Technologies
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
▪ The affected entities must register an overview of subcontractors ▪ Subcontractors are obliged to report security incidents ▪ The obligation of the affected ent... viac...
is a space that is intended for the continuous operation of computer servers, systems and data storage.
show all
 Interesting
|
22 |
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... viac...
show all
Ak to aplikácia umožňuje, nastavte si viacfaktorové overenie (autentizáciu) pri ktorej musíte na dvoch alebo viacerých stupňoch preukázať dôkazy (faktory) na potvrdenie v... viac...
Source: KCCKB
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
show all
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti show link
Source: SLEX
Zákon, ktorým sa mení a dopĺňa zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov a ktorým sa menia a... viac...
show link
show all
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
show all
 Technologies
|
14 |
To ale neznamená, že sú jediné
Source: Uptime Institute
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
1 |
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|