Infographics
 |
10 biggest threats for 2030
Source: ENISA
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
should be applied to all digital resources, including identities, endpoints, networks, data, applications and infrastructure. Zero-trust architecture is a complex strateg... viac...
Source: it.portal
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... viac...
show all
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
show all
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov show link
Vyhláška Národného bezpečnostného úradu o priemyselnej bezpečnosti a o bezpečnostnom projekte podnikateľa show link
show all
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
viac...
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|