![](https://www.tarlogic.com/wp-content/themes/Avada-Child-Theme/images/cyber-for-all_s.webp)
Cyber for all - Page 12
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective
![How to use the NIST Cybersecurity Framework to combat ransomware attacks](https://www.tarlogic.com/wp-content/uploads/2022/07/NIST-3-1.jpg)
How to use the NIST Cybersecurity Framework to combat ransomware attacks
Throughout its history, mankind has created tools and devices of great technical value, but which did not find favor with the people, largely due to their lack of usability and pra[...]
Read more![NIST Cybersecurity Framework: A compass for navigating the ocean of cyber risks](https://www.tarlogic.com/wp-content/uploads/2022/07/NIST-2-1-1.jpg)
NIST Cybersecurity Framework: A compass for navigating the ocean of cyber risks
Throughout our lives, we are fortunate to have different mentors, who guide us through the inscrutable paths of destiny. Parents, grandparents, teachers, bosses, friends… The[...]
Read more![Demystifying Zero Trust](https://www.tarlogic.com/wp-content/uploads/2022/06/Zero-Trust-1-1.jpg)
Demystifying Zero Trust
When we are little, our parents and grandparents remind us over and over again never to trust strangers. We should never talk to people we don’t know, and certainly, never ge[...]
Read more![NIST Guidelines: a methodological underpinning for cybersecurity analysts](https://www.tarlogic.com/wp-content/uploads/2022/06/NIST-1-EN.jpg)
NIST Guidelines: a methodological underpinning for cybersecurity analysts
The National Institute of Standards and Technology (NIST) is a U.S. public organization dedicated to generating knowledge, developing resources, and organizing training programs in[...]
Read more![CVSS: Scoring IT Vulnerabilities](https://www.tarlogic.com/wp-content/uploads/2022/06/CVSS1.jpg)
CVSS: Scoring IT Vulnerabilities
From the moment we enter the education system, we are used to being evaluated. But evaluation is not limited to the educational sphere; we are evaluated in almost all areas of our [...]
Read more![OWASP: Top 10 Web Application Vulnerabilities](https://www.tarlogic.com/wp-content/uploads/2022/05/OWAS1-1.jpg)
OWASP: Top 10 Web Application Vulnerabilities
Web applications are part of our daily lives. We use and consult them at work and home, for information and entertainment. Their use has become so widespread that they have become [...]
Read more![Red Team: The power of offensive security](https://www.tarlogic.com/wp-content/uploads/2022/05/RT1-1.jpg)
Red Team: The power of offensive security
Red Team uses offensive security to help organizations detect vulnerabilities and protect against malicious attacks[...]
Read more![How to get the most out of the Internet using WiFi Planning](https://www.tarlogic.com/wp-content/uploads/2022/04/Wifi-planning.jpg)
How to get the most out of the Internet using WiFi Planning
Thanks to tools such as WiFi Planning, making the most of the network is within reach of any organization WiFi sustains the world. In just a few decades, this technology has comple[...]
Read more![A practical guide to understanding social engineering attacks](https://www.tarlogic.com/wp-content/uploads/2022/04/social-engineering-1.jpg)
A practical guide to understanding social engineering attacks
There are movie tunes that have become so widespread in the collective imagination that one can recognize them even if one has not seen the movie to which they belong. That is the [...]
Read more![PCI DSS security audit: don’t let your card be stolen](https://www.tarlogic.com/wp-content/uploads/2022/03/PCI-audit-1.jpg)
PCI DSS security audit: don’t let your card be stolen
The PCI DSS security audit is used to verify that technical security controls protect credit and debit cardholder data[...]
Read more