Interesting
 |
85% of organizations had at least one ransomware attack in the past year
Source: Veeam
|
|
|
Source: CheckPoint Research
|
|
|
is a risk that a person is willing to accept, or admit, undergo
is a system of measures related to the selection, designation and control of persons who may become familiar with classified information to a specified extent.
show all
 Interesting
|
22 |
Atlassian vydal softvérové opravy na riešenie štyroch kritických chýb vo svojom softvéri, ktoré by v prípade úspešného zneužitia mohli viesť k vzdialenému spusteniu kódu.
show all
 Recomendations
|
377 |
Teach how to properly report an incident
Source: it.portal
Develop a risk management plan with prioritization.
Source: it.portal
show all
 Institutions
|
51 |
National Cybersecurity Coordination Centre Unit in the Chancellery of the Prime Minister show link
Swedish Civil Contingencies Agency MSB show link
show all
 Legislative
|
82 |
Oznámenie Komisie Usmernenia Komisie k uplatňovaniu článku 4 ods. 1 a 2 smernice (EÚ) 2022/2555 (smernica NIS 2) 2023/C 328/02 show link
Source: Eur-Lex
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|