This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
is a summary of the measures taken by a legal entity or a natural person who is an entrepreneur under a special law for the protection of classified facts that have been ... viac...
is a set of processes, best practices and technology solutions that help protect critical systems, network and data from unauthorized access or attacks
Japonská automobilka Nissan vyšetruje kybernetický útok, ktorý sa zameral na jej systémy v Austrálii a na Novom Zélande, čo mohlo hackerom umožniť prístup k osobným infor... viac...
▪ Visibility of asset inventory and attack possibilities ▪ Controls and processes to protect assets from cyber attacks ▪ Ability to detect, investigate and manage... viac...
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remov... viac...
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1