Media
 |
Hackeri vo výrobe sú dnes reálnou hrozbou - kópia
Source: HN špeciál
|
|
 Actual incidents
|
6 |
is a procedure that determines the probability that an undesirable event will occur and what its consequences will be
• high • medium • low • very low
Source: it.portal
show all
 Interesting
|
22 |
Source: CheckPoint Research
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... viac...
show all
Reduce the amount of information you provide about yourself in Internet service settings. Carefully consider what personal information you include on your profile. Choose... viac...
Source: KCCKB
▪ Cyber resilience ▪ ▪ Proactively suppress breaches and attacks ▪ Operational resistance ▪ ▪ Avoid costly downtime for employees and customers ▪ Financ... viac...
Source: it.portal
show all
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností show link
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov show link
show all
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
viac...
Source: ISO
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical ... viac...
Source: ISO
show all
 Technologies
|
14 |
 Events
|
1 |
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|