Category IT

Risk Management Frameworks

This post features some general-purpose risk management frameworks. For risk management frameworks specific for IT, please check this post. List of Risk Management Frameworks Risk management frameworks featured on this post: ISO 31000 ISO 31000 is a framework for risk…

IT Security Media

This post features some media or magazines related to IT security or cybersecurity. For the media specific to operational technology (OT) security, please check this post. Media related to IT Security Media related to cybersecurity: The Hacker News The Hacker…

Cybersecurity Threat Modeling

Threat modeling is the process of identifying, analyzing and categorizing threats. List of Cybersecurity Threat Models Cybersecurity Threat Models featured on this post: The most popular is MITTRE ATT&CK. MITRE ATT&CK MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) Matrix is…

IT Threat Intelligence

This post explores some aspects of threat intelligence in the context of IT security. Concepts related to IT Threat Intelligence Tactics, techniques and procedures are commonly referred as TTPs. IT Thread Modelling Thread modelling is a process by which potential…

Web-based IAM Protocols

This post contains web-based Identity and Access Management (IAM) protocols. OpenID allows to use an account from another service. List of Web-based IAM Protocols Web-based Many of these protocols are used in combination to achieve Single Sign-on (SSO) or federation.…

Introduction to C++

This post is an introduction to C++. C++ is an adaptation of C to the object-oriented paradigm. It was originally developed by Bjarne Stroustrup. C++ Versions and Standards There are different standard versions of C++. Each version is standardized through…

Information Security Compliance

This post explains the concept of information security compliance and related topics. Compliance is one of the three sub-areas covered in Information Security area of GRC (Governance, Risk and Compliance). Sources of IT Security Compliance Compliance comes from the following…

How to identify a Computer Font

This post provides resources to identify the name of a computer font given a text with a specific typeface. Webs for Font Identification List of webs for font identification: Identifont Whatfontis The Font Finder service is included in Whatfontis…

Quantum Computing

Quantum computing is the area of computing that takes advantage of quantum physics, i.e., the behavior of subatomic particles like electrons or photons, for computing. There are two principles that are exploited on quantum computing: The basic unit of quantum…