This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Infographics
Certified data centers in the given territory of Europe (309)
Source: Uptime Institute
Previous
18 / 1
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
Report an incident
show link
CheckPoint Research
show link
show all
What is what in IT
66
Penetration test
serves to assess the level of security by simulating situations that would be used by an attacker
DDoS (Distributed Denial of Service)
is an attack on a web server by which the attacker overwhelms the server with a large number of requests from different places and thus blocks it.
show all
Interesting
22
52% of all phishing attacks worldwide in Q1 2022 involved LinkedIn (by brand)
Source: CheckPoint Research
8 percent increase in global cyberattacks per week
show link
Source: CheckPointResearch
show all
Recomendations
377
Online Threats
Explain signs of fraud and phishing
Source: it.portal
Online threats
Show examples and prevention
Source: it.portal
show all
Institutions
51
NCC-LT
National Cyber Security Centre
show link
CISA
Cybersecurity and Infrastructure Security Agency
show link
show all
Legislative
82
135/2016 Z. z.
VYHLÁŠKA Národného bezpečnostného úradu o skúške bezpečnostného zamestnanca
show link
Source: Slov-Lex
227 VYHLÁŠKA Národného bezpečnostného úradu z 26. augusta 2025 o bezpečnostných opatreniach
227 VYHLÁŠKA Národného bezpečnostného úradu z 26. augusta 2025 o bezpečnostných opatreniach
show link
Source: Slov-Lex
show all
Norms
25
ISO/IEC 27004:2016
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
ISO/IEC 27000:2018
Information technology. Security techniques. Information security management systems. Overview and vocabulary
show link
Source: STN
show all
Technologies
14
WOW
show link
Synology
show link
show all
Infographics
7
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
Certified data centers in the given territory of Europe (309)
Source: Uptime Institute
show all
Events
0
Certifications
0
Acreditations
0
Media
436
We know that. Social engineering builds an attack on these pillars
show link
Source: HN špeciál
59. Hacking a kybernetická bezpečnost - Burp suite - zprovoznění https požadavků
show link
Source: David Šetek - Hackni svou budoucnost
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use