This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
is a set of processes, best practices and technology solutions that help protect critical systems, network and data from unauthorized access or attacks
viac ako 80 000 sledovacích kamier Hikvision na svete bolo v roku 2022 bolo zraniteľných prienikom k riadiacim príkazom.
Hikvision – je skratka pre Hangzhou Hikvisio... viac...
▪ Visibility of asset inventory and attack possibilities ▪ Controls and processes to protect assets from cyber attacks ▪ Ability to detect, investigate and manage... viac...
Reduce the amount of information you provide about yourself in Internet service settings. Carefully consider what personal information you include on your profile. Choose... viac...
Vyhláška Ministerstva vnútra Slovenskej republiky, ktorou sa mení a dopĺňa vyhláška Ministerstva vnútra Slovenskej republiky č. 94/2004 Z. z., ktorou sa ustanovujú techni... viac...show link
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
viac...