Tag list

Software Testing Frameworks

This post features software testing frameworks or software testing tools. Keyword Driven Testing (KDT) To check software testing tools focused on information security, you can read more about: Do not confuse software testing tools with automation software like browser automation…

Data Privacy Standards

Data privacy standards featured on this post: ISO/IEC DIS 27701 ISO/IEC 27701 is an extension to ISO/IEC 27001 and 27002 (both about creating and maintaining an ISMS) that focuses on privacy. Version history: ISO/IEC DIS 27018 ISO/IEC DIS 27018 is…

Copyleft Software Licenses

Copyleft licenses are also known as reciprocate, share-alike or restrictive licenses. These licenses allow you to modify the licensed code and distribute new works based on it, as long as you distribute any new works or adaptations under the same…

Permissive Software Licenses

Permissive licenses are also known as BSD-style or Apache-style licenses. They contain minimal requirements about how the software can be modified or redistributed, clauses that are not existent in public domain or public domain equivalent licenses.. Permissive licenses are more…

HTTP Traffic Interception Tools

This post features HTTP traffic interception tools for performing penetration tests. List of HTTP Traffic Interception Tools HTTP traffic interception tools: Burp Proxy Burp Proxy is a tool contained within Burp Suite. Proprietary and freemium. It is developed by British…

Risk Management Frameworks

This post features some general-purpose risk management frameworks. For risk management frameworks specific for IT, please check this post. List of Risk Management Frameworks Risk management frameworks featured on this post: ISO 31000 ISO 31000 is a framework for risk…

IT Security Threat Modeling

Threat modeling is the process of identifying, analyzing and categorizing threats. List of Cybersecurity Threat Models Cybersecurity Threat Models featured on this post: The most popular is MITTRE ATT&CK. MITRE ATT&CK MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) Matrix is…