This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Recomendations
Suppliers
Implement supplier monitoring and review
Source: it.portal
Previous
15 / 38
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CheckPoint Research
show link
NÚKIB - Threats and vulnerabilities
show link
show all
What is what in IT
66
Web hosting
is the provision of a service for publishing a web page or web application
Hosting
is a service to provide server performance and disk space for customer applications.
Source: it-portal.sk
show all
Interesting
22
79% of organizations have a security gap
Source: Internet
74% of organizations will use cloud services for data protection by 2025
Source: Veeam
show all
Recomendations
377
Strategic Management
Include security in strategic goals
Source: it.portal
Technical Measures
Test the recovery of critical systems at least once a year.
Source: it.portal
show all
Institutions
51
Zakonyprolidi
Sbírka zákonů ČR
show link
NCC-BG
Ministry of Electronic Governance MEG Bulgaria
show link
show all
Legislative
82
69/2018 Z. z.
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov
show link
Source: Slov-Lex
Oznámenie Komisie Usmernenia Komisie k uplatňovaniu článku 4 ods. 1 a 2 smernice (EÚ) 2022/2555 (smernica NIS 2) 2023/C 328/02
Oznámenie Komisie Usmernenia Komisie k uplatňovaniu článku 4 ods. 1 a 2 smernice (EÚ) 2022/2555 (smernica NIS 2) 2023/C 328/02
show link
Source: Eur-Lex
show all
Norms
25
ISO/IEC 27005:2022
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
ISO/IEC 27002:2022
Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
show all
Technologies
14
ESET
show link
Check Point
show link
show all
Infographics
7
Certified data centers in Slovakia and the surrounding area (14) according to the Uptime Institute
To ale neznamená, že sú jediné
Source: Uptime Institute
Implemented specialized training in the field of cyber security
Source: Enisa
show all
Events
0
Certifications
0
Acreditations
0
Media
436
Etický hacking v dobe neetickej (Daniel Hejda, Cyber Rangers)
show link
Source: Bezpečný online svet
67. Hacking a kybernetická bezpečnost - Útok HTML injection a Burp Suite
show link
Source: David Šetek - Hackni svou budoucnost
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use