Technologies
nástroj na evidenciu štrukturovaných informácií... show link
|
|
|
|
▪ The affected entities must register an overview of subcontractors ▪ Subcontractors are obliged to report security incidents ▪ The obligation of the affected ent... viac...
is, among other things, a malicious computer program that records everything you type on your keyboard, including words, characters and symbols, and sends all recorded de... viac...
show all
Tím Malek, ktorý predtým zasiahol súkromnú vysokú školu v Izraeli, sa hlási k zodpovednosti za hacknutie izraelského zdravotného centra Ziv. Skupina hackerov tvrdí, že uk... viac...
Google v utorok oznámil vydanie prehliadača Chrome 120 s opravami 10-tich zraniteľností.
06. 12. 2023
show all
▪ The complexity of the IT infrastructure ▪ Cyber attacks ▪ Reactive threat management ▪ Gaps in security skills ▪ Challenges in the field of regulation... viac...
Source: it.portal
SMS messages or e-mails that promise price discounts, profit, or any other financial benefits are of course tempting. However, you must not run into them.
Source: KCCKB
show all
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti show link
Zákon, ktorým sa mení zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov show link
Source: Časová verzia predpisu účinná od 30.06.2022
show all
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
Certifications
|
0 |
Acreditations
|
0 |
Contact us by e-mail
|