This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... more...
is one of the fastest ways to identify weak points in information systems before a cyber attacker finds them. The scanner is software that generates a detailed report on ... more...
Japonská automobilka Nissan vyšetruje kybernetický útok, ktorý sa zameral na jej systémy v Austrálii a na Novom Zélande, čo mohlo hackerom umožniť prístup k osobným infor... more...
Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and comm... more...show link
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
more...