Media
 |
The Evolution of Cyber Warfare - Threat Talks Cybersecurity Podcast
Source: Threat Talks
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
serves to assess the level of security by simulating situations that would be used by an attacker
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
show all
 Interesting
|
22 |
viac ako 80 000 sledovacích kamier Hikvision na svete bolo v roku 2022 bolo zraniteľných prienikom k riadiacim príkazom.
Hikvision – je skratka pre Hangzhou Hikvisio... more...
Source: CheckPoint Research
show all
 Recomendations
|
377 |
Implement centralized and auditable repositories
Source: it.portal
Implement MFA for all critical tools
Source: it.portal
show all
 Institutions
|
51 |
International Organization for Standardization show link
Špecializované centrum určené primárne na zvýšenie kybernetickej bezpečnosti siete GOVNET. show link
show all
 Legislative
|
82 |
Vyhláška o kybernetické bezpečnosti show link
Source: e-sbirka
Nariadenie Európskeho parlamentu a Rady (EÚ, Euratom) 2023/2841 z 13. decembra 2023, ktorým sa stanovujú opatrenia na zabezpečenie vysokej spoločnej úrovne kybernetickej ... more...
show link
Source: Eur-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
more...
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|