This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Recomendations
Strategy and Management
Include security in business plans and KPIs
Source: it.portal
Previous
32 / 38
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CheckPoint Research
show link
CERT-EU Threat intelligence
show link
show all
What is what in IT
66
Penetration test
serves to assess the level of security by simulating situations that would be used by an attacker
Assessment of the severity of impacts
• Catastrophic
• Serious
• Medium
• Minimal
• Negligible
Source: it-portal.sk
show all
Interesting
22
57% of organizations expect to change their primary backup solution in 2023
Source: Veeam
85% of organizations had at least one ransomware attack in the past year
Source: Veeam
show all
Recomendations
377
Data Protection
Implement RBAC control
Source: it.portal
Incident Management
Implement early warning and escalation process
Source: it.portal
show all
Institutions
51
NCC-NL
The Netherlands Enterprise Agency (RVO)
show link
ASD
Australian Signals Directorate
show link
show all
Legislative
82
Video: Čo je to Microsoft Teams?
Video: Čo je to Microsoft Teams?
show link
Source: Microsoft365
12/1997 Sb.
ZÁKON ze dne 24. ledna 1997
o bezpečnosti a plynulosti provozu na pozemních komunikacích
show link
Source: e-sbirka
show all
Norms
25
ISO/IEC TR 27016:2014
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
ISO/IEC 27010:2015
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
show all
Technologies
14
Mikrotik
show link
Supermicro
show link
show all
Infographics
7
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
10 biggest threats for 2030
Source: ENISA
show all
Events
0
Certifications
0
Acreditations
0
Media
436
Konvergencia, segmentácia, nulová dôvera. A nad tým dáždnik AI
show link
Source: HN špeciál
35. Hacking pro začátečníky - Status code - co to je
show link
Source: David Šetek - Hackni svou budoucnost
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use