This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
▪ The complexity of the IT infrastructure ▪ Cyber attacks ▪ Reactive threat management ▪ Gaps in security skills ▪ Challenges in the field of regulation... viac...
Your computer, smartphone, Wi-Fi router and all IT devices must always have the latest versions of operating system updates and patches installed. This also applies t... viac...
Vyhláška Ministerstva vnútra Slovenskej republiky, ktorou sa mení a dopĺňa vyhláška Ministerstva vnútra Slovenskej republiky č. 94/2004 Z. z., ktorou sa ustanovujú techni... viac...show link
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1