Media
 |
When to repeat a cyber security audit?
Source: HN špeciál
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a place that can be abused by a threat and cause a negative impact on the organization's assets
Source: it.portal
• Unsolicited content • Malicious code • Obtaining information • Intrusion attempt • Penetration • Unavailability • Risk of information security viac...
show all
Google v utorok oznámil vydanie prehliadača Chrome 120 s opravami 10-tich zraniteľností.
06. 12. 2023
show all
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
small or medium-sized companies are not targets for hacker attacks
Source: it-portal.sk
show all
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov show link
Vyhláška Ministerstva vnútra Slovenskej republiky, ktorou sa mení a dopĺňa vyhláška Ministerstva vnútra Slovenskej republiky č. 94/2004 Z. z., ktorou sa ustanovujú techni... viac...
show link
show all
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1... viac...
Source: ISO
EN ▪ Information technology — Security techniques — Information security management systems — Overview and vocabulary
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|