This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
• AI and machine learning • Attacks on supply chains and critical infrastructure • Cyber insurance • State-sponsored attacks and hacktivism • Deepfake t... more...
is a data storage intended for their backup, which is separated from the production environment, which makes the data more securely stored. Before each further data stora... more...
Vyhláška Ministerstva vnútra Slovenskej republiky, ktorou sa mení a dopĺňa vyhláška Ministerstva vnútra Slovenskej republiky č. 634/2005 Z. z., ktorou sa vykonávajú niekt... more...show link
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1... more...
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
more...