Referencias a bibliotecas de Software Libre
y Seguridad Informática
Noticias de TI
Diseñando y creando alternativas
En este sitio encontrarás
Referencias a herramientas alternativas, la utilización de Software Libre, así como sus implicaciones en la seguridad de TI.
Gran cantidad de información, documentos técnicos y ebooks de Seguridad Informática.
Este sitio esta en constante desarrollo.
Software Libre / Seguridad TI
Una alternativa para el futuro inmediato
Misión
Dar a conocer las herramientas y ligas de software libre, de código abierto en el mercado internacional, tomando en cuenta siempre las estrategias de seguridad informática
Visión
Crear una biblioteca de ligas de referencias, y aplicativos de software libre para el back-end y front-end. Tendencia y criterios para la aplicación de la seguridad en TI
Proyectos
- Software Libre
- Seguridad informatica
- Prospectiva Tecnològica
Los proyectos que seguimos son relacionados con la utilización del software libre y de código abierto en el ambiente de los servidores y escritorio de los usuarios.
Proyectos que tiene por objetivo estudiar la seguridad informática en todo su amplia espectro
Espacio designado a los eventos de investigación y desarrollo de la nuevas tecnologías de la informática
¿ Qué hacemos ?
Blogs, notas y ligas sobre SL y Seguridad en Sistemas de TI
01 Seguridad en TI
Criterios y normas para la seguridad de TI
02 Herramientas de Desarrollo y Diseño
EL mundo del SL enfocado al desarrollo de sistemas y el uso del día a día en escritorio
03 Prospectiva tecnológica
Tendencias de la industria de TI
Este sitio no es de fines de lucro y solo persigue ser útil para ti
Ligas a Tecnologías de información y a la Seguridad Informática
(ligas dinámicas)
OpenSource
- New developments at Opensource.com junio 6, 2023
- Tips for running virtual, in-person, and hybrid events mayo 3, 2023
- Generate web pages from Markdown with Docsify-This mayo 2, 2023
- 3 reasons to host a docathon for your open source project abril 28, 2023
- How I used guilt as a motivator for good abril 28, 2023
- 3 key open source challenges in developing countries abril 27, 2023
- Run a virtual conference using only open source tools abril 27, 2023
- 5 open ways to help UX designers and developers collaborate better abril 26, 2023
- Test your Drupal website with Cypress abril 26, 2023
- What's new in GNOME 44? abril 25, 2023
CIO readers
- 인터뷰 | 탈레스 웨이 후이 세일즈 총괄 “현 암호체계의 종말 앞당기는 양자컴퓨터, 보안업계 패러다임 전환 시급” enero 20, 2025
- 라온시큐어, 개인용 모바일 백신 앱에 ‘딥페이크 탐지 기능’ 추가 enero 20, 2025
- 빠른 ROI와 혁신 사이의 선택?·· 두 ‘AI 목표’ 모두 잡아라 enero 20, 2025
- “기업 70%, 취약점 패치 빈도 낮아 위협에 노출” S&P 조사 enero 20, 2025
- 스켈터랩스, 자체 개발 sLLM으로 경찰청 AI 조서 작성 지원 enero 20, 2025
- “美 안보·지속가능 인프라, 英 인재·데이터”··· 지정학적 환경에 맞춰 진화하는 AI 전략 enero 20, 2025
- 레노버, 스토리지 스타트업 인피니닷 인수 “하이엔드 포트폴리오 확장” enero 20, 2025
- “소매·소비자 기업 AI 지출, 2025년 매출의 3.32% 이를 것” IBM 보고서 enero 20, 2025
- Qué deberían saber los directores de Recursos Humanos este 2025 enero 17, 2025
- La IA conquista el sector de la energía y los servicios públicos enero 17, 2025
Center for Strategic and International Studies (CSIS)
- Positioning the Navy for Cyber Warfare abril 5, 2010
- ICANN and the Internet Ecosystem enero 27, 2010
- Security, Cloud Computing and the Coming Mobile Environment diciembre 3, 2009
- Information Dominance: The Navy's Initiative to Maintain the Competitive Advantage in the Information Age octubre 1, 2009
- Statesmen's Forum: Deputy Secretary of Defense William J. Lynn III junio 15, 2009
- Cybersecurity Policy Review with Melissa Hathaway, Cybersecurity Chief at the National Security Council junio 12, 2009
networkcomputing
- A Deep Dive on Nvidia’s Agentic AI enero 16, 2025
- How DPUs Make Collaboration Between AppDev and NetOps Essential enero 15, 2025
