This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
it-security
FORUM
HOME
BLOG
LOGIN
SK
CZ
EN
Technologies
CISCO
1 / 1
Check Point
show link
CISCO
Dell
show link
Documentary
nástroj na evidenciu štrukturovaných informácií...
show link
ESET
show link
Fortinet
show link
Mikrotik
show link
OpenVPN
show link
pfSense
show link
Supermicro
show link
Synology
show link
Ubiquiti
show link
WireGuard
show link
WOW
show link
Actual incidents
6
NÚKIB - Threats and vulnerabilities
show link
CERT-EU Threat intelligence
show link
show all
What is what in IT
68
Severity of risks
• extremely high
• high
• low
• negligible
Source: it.portal
Risk analysis - copy
je postup, pomocou ktorého sa zisťuje aká je pravdepodobnosť, že dôjde k nežiadúcej udalosti a aké budú jej dôsledky
show all
Interesting
22
57% of organizations expect to change their primary backup solution in 2023
Source: Veeam
95% of cyber problems are caused by user behavior itself
show link
Source: CheckPointResearch
show all
Recomendations
23
MYTH about cyber security - 03.
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
MYTH about cyber security - 05.
small or medium-sized companies are not targets for hacker attacks
Source: it-portal.sk
show all
Institutions
9
NIST
National Institute of Standards and Technology
show link
CISA
Cybersecurity and Infrastructure Security Agency
show link
show all
Legislative
14
493/2022 Coll.
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti
show link
69/2018 Coll.
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov
show link
show all
Norms
25
ISO/IEC TR 27016:2014
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
ISO/IEC TS 27008:2019
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
show all
Technologies
14
Synology
show link
Documentary
nástroj na evidenciu štrukturovaných informácií...
show link
show all
Infographics
7
Certified data centers in the given territory of Europe (309)
Source: Uptime Institute
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
show all
Events
1
MWC Barcelona 2024
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel...
viac...
show link
Certifications
0
Acreditations
0
Media
8
Criminals play with digital vulnerabilities. Don't be fooled
show link
Source: Pravda
We know that. Social engineering builds an attack on these pillars
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2025
Cookies
|
Privacy policy
|
Terms of use