Cyber for all - Page 11

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Google MASA: What are the security requirements for apps?
Google MASA: What are the security requirements for apps?

Since the dawn of civilization, human beings have wanted to standardize the great technological advances they have generated. The Roman Empire extended its way of building roads, b[...]

Read more
Google MASA: Assessing the security of apps available in the Play Store
Google MASA: Assessing the security of apps available in the Play Store

A song starts playing on the radio. You like it and think «who could it be from?» You open your phone and download an app to recognize it for you. Then you download another app t[...]

Read more
How to use the NIST Cybersecurity Framework to combat ransomware attacks
How to use the NIST Cybersecurity Framework to combat ransomware attacks

Throughout its history, mankind has created tools and devices of great technical value, but which did not find favor with the people, largely due to their lack of usability and pra[...]

Read more
NIST Cybersecurity Framework: A compass for navigating the ocean of cyber risks
NIST Cybersecurity Framework: A compass for navigating the ocean of cyber risks

Throughout our lives, we are fortunate to have different mentors, who guide us through the inscrutable paths of destiny. Parents, grandparents, teachers, bosses, friends… The[...]

Read more
Demystifying Zero Trust
Demystifying Zero Trust

When we are little, our parents and grandparents remind us over and over again never to trust strangers. We should never talk to people we don’t know, and certainly, never ge[...]

Read more
NIST Guidelines: a methodological underpinning for cybersecurity analysts
NIST Guidelines: a methodological underpinning for cybersecurity analysts

The National Institute of Standards and Technology (NIST) is a U.S. public organization dedicated to generating knowledge, developing resources, and organizing training programs in[...]

Read more
CVSS: Scoring IT Vulnerabilities
CVSS: Scoring IT Vulnerabilities

From the moment we enter the education system, we are used to being evaluated. But evaluation is not limited to the educational sphere; we are evaluated in almost all areas of our [...]

Read more
OWASP: Top 10 Web Application Vulnerabilities
OWASP: Top 10 Web Application Vulnerabilities

Web applications are part of our daily lives. We use and consult them at work and home, for information and entertainment. Their use has become so widespread that they have become [...]

Read more
Red Team: The power of offensive security
Red Team: The power of offensive security

Red Team uses offensive security to help organizations detect vulnerabilities and protect against malicious attacks[...]

Read more
How to get the most out of the Internet using WiFi Planning
How to get the most out of the Internet using WiFi Planning

Thanks to tools such as WiFi Planning, making the most of the network is within reach of any organization WiFi sustains the world. In just a few decades, this technology has comple[...]

Read more
1 8 9 10 11 12 13 14