Tag list

Information Security Controls

This post summarizes information security or cybersecurity control inventories. List of Information Security Control Catalogues Information Security Control Catalogues: ISO/IEC 27002 ISO/IEC 27002 is officially titled “Information security, cybersecurity and privacy protection — Information security controls”, but it can be…

IT Threat Intelligence Websites

This post lists some websites that allows to assess suspicious IPs and provide other threat intelligence information. List of Threat Intelligence Websites List of threat intelligence websites: Awesome Threat Intelligence Awesome Threat Intelligence is a list of resources about threat…

Web Search Engines

This post offers a list of popular web search engines. According to Statcounter, as of 2020 Google dominate search engine market with a 82% in desktop computers and 95% on mobile phones. Some initiatives like the lobby FairSearch try to…

VPN Protocols

This post summarizes the most common Virtual Private Network (VPN) protocols. List of VPN Protocols VPN (Virtual Private Network) protocols: RADIUS AAA protocol can also establish a VPN. PPTP Deprecated Point to Point Tunneling Protocol (PPTP) is a legacy solution,…

Certifications for Windows Security Administration

This post lists some professional certifications for administration of Windows operating systems. List of certifications for Windows administration: Microsoft Certified: Security Operations Analyst GIAC’s GCWN Microsoft 365 Certified: Security Administrator Associate Microsoft 365 Certified: Modern Desktop Administration Associate List of…

Application Virtualization

This post explains some aspects of application virtualization. This is part of a series of article about virtualization. Application Virtualization Software Products Software Virtualization Software Products: Citrix Virtual Apps Citrix Virtual Apps, formerly known as Citrix XenApp, allows users to…