Media
 |
Criminals play with digital vulnerabilities. Don't be fooled
Source: Pravda
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is an attack on a web server by which the attacker overwhelms the server with a large number of requests from different places and thus blocks it.
• Unsolicited content • Malicious code • Obtaining information • Intrusion attempt • Penetration • Unavailability • Risk of information security viac...
show all
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... viac...
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... viac...
show all
▪ strong two-factor authentication ▪ electronic signature ▪ safe storage of cryptographic keys ▪ storage of third-party certificates ▪ setting specific se... viac...
Source: it.portal
▪ Cyber resilience ▪ ▪ Proactively suppress breaches and attacks ▪ Operational resistance ▪ ▪ Avoid costly downtime for employees and customers ▪ Financ... viac...
Source: it.portal
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností show link
show all
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1
Source: ISO
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1... viac...
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|