Technologies
More information, which may be usefull to you, may be found after login at it-portal.sk
|
sú kontrolovanou formou hackingu, ktorá využíva pokročilé techniky a metódy, pomocou ktorých simuluje postupy kybernetického útočníka pri útoku na systém.
Source: it.portal
▪ Subject - private or public organization ▪ if at the same time ▪ provides at least one service listed in the annexes of the directive and at the same time ▪... viac...
show all
viac ako 80 000 sledovacích kamier Hikvision na svete bolo v roku 2022 bolo zraniteľných prienikom k riadiacim príkazom.
Hikvision – je skratka pre Hangzhou Hikvisio... viac...
show all
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
show all
A specialized center designed primarily to increase the cyber security of the GOVNET network. show link
National Office for Cyber and Information Security show link
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti show link
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov show link
show all
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
viac...
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|