Media
 |
Obnova po ransomvéri: prečo to nie je len o zálohách
Source: HN špeciál
|
|
|
show link
Source: David Šetek - Hackni svou budoucnost
|
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a place that can be abused by a threat and cause a negative impact on the organization's assets
Source: it.portal
is a set of policies and procedures for the systematic management of an organization's sensitive data
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Implement a regular update process
Source: it.portal
Develop a disaster recovery plan.
Source: it.portal
show all
 Institutions
|
51 |
National Cybersecurity Competence Center Luxembourg show link
Finnish Transport and Communications Agency Traficom's National Cyber Security Centre (NCSC-FI) show link
show all
 Legislative
|
82 |
ZÁKON ze dne 21. září 2005 o ochraně utajovaných informací a o bezpečnostní způsobilosti show link
Source: e-sbirka
Vyhláška Národného bezpečnostného úradu č. 164/2018 Z. z., ktorou sa určujú identifikačné kritériá prevádzkovanej služby (kritériá základnej služby) show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology. Security techniques. Information security management systems. Overview and vocabulary show link
Source: STN
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Uptime Institute
Source: TEST prenosu na LOCAL
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|