This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Media
Na osobné údaje sme veľmi citliví a zároveň zlyhávame pri ich ochrane
https://hnonline.sk/hn-special/96151972-na-osobne-udaje-sme-velmi-citlivi-a-zaroven-zlyhavame-pri-ich-ochrane
Source: HN špeciál
Previous
10 / 20
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
NÚKIB - Threats and vulnerabilities
show link
CERT-EU Threat intelligence
show link
show all
What is what in IT
66
Disaster recovery
is the organization's ability to react and recover from an event that negatively affected the company's operations
Types of incidents
• Unsolicited content
• Malicious code
• Obtaining information
• Intrusion attempt
• Penetration
• Unavailability
• Risk of information security
viac...
show all
Interesting
22
300,000 new instances of malware are generated daily
Source: Internet
Chrome 120 fixes 10 vulnerabilities
Google v utorok oznámil vydanie prehliadača Chrome 120 s opravami 10-tich zraniteľností.
06. 12. 2023
show all
Recomendations
23
Build resilience across the organization
▪ Cyber resilience
▪ ▪ Proactively suppress breaches and attacks
▪ Operational resistance
▪ ▪ Avoid costly downtime for employees and customers
▪ Financ...
viac...
Source: it.portal
PROTECT PERSONAL DATA - 07. Do not believe urgent news
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
show all
Institutions
9
NUKIB
National Office for Cyber and Information Security
show link
NIST
National Institute of Standards and Technology
show link
show all
Legislative
14
45/2011 Coll.
Zákon o kritickej infraštruktúre
show link
134/2016 Z. z.
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti
show link
Source: SLEX
show all
Norms
25
ISO/IEC 27017:2015
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
ISO/IEC 27005:2022
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
show all
Technologies
14
pfSense
show link
WireGuard
show link
show all
Infographics
7
10 biggest threats for 2030
Source: ENISA
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
show all
Events
0
Certifications
0
Acreditations
0
Media
116
Do boja proti nekalým praktikám nasadíme technológie
show link
Source: HN špeciál
Prečo nás umelá inteligencia prevalcuje aj v kybernetickej bezpečnosti
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2025
Cookies
|
Privacy policy
|
Terms of use