it

How to create a Chrome Extension

This post explains how to create an extension or add-on for Chrome or Chromium. Overview of Chrome Extension Creation Main steps to create a Chrome Extension: Developing a Chrome Extension This section explains how to develop a Chrome extension. Components…

Firewall

This post is an introduction to network firewalls (FW). Firewalls should be complemented with other controls like antivirus scanners, data loss prevention (DLP) solutions and intrusion detection system (IDS) tools. Types of Firewall Firewall classification criteria: Types of Firewall by…

Information Security Policy Frameworks

This post provides resources to create Information Security policies, standards, procedures and guidelines. Documenting IT Security Policy Frameworks IT Security Policy Framework Document Types IT security policy framework documents: Policy Policies would be like the constitution, while procedures are the…

IT Crime Regulations

This post discusses some aspects related to IT or computer crime. The post focuses on regulations that prosecute malicious behavior related to computers or IT. If you want to read more about regulations concerning IT security focused on the implementation…

OT Security Frameworks

This post features some operational technology (OT) security frameworks and standards. List of OT Security Frameworks and Standards OT Security frameworks and standards that are featured on this post: ISA/IEC 62443 ISA/IEC 62443, sometimes referred as ISA 62443 or IEC…