Tag security

IT Vulnerability Databases

This post includes a list of  public resources (e.g., databases) for vulnerability research. It also features some well-known sites that are no longer available. CVE Common Vulnerabilities and Exposure (CVE) is managed by MITRE. CVE is funded by the USA…

Types of Wi-Fi Connections

Encryption algorithms: Encryption protocols: Wi-Fi security modes: Authentication options supported by WPA, WPA2 and WPA3: PSK is the use of a static fixed password or authentication. ENT enables the leveraging of and existing AAA (Authentication, Authorization and Accounting) service to…

ISACA Cybersecurity Nexus

Cybersecurity Nexus (CSX) is a training and credentialing program related to cybersecurity and develop by the professional association ISACA. It consists of a series of certificates: CSX Fundamentals (CSX-F) Certificate CSX Foundations Certificate, is awarded automatically when the candidate achieves:…