- What Eutelsat's 2-Day Outage Says About LEO Satellite Service Resiliency enero 10, 2025
- Your Network is the Key to Surviving AI enero 9, 2025
- NaaS: A New Way to Think About Networks enero 8, 2025
- Buy or Build: Commercial Versus DIY Network Automation enero 7, 2025
- A New Administration and a New Direction for Networks enero 6, 2025
- The Network Metrics That Really Matter enero 3, 2025
- Wi-Fi 7: The State of the Market enero 2, 2025
- Tensions Rise with Suspicious European Subsea Cable Cuts diciembre 31, 2024
The Hacker News
- Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP enero 20, 2025
- TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025 enero 19, 2025
- U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Salt Typhoon enero 18, 2025
- Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation enero 17, 2025
- Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation enero 17, 2025
- How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal? enero 17, 2025
- U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs enero 17, 2025
- New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass enero 17, 2025
- European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China enero 17, 2025
- Russian Star Blizzard Targets WhatsApp Accounts in New Spear-Phishing Campaign enero 16, 2025
darkreading
- Has the TikTok Ban Already Backfired on US Cybersecurity? enero 17, 2025
- Employees Enter Sensitive Data Into GenAI Prompts Far Too Often enero 17, 2025
- 15K Fortinet Device Configs Leaked to the Dark Web enero 17, 2025
- US Sanctions Chinese Hacker & Firm for Treasury, Critical Infrastructure Breaches enero 17, 2025
- Leveraging Behavioral Insights to Counter LLM-Enabled Hacking enero 17, 2025
- Russian APT Phishes Kazakh Gov't for Strategic Intel enero 17, 2025
- Biden's Cybersecurity EO Leaves Trump a Comprehensive Blueprint for Defense enero 16, 2025
- 183M Patient Records Exposed: Fortified Health Security Releases 2025 Healthcare Cybersecurity Report enero 16, 2025
- Karl Triebes Joins Ivanti as Chief Product Officer enero 16, 2025
- CISA and US and International Partners Publish Guidance for OT Owners and Operators enero 16, 2025
IT Bookstore
- [Free eBook] Azure Bot Service Succinctly junio 6, 2023
- [Free eBook] The Official Raspberry Pi Handbook 2023 junio 6, 2023
- [Free eBook] Contemporary Mathematics junio 6, 2023
- [Free eBook] Learning Bosun junio 6, 2023
- Spring 6 Recipes, 5th Edition junio 6, 2023
- [Free eBook] Ernst Denert Award for Software Engineering 2019 junio 6, 2023
- Quantitative User Experience Research junio 6, 2023
- Introduction to Software Testing junio 6, 2023
- Programming for Absolute Beginners junio 6, 2023
- Firewalls Don't Stop Dragons, 5th Edition junio 6, 2023
Cybersecurity Insights
- NIST’s International Cybersecurity and Privacy Engagement Update – New Translations diciembre 19, 2024
- Data Pipeline Challenges of Privacy-Preserving Federated Learning diciembre 5, 2024
- Kicking-Off with a December 4th Workshop, NIST is Revisiting and Revising Foundational Cybersecurity Activities for IoT Device Manufacturers, NIST IR 8259! noviembre 21, 2024
- Unlocking Cybersecurity Talent: The Power of Apprenticeships noviembre 18, 2024
- Digital Identities: Getting to Know the Verifiable Digital Credential Ecosystem noviembre 13, 2024
- Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024 octubre 28, 2024
- Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024 octubre 23, 2024
- IoT Assignment Completed! Report on Barriers to U.S. IoT Adoption octubre 22, 2024
- Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024 octubre 17, 2024
- Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024 octubre 15, 2024
INCYBER NEWS
