Infographics
 |
10 biggest threats for 2030
Source: ENISA
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a set of policies and procedures for the systematic management of an organization's sensitive data
is the organization's ability to react and recover from an event that negatively affected the company's operations
show all
Japonská automobilka Nissan vyšetruje kybernetický útok, ktorý sa zameral na jej systémy v Austrálii a na Novom Zélande, čo mohlo hackerom umožniť prístup k osobným infor... viac...
show all
we have a Firewall so I am safe from attacks
Source: it-portal.sk
show all
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti show link
Vyhláška Ministerstva vnútra Slovenskej republiky, ktorou sa mení a dopĺňa vyhláška Ministerstva vnútra Slovenskej republiky č. 94/2004 Z. z., ktorou sa ustanovujú techni... viac...
show link
show all
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|