TARLOGIC's BLOG
Cybersecurity - Page 8
Cybersecurity articles with security analysis and ethical hacking technics information
Hardening of Windows systems: network authentication
Having professionals trained and involved with system hardening offers the possibility of having secure implementations and avoids misconfigurations[...]
Read moreSELinux importance for web hardening
Disabling this tool is still a common mistake. SELinux is a great help to do hardening How important can SELinux be? Can you imagine being in this situation? «Monday, 8 in the mor[...]
Read moreDynamic Cybersecurity Risk Assessment
Constant changes in information systems and the emergence of new threats make it necessary to continuously update the risk status.[...]
Read moreSecurity healthiness as a risk metric of IT assets
Simple math for lots of tricky vulnerabilities. Measure the risk of IT assets in an agile way and take quick actions[...]
Read moreEvaluating WAF solutions
In this article, it is described a possible strategic approach to face the evaluation of WAF solutions.[...]
Read moreHardware hacking: chip-off for beginners
Introduction to hardware hacking Before getting our hands dirty with hardware hacking, let’s start with a brief introduction to flash memories, a component that we will find very[...]
Read moreIntroduction to Dynamic Cybersecurity Risk
Defining the correct risks levels to cyber assaults that any company is exposed is a priority of this time. We present the first of three articles that, together, represent the int[...]
Read moreSecurity in PRIME networks – Current status
Since January 2019, all electricity meters for low power customers (up to 15 kW) in Spain are (or have been replaced by) smart electricity meters, allowing distributors to carry ou[...]
Read moreLoRaWAN 1.0, vulnerabilities and backward compatibility in version 1.1
To understand the security improvements introduced in 1.1, it is necessary to have a thorough understanding of the security mechanisms described in LoRaWAN 1.0. LoRaWAN Security As[...]
Read moreCybersecurity in LoRa and LoRaWAN: Context and Background
Since the beginning of the 21st century, the concept of Internet of Things (IoT) has gradually evolved from the initial vague ideas related to the interconnection of everyday objec[...]
Read more