This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Media
Hacking a Cyber Vessel: Ballast System Attack Demo | The Cybersecurity Podcast
https://www.youtube.com/watch?v=DzlTPh53hOg
Source: Threat Talks
Previous
15 / 44
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CheckPoint Research
show link
NÚKIB - Threats and vulnerabilities
show link
show all
What is what in IT
66
Penetration test
serves to assess the level of security by simulating situations that would be used by an attacker
Web hosting
is the provision of a service for publishing a web page or web application
show all
Interesting
22
95% of cyber problems are caused by user behavior itself
show link
Source: CheckPointResearch
70% of boards in 2026 will have a member responsible for cyber security
Source: Gartner
show all
Recomendations
377
Risk management
Update contracts and NDAs as required by law.
Source: it.portal
Compliance and Audit
Implement reporting to the board
Source: it.portal
show all
Institutions
51
NCC-IE
National Cyber Security Centre of Ireland
show link
Zakonyprolidi
Sbírka zákonů ČR
show link
show all
Legislative
82
316/2021 Sb.
Vyhláška o některých požadavcích pro zápis do katalogu cloud computingu
show link
Source: e-sbirka
226 VYHLÁŠKA Národného bezpečnostného úradu z 26. augusta 2025, ktorou sa ustanovujú podrobnosti o hláseniach
226 VYHLÁŠKA Národného bezpečnostného úradu z 26. augusta 2025, ktorou sa ustanovujú podrobnosti o hláseniach
show link
Source: Slov-Lex
show all
Norms
25
ISO/IEC 27010:2015
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
ISO/IEC 27007:2020
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Source: ISO
show all
Technologies
14
Fortinet
show link
Ubiquiti
show link
show all
Infographics
7
Certified data centers in the given territory of Europe (309)
Source: Uptime Institute
Data centers in Bratislava according to Google Maps
To ale neznamená, že sú jediné
Source: Google Maps
show all
Events
0
Certifications
0
Acreditations
0
Media
436
O čom je bezpečnosť? Kde začať?
show link
Source: Linkedin
AIS Spoofing: How Hackers Exploit Maritime Navigation Systems| The Cybersecurity Podcast
show link
Source: Threat Talks
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use