This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Media
Sociálne siete ukazujú odvrátenú stranu umelej inteligencie
https://hnonline.sk/hn-special/96233167-socialne-siete-ukazuju-odvratenu-stranu-umelej-inteligencie
Source: HN špeciál
1 / 146
Next
KCCKB: Kyberbezpečnosť – revolúcia, či evolúcia
show link
Source: DataTrend Servise
Ransomvér? Vaše obavy sú oprávnené
show link
Source: HN špeciál
Útok, obrana, vylepšenie a zas znova
show link
Source: HN špeciál
Actual incidents
6
SK-CERT Safety warnings
show link
NÚKIB - Threats and vulnerabilities
show link
show all
What is what in IT
66
Passive digital footprint
is information that you leave on the Internet unconsciously and that is not directly visible, for example device type, IP address.
Source: it.portal
Malware
is malicious software that includes all kinds of the most well-known forms, such as Trojan horses, ransomware, viruses, worms, etc.
show all
Interesting
22
85% of organizations had at least one ransomware attack in the past year
Source: Veeam
It takes 49 days on average to detect malware
Source: Internet
show all
Recomendations
377
Technical measures
Develop a communication plan for external entities.
Source: it.portal
Supplier responsibility
Update SLAs and contracts.
Source: it.portal
show all
Institutions
51
NCC-RO
Centrul Național de Coordonare
show link
ETSI
European Telecommunications Standards Institute
show link
show all
Legislative
82
226 VYHLÁŠKA Národného bezpečnostného úradu z 26. augusta 2025, ktorou sa ustanovujú podrobnosti o hláseniach
226 VYHLÁŠKA Národného bezpečnostného úradu z 26. augusta 2025, ktorou sa ustanovujú podrobnosti o hláseniach
show link
Source: Slov-Lex
316/2021 Sb.
Vyhláška o některých požadavcích pro zápis do katalogu cloud computingu
show link
Source: e-sbirka
show all
Norms
25
ISO/IEC TR 27016:2014
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
ISO/IEC 27000:2018
Information technology. Security techniques. Information security management systems. Overview and vocabulary
show link
Source: STN
show all
Technologies
14
Documentary
nástroj na evidenciu štrukturovaných informácií...
show link
ESET
show link
show all
Infographics
7
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
Certified data centers in the given territory of Europe (309)
Source: Uptime Institute
show all
Events
0
Certifications
0
Acreditations
0
Media
436
Kyberpoistenie? Mohol by to byť biznis snov
show link
Source: HN špeciál
Ako chránite informácie? Majú v súčasnosti strategickú, ekonomickú aj politickú hodnotu
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use