Media
 |
56. Hacking a kybernetická bezpečnost - Nikto a skenování konkrétního portu
Source: David Šetek - Hackni svou budoucnost
|
|
|
show link
Source: David Šetek - Hackni svou budoucnost
|
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
• Business continuity team • List of basic services • Criticality factor of basic services • Action plan to maintain the basic service • Key customers more...
is a set of measures that must be met during the design, implementation and use of buildings
show all
 Interesting
|
22 |
Japonská automobilka Nissan vyšetruje kybernetický útok, ktorý sa zameral na jej systémy v Austrálii a na Novom Zélande, čo mohlo hackerom umožniť prístup k osobným infor... more...
show all
 Recomendations
|
377 |
Implement data recovery testing
Source: it.portal
Implement a risk approval process
Source: it.portal
show all
 Institutions
|
51 |
Office of the Government of the Republic of Slovenia for Information Security show link
National Cybersecurity Coordination Centre Unit in the Chancellery of the Prime Minister show link
show all
 Legislative
|
82 |
Vyhláška o některých požadavcích pro zápis do katalogu cloud computingu show link
Source: e-sbirka
Vyhláška Národného bezpečnostného úradu o fyzickej bezpečnosti a objektovej bezpečnosti show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Uptime Institute
Source: TEST prenosu na LOCAL
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|