Technologies
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a service to provide server performance and disk space for customer applications.
Source: it-portal.sk
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
show all
Japonská automobilka Nissan vyšetruje kybernetický útok, ktorý sa zameral na jej systémy v Austrálii a na Novom Zélande, čo mohlo hackerom umožniť prístup k osobným infor... viac...
show all
používam HTTPS, takže moja stránka je bezpečná
Source: it-portal.sk
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
show all
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical ... viac...
Source: ISO
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
viac...
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|