- How moderators can legally manage harmful content and online hate enero 15, 2025
- Data protection and privacy in data-driven policing enero 15, 2025
- Cyber maturity to protect investment and ensure profitability enero 14, 2025
- The United States blacklists Chinese digital identity champions enero 13, 2025
- Cybercriminals put a massive geolocation data file up for sale enero 13, 2025
- The United States launches a security label for connected devices enero 13, 2025
- NIS2: Who stands to gain? enero 13, 2025
- Investigation: the healthcare sector facing cyber risks enero 9, 2025
- Chinese Cyberattacks on Taiwan Doubled in 2024 enero 9, 2025
- The United States Restricts Data Flows to “Concerning” Countries enero 9, 2025
SANS Internet Storm Center, InfoCON: green
- ISC Stormcast For Monday, January 20th, 2025 https://isc.sans.edu/podcastdetail/9286, (Mon, Jan 20th) enero 20, 2025
- Zero Trust and Entra ID Conditional Access, (Sun, Jan 19th) enero 19, 2025
- New tool: immutable.py, (Sat, Jan 18th) enero 18, 2025
- Leveraging Honeypot Data for Offensive Security Operations [Guest Diary], (Fri, Jan 17th) enero 17, 2025
- ISC Stormcast For Friday, January 17th, 2025 https://isc.sans.edu/podcastdetail/9284, (Fri, Jan 17th) enero 17, 2025
- Extracting Practical Observations from Impractical Datasets, (Thu, Jan 16th) enero 16, 2025
- The Curious Case of a 12-Year-Old Netgear Router Vulnerability, (Wed, Jan 15th) enero 15, 2025
- Microsoft January 2025 Patch Tuesday, (Tue, Jan 14th) enero 14, 2025
- ISC Stormcast For Tuesday, January 14th, 2025 https://isc.sans.edu/podcastdetail/9278, (Mon, Jan 13th) enero 13, 2025
- Hikvision Password Reset Brute Forcing, (Mon, Jan 13th) enero 13, 2025
Oracle updates Exadata systems to speed database operations | Network World
- Oracle updates Exadata systems to speed database operations enero 17, 2025
- Lenovo to acquire Infinidat to expand its storage folio enero 17, 2025
- Biden’s clean AI infrastructure plan could be hanging by a thread enero 17, 2025
- SASE 2025: Impact grows despite adoption hurdles enero 16, 2025
- Nile dials-up AI to simplify network provisioning, operation enero 16, 2025
- Network convergence will drive enterprise 6G wireless strategies enero 16, 2025
- From Safety to Accountability: The Game-Changing Impact of Kazakhstan’s Surveillance System enero 16, 2025
- Qualcomm purloins Intel’s chief Xeon designer with eyes toward data center development enero 15, 2025
- Cisco offers AI application visibility, access control, threat defense enero 15, 2025
- A CSO’s perspective: 8 cyber predictions for 2025 enero 14, 2025
How organizations can secure their AI code | CSO Online
- How organizations can secure their AI code enero 20, 2025
- Midsize firms universally behind in slog toward DORA compliance enero 20, 2025
- Diese Security-Technologien haben ausgedient enero 20, 2025
- Secure AI? Dream on, says AI red team enero 18, 2025
- US hits back against China’s Salt Typhoon group enero 17, 2025
- DORA-Umsetzung hält Banken-CISOs auf Trab enero 17, 2025
- Poor patching regime is opening businesses to serious problems enero 17, 2025
- EU’s DORA could further strain cybersecurity skills gap enero 17, 2025
- Was ist ein Payload? enero 17, 2025
- Millions of tunneling hosts are vulnerable to spoofing, DDoS attacks, say researchers enero 17, 2025
Presencia del SL
Odin Mojica Ramírez y Jorge Díaz Lara dicen:
“…Es importante destacar que el software sólo es un medio que nos ayuda a cumplir un fin, sea cual sea, y para ello se usan ciertas herramientas que ya han sido diseñadas y que permiten satisfacer esa necesidad en específico. Al tener acceso al código, entramos a un mundo de conocimiento compartido, donde el acto de colaborar y compartir es la base de los aportes…”
El camino asi es