Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
 
Archive | Cybersecurity RSS feed for this section

Information Security Ratings for Organizations

An information security rating is an objective, data-driven, quantifiable measurement of an organization’s overall information security performance. It is often referred as cybersecurity rating. This post summarizes information security rating agencies that can assess organizations. List of Information Security Ratings for Organizations List: Black Kite BitSight CYRATING iTrust Panorays RiskRecon SecurityScorecard LEET Security Black Kite https://blackkite.com/technical-grade/ USA […]

Comments { 0 }

Methods to assess the Information Security of a Third Party

This post lists methods to assess the Information Security of an organization that acts as a third party for another one (e.g., a provider). This third parties are often referred as 3PL, that is an acronym for third-party logistics. Methods to assess the Information Security of a Third Party List of methods to assess the […]

Comments { 0 }

Information Security Certifications for Organizations

This post summarizes some certifications for organizations (and not for individuals or professionals) related somehow to information security or cybersecurity.   List of Information Security Certifications for Organizations Information Security Certifications for Organizations featured on this post: ISO/IEC 27001 ISO/IEC 27701 ISO/IEC 15408 ISO 22301 SOC 2 Type 2 STAR ENS ISO/IEC 27001 ISO/IEC 27001 […]

Comments { 0 }

USA Government Cybersecurity Organizations

This post summarizes organizations related to the Government of the United States of America (USA) that are related to information security or cybersecurity. List of USA Government Cybersecurity Organizations Non-exhaustive list of USA Government organizations related to cybersecurity: NIST CSRC CISA NSA/CSS NIST CSRC NIST (National Institute of Standards and Technology). NIST CSRC (Computer Security […]

Comments { 0 }

European Union Cybersecurity Organizations

This post summarizes organizations within or close to European Union (EU) that are related to information security or cybersecurity. List of European Union Cybersecurity Public Organizations Non-exhaustive list of European Union Cybersecurity Public Organizations: European Commission ENISA ECCC European Commission The European Commission is the European Union politically independent executive arm. It designed a EU […]

Comments { 0 }

Cyber Security Incident Response

A Computer Emergency Response Team (CERT) is a group of experts that handles computer security incidents. The term CSIRT, as an acronym for Computer Security Incident Response Team or Cyber Security Incident Response Team is also used. As computer threads started to appeared after the development of the internet on the late 80s, there was […]

Comments { 0 }

Secure Development Frameworks

This post lists some secure development frameworks. Secure Development Frameworks List of Secure Development Frameworks: Secure Software Development Framework (SSDF) OWASP Security Knowledge Framework (OWASP-SKF) SEI CERT Coding Standards Secure Software Development Framework (SSDF) https://owasp.org/www-project-security-knowledge-framework/ SSDF is issued by NIST. OWASP Security Knowledge Framework (OWASP-SKF) https://owasp.org/www-project-security-knowledge-framework/ OWASP Security Knowledge Framework (OWASP-SKF) is issued by OWASP. […]

Comments { 0 }

Cloud Security for Microsoft 365

This post adds some comments on cloud security for Microsoft 365. Cloud Security for Microsoft 365 Products related to Microsoft 365 security: Microsoft 365 Defender Microsoft Secure Score Microsoft Secure Score Microsoft Secure Score is a Microsoft product that measures the organization’s security posture regarding specific Microsoft 365 products and displays the results on a […]

Comments { 0 }

How to perform an IT Risk Assessment

This post tries to make an overview about how to perform a risk assessment of information technology (IT) assets. Steps to perform an IT risk assessment The summary of steps to be done are: Define scope Select a risk assessment methodology Identify asset types Identify threats Identify vulnerabilities List controls Assign controls to threats Identify […]

Comments { 0 }

ISO/IEC 27000-series

The ISO/IEC 27000-series is a set of standards related to information security and publish by ISO and IEC. It provides recommendations on information security, in the context of a Information Security Management System (ISMS). Standards included on ISO/IEC 27000-series As of 2022, there are 63 different standards belonging to ISO/IEC 27000-series. All of them start […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional