This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
▪ strong two-factor authentication ▪ electronic signature ▪ safe storage of cryptographic keys ▪ storage of third-party certificates ▪ setting specific security policies ▪ the card/token is a certified qualified means (QSCD) ▪ qualified electronic signature according to eIDAS ▪ qualified electronic seal according to eIDAS and more
The NIS2 directive creates new space to strengthen the level of cyber security across the EU. This updated version of the first directive on network and information secur... more...
• Have multiple copies of data - at least 3 • Saving copies of data in geographically different locations • Have at least one copy immediately available for quick... more...
Atlassian vydal softvérové opravy na riešenie štyroch kritických chýb vo svojom softvéri, ktoré by v prípade úspešného zneužitia mohli viesť k vzdialenému spusteniu kódu.
Zákon, ktorým sa mení a dopĺňa zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov a ktorým sa menia a... more...show link
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations