Media
 |
Prečo nás umelá inteligencia prevalcuje aj v kybernetickej bezpečnosti
Source: HN špeciál
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a type of fraud in which a criminal disguises a phone number, text message, email address, display name, or web address to make the user believe they are communicating... more...
serves to assess the level of security by simulating situations that would be used by an attacker
show all
 Interesting
|
22 |
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... more...
Tím Malek, ktorý predtým zasiahol súkromnú vysokú školu v Izraeli, sa hlási k zodpovednosti za hacknutie izraelského zdravotného centra Ziv. Skupina hackerov tvrdí, že uk... more...
show all
 Recomendations
|
377 |
▪ The complexity of the IT infrastructure ▪ Cyber attacks ▪ Reactive threat management ▪ Gaps in security skills ▪ Challenges in the field of regulation... more...
Source: it.portal
Deploy DLP solution
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Zákon o právu na digitální služby a o změně některých zákonů show link
Source: e-sbirka
Zákon, ktorým sa mení zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
more...
Source: ISO
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|