Technologies
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a procedure that determines the probability that an undesirable event will occur and what its consequences will be
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... viac...
show all
Japonská agentúra pre vesmírny prieskum (JAXA) tento týždeň informovala, že toto leto zaznamenala kybernetický incident, ktorý pramenil z narušenia Microsoft Active Direc... viac...
show all
bezpečnosťou sa nemusím zaoberať ak môj počítač nie je pripojený do siete alebo na internet
Source: it-portal.sk
▪ The complexity of the IT infrastructure ▪ Cyber attacks ▪ Reactive threat management ▪ Gaps in security skills ▪ Challenges in the field of regulation... viac...
Source: it.portal
show all
National Office for Cyber and Information Security show link
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
Zákon, ktorým sa mení a dopĺňa zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov a ktorým sa menia a... viac...
show link
Zákon o elektronických komunikáciách show link
show all
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Uptime Institute
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|