Technologies
More information, which may be usefull to you, may be found after login at it-portal.sk
|
are tools for collecting and continuously evaluating cyber security events
Source: it.portal
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
show all
Japonská agentúra pre vesmírny prieskum (JAXA) tento týždeň informovala, že toto leto zaznamenala kybernetický incident, ktorý pramenil z narušenia Microsoft Active Direc... viac...
show all
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
show all
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti show link
Zákon o elektronických komunikáciách show link
show all
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|