This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
is a targeted attempt that looks credible to its victims and thus has a higher probability of success; for example, a spam attack impersonates a message from an organizat... more...
• Identify assets and their owners • Identify threats • Identify vulnerabilities that threats could exploit • Identify the probabilities and impacts of risks<... more...
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... more...
Nariadenie Európskeho parlamentu a Rady (EÚ) 2025/38 z 19. decembra 2024, ktorým sa stanovujú opatrenia na posilnenie solidarity a kapacít v Únii na odhaľovanie kyberneti... more...show link
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1... more...