Media
 |
We know that. Social engineering builds an attack on these pillars
Source: HN špeciál
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
je postup, pomocou ktorého sa zisťuje aká je pravdepodobnosť, že dôjde k nežiadúcej udalosti a aké budú jej dôsledky
is a form of malware that uses social engineering to induce fear or a perception of threat in order to manipulate a user into downloading or purchasing malicious software... viac...
show all
 Interesting
|
22 |
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... viac...
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti show link
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti show link
show all
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
Source: ISO
show all
 Technologies
|
14 |
To ale neznamená, že sú jediné
Source: Uptime Institute
Source: TEST prenosu na LOCAL
show all
 Events
|
1 |
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|