Infographics
 |
Implemented specialized training in the field of cyber security
Source: Enisa
|
|
To ale neznamená, že sú jediné
Source: Uptime Institute
|
To ale neznamená, že sú jediné
Source: Google Maps
|
|
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
▪ The affected entities must register an overview of subcontractors ▪ Subcontractors are obliged to report security incidents ▪ The obligation of the affected ent... viac...
show all
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... viac...
Japonská agentúra pre vesmírny prieskum (JAXA) tento týždeň informovala, že toto leto zaznamenala kybernetický incident, ktorý pramenil z narušenia Microsoft Active Direc... viac...
show all
Reduce the amount of information you provide about yourself in Internet service settings. Carefully consider what personal information you include on your profile. Choose... viac...
Source: KCCKB
show all
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|