Institutions
 |
NIST
National Institute of Standards and Technology
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a type of malware that locks up a computer system, or encrypts the data stored on it, and then demands a ransom to regain access
▪ Energetics ▪ Transport ▪ Banking and infrastructure of financial markets ▪ Healthcare ▪ Drinking and waste water ▪ Digital infrastructures ▪ Pro... viac...
show all
Source: CheckPoint Research
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... viac...
show all
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
show all
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|