Infographics
 |
Implemented specialized training in the field of cyber security
Source: Enisa
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is an attack on a web server by which the attacker overwhelms the server with a large number of requests from different places and thus blocks it.
should be applied to all digital resources, including identities, endpoints, networks, data, applications and infrastructure. Zero-trust architecture is a complex strateg... viac...
Source: it.portal
show all
Japonská automobilka Nissan vyšetruje kybernetický útok, ktorý sa zameral na jej systémy v Austrálii a na Novom Zélande, čo mohlo hackerom umožniť prístup k osobným infor... viac...
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... viac...
show all
používam HTTPS, takže moja stránka je bezpečná
Source: it-portal.sk
show all
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov show link
Zákon o elektronických komunikáciách show link
show all
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|