This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Media
China Nexus Barracuda Hack - Threat Talks Cybersecurity Podcast
https://www.youtube.com/watch?v=4X9AmBhOmSA
Source: Threat Talks
Previous
4 / 44
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CISA - CYBER INCIDENTS
show link
CERT-EU Threat intelligence
show link
show all
What is what in IT
66
ISMS (Information Security Management System)
is a set of policies and procedures for the systematic management of an organization's sensitive data
Digital footprint
is an electronic trail made up of data and information that every user leaves behind every time they access the Internet
Source: it-portal.sk
show all
Interesting
22
It takes 49 days on average to detect malware
Source: Internet
57% of organizations expect to change their primary backup solution in 2023
Source: Veeam
show all
Recomendations
377
Passwords
Explain the risks and prevention
Source: it.portal
Risk Management
Implement at least an annual risk assessment process
Source: it.portal
show all
Institutions
51
NCC-IS
Eyvor, National Coordination Centre for Cybersecurity - The Electronic Communications Office of Iceland (ECOI)
show link
NUKIB
National Office for Cyber and Information Security
show link
show all
Legislative
82
181/2014 Sb.
Zákon o kybernetické bezpečnosti
show link
Source: e-sbirka
453/2007 Z. z.
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti
show link
Source: Slov-Lex
show all
Norms
25
ISO/IEC TS 27006-2:2021
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
ISO/IEC TR 27016:2014
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
show all
Technologies
14
Documentary
nástroj na evidenciu štrukturovaných informácií...
show link
OpenVPN
show link
show all
Infographics
7
Certified data centers in the given territory of Europe (309)
Source: Uptime Institute
Implemented specialized training in the field of cyber security
Source: Enisa
show all
Events
0
Certifications
0
Acreditations
0
Media
436
Threat Talks on tour: live from the RSA - Zero Trust with John Kindervag [Part 1]
show link
Source: Threat Talks
64. Hacking a kybernetická bezpečnost - Burp suite - jak funguje Intruder
show link
Source: David Šetek - Hackni svou budoucnost
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use