This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
a call from a spoofed phone number looks like your bank number. The caller introduces himself as an employee of the bank and, under the pretext of checking a suspicious p... more...
is a proactive approach to security across all layers of the digital space where every transaction is continuously verified. It uses the rule of least privilege and relie... more...
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovuje obsah bezpečnostných opatrení, obsah a štruktúra bezpečnostnej dokumentácie a rozsah všeobecných bezpečnostn... more...show link
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical ... more...