Media
 |
Sme v tom všetci
Source: HN špeciál
|
|
|
show link
Source: David Šetek - Hackni svou budoucnost
|
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is an attack on a web server by which the attacker overwhelms the server with a large number of requests from different places and thus blocks it.
serves to assess the level of security by simulating situations that would be used by an attacker
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Develop an IRP (Incident Response Plan)
Source: it.portal
Implement MFA for all critical tools
Source: it.portal
show all
 Institutions
|
51 |
European Cybersecurity Competence Centre show link
The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe show link
show all
 Legislative
|
82 |
VYHLÁŠKA ze dne 23. října 2020 o údajích vedených v katalogu cloud computingu show link
Source: e-sbirka
Vyhláška Ministerstva vnútra Slovenskej republiky, ktorou sa mení a dopĺňa vyhláška Ministerstva vnútra Slovenskej republiky č. 94/2004 Z. z., ktorou sa ustanovujú techni... more...
show link
Source: Slov-Lex
show all
 Norms
|
25 |
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|