Recomendations
 |
Suppliers
Implement supplier monitoring and review
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a system of measures related to the selection, designation and control of persons who may become familiar with classified information to a specified extent.
The NIS2 directive creates new space to strengthen the level of cyber security across the EU. This updated version of the first directive on network and information secur... more...
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Implement an "approved apps" policy
Source: it.portal
Evaluate IoT and implement security measures.
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
VYHLÁŠKA Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o šifrovej ochrane informácií show link
Source: Slov-Lex
VYHLÁŠKA ze dne 24. srpna 2021o bezpečnostních úrovních pro využívání cloud computingu orgány veřejné moci show link
Source: e-sbirka
show all
 Norms
|
25 |
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Google Maps
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|