This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
is a system of measures to protect classified information from unauthorized persons and from unauthorized manipulation in objects and protected spaces.
is one of the fastest ways to identify weak points in information systems before a cyber attacker finds them. The scanner is software that generates a detailed report on ... viac...
▪ The complexity of the IT infrastructure ▪ Cyber attacks ▪ Reactive threat management ▪ Gaps in security skills ▪ Challenges in the field of regulation... viac...
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1