Technologies
nástroj na evidenciu štrukturovaných informácií... show link
|
|
|
|
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... viac...
should be applied to all digital resources, including identities, endpoints, networks, data, applications and infrastructure. Zero-trust architecture is a complex strateg... viac...
Source: it.portal
show all
Japonská agentúra pre vesmírny prieskum (JAXA) tento týždeň informovala, že toto leto zaznamenala kybernetický incident, ktorý pramenil z narušenia Microsoft Active Direc... viac...
show all
small or medium-sized companies are not targets for hacker attacks
Source: it-portal.sk
show all
Cybersecurity and Infrastructure Security Agency show link
A specialized center designed primarily to increase the cyber security of the GOVNET network. show link
show all
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti show link
show all
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|