This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
Do not click on Internet links in e-mail messages. Type the address of the website you want to visit into the address bar of the Internet browser. Why? The link in the email may be fake, and there may be a fake link to a phishing site hidden underneath
▪ The affected entities must register an overview of subcontractors ▪ Subcontractors are obliged to report security incidents ▪ The obligation of the affected ent... more...
Vyhláška Národného bezpečnostného úradu, ktorou sa určujú identifikačné kritériá pre jednotlivé kategórie závažných kybernetických bezpečnostných incidentov a podrobnosti... more...show link
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
more...
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1