Recomendations
 |
Risk Management
Implement a threat intelligence overview
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is the organization's ability to react and recover from an event that negatively affected the company's operations
should be applied to all digital resources, including identities, endpoints, networks, data, applications and infrastructure. Zero-trust architecture is a complex strateg... more...
Source: it.portal
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Update contracts and NDAs as required by law.
Source: it.portal
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remov... more...
Source: KCCKB
show all
 Institutions
|
51 |
 Legislative
|
82 |
Zákon o fungovaní Bezpečnostnej rady Slovenskej republiky v čase mieru show link
Source: Slov-Lex
Zákon, ktorým sa mení a dopĺňa zákon č. 473/2005 Z. z. o poskytovaní služieb v oblasti súkromnej bezpečnosti a o zmene a doplnení niektorých zákonov (zákon o súkromnej be... more...
show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|