Media
|
Phishing is just the elementary school of cyberattacks. What does the medium and high one look like?
Source: HN špeciál
|
|
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
is a procedure that determines the probability that an undesirable event will occur and what its consequences will be
show all
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... viac...
show all
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
show all
Zákon, ktorým sa mení zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov show link
Source: Časová verzia predpisu účinná od 30.06.2022
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov show link
show all
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
Certifications
|
0 |
Acreditations
|
0 |
Contact us by e-mail
|