Tag security

Identity and Access Management

Identity and Access Management (IAM) is one of the basics of information security. Concepts related to Authentication Continuous authentication Monitors user behavior continuously to ensure that the authenticated user remains the same throughout a session. Risk-based authentication analyzes user behavior…

Cybersecurity News Sources from Spain

This post lists sources that broadcast news about information security and cybersecurity. List of Cybersecurity News Webs from Spain Cybersecurity News Web from Spain: RedSeguridad Official web Revista SIC Official web Ciberseguridad TIC Official web Securtecnia Official web CyberSecurityNews.es Official…

Zero Trust Security

A key concept of zero trust security is that it assess security dynamically. Zero Trust Network (ZTN) Zero Trust Architecture (ZTA) Zero Trust Network Access (ZTNA) is an IT security solution that provides secure remote access to an organization’s applications,…

Network Access Control

Network Access Control (NAC) is a security solution that enforces policy on devices that access networks to increase network visibility and reduce risk. NAC’s posturing capability determines if a system is sufficiently secure and compliant enough to connect to a…

Email Protocols

This post presents some aspects related to electronic mail (email or e-mail) protocols. Email Operational Protocols POP3 Post Office Protocol 3 (POP3) is considered deprecated. IMAP Internet message access protocol (IMAP) SMTP An open relay is an insecure SMTP server…

IT Security Testing Frameworks

This post lists some information about security testing framework guides. You can read about penetration testing methodologies on this post. You can read about secure software development frameworks on this post. List of Security Testing Guide Security Testing Guides featured…

Capture the Flag Webs

This post summarizes some websites for capture the flag challenges or hackatons. List of Capture the Flag Webs Capture the flag webs featured on this post: HackTheBox Official website CTF365 Official website OverTheWire Official website HackingLab Official website External References