This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Recomendations
Technical measures
Develop and implement BYOD and mobile security policies.
Source: it.portal
Previous
9 / 38
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CERT-EU Threat intelligence
show link
CISA - CYBER INCIDENTS
show link
show all
What is what in IT
66
Digital footprint
is an electronic trail made up of data and information that every user leaves behind every time they access the Internet
Source: it-portal.sk
Web hosting
is the provision of a service for publishing a web page or web application
show all
Interesting
22
80% of organizations will use BaaS/DRaaS for at least some of their servers
Source: Veeam
70% of boards in 2026 will have a member responsible for cyber security
Source: Gartner
show all
Recomendations
377
Training and Awareness
Develop and implement rules
Source: it.portal
Reporting
Add to reporting materials
Source: it.portal
show all
Institutions
51
NCC-IE
National Cyber Security Centre of Ireland
show link
NCC-NO
Norwegian National Security Authority
show link
show all
Legislative
82
48/2019 Z. z.
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností
show link
Source: Slov-Lex
154/2024 Sb.
Vyhláška o požadavcích na strukturu a náležitosti záznamů o poskytnutí a využití údajů a o přístupu do informačního systému veřejné správy
show link
Source: e-sbirka
show all
Norms
25
ISO/IEC 27010:2015
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
ISO/IEC 27004:2016
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
show all
Technologies
14
Ubiquiti
show link
Synology
show link
show all
Infographics
7
10 biggest threats for 2030
Source: ENISA
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
show all
Events
0
Certifications
0
Acreditations
0
Media
436
28. Hacking pro začátečníky - Request a DNS
show link
Source: David Šetek - Hackni svou budoucnost
Criminals play with digital vulnerabilities. Don't be fooled
show link
Source: Pravda
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use