Tag list

Password Definition Standards

This post discusses about policies, standards or guidelines to establish secure passwords in an IT system. List of Password Definition Standards List of password generation standards: NIST 800-63B NIST 800-63B is titled “Digital Identity Guidelines“. Official web SANS SPT Password…

Windows 10 Hardening Guides

This post summarizes hardening guides, security baselines, guidelines or standards for Windows 10. List of Windows 10 Hardening Guides This section summarizes some guides, guidelines, recommendations or baselines to harden Windows 10 endpoints: Microsoft Security Baselines Microsoft Baselines are included in…

Tools to capture Computer Specs on Windows

This post summarizes some tools to capture computer specs on Windows. List of Tools to capture Computer Specs on Windows List of tools to capture computer specifications: I remind that they are only available for Windows. WinAudit Freeware WinAudit Freeware…

Tools for Credential Harvesting

This post lists some pentesting tools for Credential Harvesting. List of Tools for Credential Harvesting Tools for Credential Harvesting featured on this post. Mimikatz Mimikatz is software that performs leverage the Mimikatz exploit to extract passwords stored in memory on…

Resources for Cybersecurity Leaders

This post lists some useful resources for IT security or cybersecurity leaders, like Chief Information Security Officer (CISO). List of Bulletins for Cybersecurity Leaders Articles, insights, blogs or bulletins aims to cybersecurity leaders. Gartner for Cybersecurity Leaders McKinsey Cybersecurity…

Web Back End Frameworks

This post lists web back end frameworks. Web back end framework ease the tasks for the developer when working on back end scripting with languages like Java, Python or PHP. List of Web Back End Frameworks Web Back End Frameworks…