This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
▪ Subject - private or public organization ▪ if at the same time ▪ provides at least one service listed in the annexes of the directive and at the same time ▪... viac...
is a proactive approach to security across all layers of the digital space where every transaction is continuously verified. It uses the rule of least privilege and relie... viac...
Japonská automobilka Nissan vyšetruje kybernetický útok, ktorý sa zameral na jej systémy v Austrálii a na Novom Zélande, čo mohlo hackerom umožniť prístup k osobným infor... viac...
viac ako 80 000 sledovacích kamier Hikvision na svete bolo v roku 2022 bolo zraniteľných prienikom k riadiacim príkazom.
Hikvision – je skratka pre Hangzhou Hikvisio... viac...
▪ The complexity of the IT infrastructure ▪ Cyber attacks ▪ Reactive threat management ▪ Gaps in security skills ▪ Challenges in the field of regulation... viac...
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1... viac...