a security solution that enforces policy on devices that access networks to increase network visibility and reduce risk. NAC’s posturing capability determines if a system is sufficiently secure and compliant enough to connect to a…

Linux Desktop Environments

This post summarizes the main free and open-source (FOSS) desktop environments for Unix-like and Linux OSs. List of Linux Desktop Environments List of Linux desktop environments: The most popular are KDE Plasma and GNOME. Common Desktop Environment (CDE) Common Desktop…

Email Protocols

This post presents some aspects related to electronic mail (email or e-mail) protocols. Email Operational Protocols STMP An open relay is an insecure SMTP server that does not authenticate sneders before accepting and relaying email and are typically quickly exploited…

Transport OSI Layer Protocols

This post summarizes transport layer protocols. List of Transport Layer Protocols Transport Layer Protocols: TCP and UDP are the main transport protocols of the TCP/IP framework. You can find a list of popular TCP and UDP ports on this post.…

Free Art for Video Games

Take into account that while it may be free as in “gratis”, its use may be restricted by its license. For example, a CC-by is free of use, but if you use this artwork you need to explicitly specify the…