Technologies
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a data storage intended for their backup, which is separated from the production environment, which makes the data more securely stored. Before each further data stora... viac...
• Prieskum • Chobocina2 • Počiatočný prístup • Spustenie • Prístup k povereniam a eskalácia privilégií • Bočný pohyb • Zber a exfiltrácia • In... viac...
Source: it.portal
show all
Japonská agentúra pre vesmírny prieskum (JAXA) tento týždeň informovala, že toto leto zaznamenala kybernetický incident, ktorý pramenil z narušenia Microsoft Active Direc... viac...
show all
Reduce the amount of information you provide about yourself in Internet service settings. Carefully consider what personal information you include on your profile. Choose... viac...
Source: KCCKB
show all
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
Vyhláška Národného bezpečnostného úradu o priemyselnej bezpečnosti a o bezpečnostnom projekte podnikateľa show link
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti show link
show all
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
Certifications
|
0 |
Acreditations
|
0 |
Contact us by e-mail
|