Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
Tag Archives | data

Information Security Certifications for Organizations

This post summarizes some certifications for organizations (and not for individuals or professionals) related somehow to information security or cybersecurity.   List of Information Security Certifications for Organizations Information Security Certifications for Organizations featured on this post: ISO/IEC 27001 ISO/IEC 27701 ISO/IEC 15408 ISO 22301 SOC 2 Type 2 STAR ENS ISO/IEC 27001 ISO/IEC 27001 […]

Comments { 0 }

Data Centers

A data processing center (DPC) or data center is a building, a dedicated space within a building, or a group of buildings used to house computer systems and associated components, such as telecommunications and storage systems. Data center certifications ANSI TIA-942 is a certification issued by ANSI. You can find more information about this certification […]

Comments { 0 }


The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card schemes. PCI DSS applies for: Online payments Point-of-Sales etc. SAQ = Self-Assessment Questionnaire  PCI DSS establish different types of SAQs, depending on security level. SAQ-A SAQ-B Etc. Qualified Security Assessor […]

Comments { 0 }

Data Roles

This post summarizes the roles involved in managing data in IT systems, according to USA’s NIST SP 800-18 Rev. 1 “Guide for Developing Security Plans for Federal Information Systems” or European Union’s General Data Protection Regulation (GDPR). This data roles are questioned in CISSP exam, corresponding to CISSP Domain 2.   Data Roles The roles […]

Comments { 0 }

Fingerprint Recognition

Fingerprint recognition needs to steps: Fingerprint registration Fingerprint authentication During fingerprint registration, the fingerprint image(s) are converted into what is called Fingerprints Minutiae Data (FMD). FMD is saved into the database, not the fingerprint image itself. During fingerprint authentication, fingerprint image is converted into FMD. Aftewards, the registered FMD and the recently obtained FMD are […]

Comments { 0 }

Resources for Vulnerability Research

This post includes a list of  public resources (e.g., databases) for vulnerability research. It also features some well-known sites that are no longer available. List of resources for Vulnerability Research These are the resources listed on this post: Common Vulnerabilities and Exposure (CVE) Exploit Database SecurityFocus National Vulnerability Database (NVD) Common Vulnerability Scoring System (CVSS) […]

Comments { 0 }

Removing Linux from a computer with Windows 10

Let’s say you have a computer that have Windows 10 as its default operating system (OS). Then you manage to install a Linux distribution (e.g., Ubuntu) alongside Windows 10. But then you change your mind and you want to restore the system as it was, only with Windows 10, removing Linux and the multi-OS selector […]

Comments { 0 }

How to extract data from Power BI to generate a report

This post is about how to extract data from Power BI to generate a report. So far, I have read of two options. Unfortunately, I have not tested myself none of them. 1. Use DAX Studio tool DAX Studio is available to download from this link   2. Extract to R Another possibility is […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional