This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Media
Poučíme sa z útoku na kataster? (Andrej Mišura, Cyllium)
https://www.youtube.com/watch?v=4s6yLxk-RXg
Source: Bezpečný online svet
1 / 146
Next
KCCKB: Kyberbezpečnosť – revolúcia, či evolúcia
show link
Source: DataTrend Servise
Ransomvér? Vaše obavy sú oprávnené
show link
Source: HN špeciál
Útok, obrana, vylepšenie a zas znova
show link
Source: HN špeciál
Actual incidents
6
NÚKIB - Threats and vulnerabilities
show link
CheckPoint Research
show link
show all
What is what in IT
66
Digital footprint
is an electronic trail made up of data and information that every user leaves behind every time they access the Internet
Source: it-portal.sk
The lifecycle of a malicious attack
• Survey
• Initial access
• Startup
• Credential access and privilege escalation
• Lateral movement
• Collection and exfiltration
• Installation o...
more...
Source: it.portal
show all
Interesting
22
57% of organizations expect to change their primary backup solution in 2023
Source: Veeam
85% of organizations had at least one ransomware attack in the past year
Source: Veeam
show all
Recomendations
377
Online Threats
Recommend encryption and a strong password
Source: it.portal
Technical measures
Implement disk and transfer encryption.
Source: it.portal
show all
Institutions
51
NCC-NL
The Netherlands Enterprise Agency (RVO)
show link
NCC-PT
Portuguese National Coordination Centre
show link
show all
Legislative
82
12/1997 Sb.
ZÁKON ze dne 24. ledna 1997
o bezpečnosti a plynulosti provozu na pozemních komunikacích
show link
Source: e-sbirka
452/2021 Z. z.
Zákon o elektronických komunikáciách
show link
Source: Slov-Lex
show all
Norms
25
ISO/IEC 27007:2020
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Source: ISO
ISO/IEC TR 27016:2014
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
show all
Technologies
14
Supermicro
show link
Ubiquiti
show link
show all
Infographics
7
Implemented specialized training in the field of cyber security
Source: Enisa
10 biggest threats for 2030
Source: ENISA
show all
Events
0
Certifications
0
Acreditations
0
Media
436
Breaking the Defences: EDR Bypass - Threat Talks Cybersecurity Podcast
show link
Source: Threat Talks
Log4j: The danger of software dependencies - Threat Talks Cybersecurity Podcast
show link
Source: Threat Talks
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use