Tag itsec

Log Management

This post explains the concept of log management and provides Description of Log Management A log is a registry produced by a device or application about its internal use. Logs are helpful for debugging or monitoring IT security. Log management…

HTTP Traffic Interception Tools

This post features HTTP traffic interception tools for performing penetration tests. List of HTTP Traffic Interception Tools HTTP traffic interception tools: Burp Proxy Burp Proxy is a tool contained within Burp Suite. Proprietary and freemium. It is developed by British…

Zero Trust Security

A key concept of zero trust security is that it assess security dynamically. Zero Trust Network (ZTN) Zero Trust Architecture (ZTA) Zero Trust Network Access (ZTNA) is an IT security solution that provides secure remote access to an organization’s applications,…

Spain Public Cybersecurity Organizations

This post lists some public cybersecurity organization of Spain. List of Public Cybersecurity Organizations in Spain Los organismos públicos se pueden dividir por su territorialidad: Organismos públicos estatales Organismos públicos estatales relacionados con la seguridad de la información en España:…