Single point for information about
• Cyber security
• Backup, recovery and archiving
• Standards, norms and recommendations
Standardization, norms and recommendations
Backup, recovery and archiving
• Backup and recovery of data and infrastructure settings
• Data deduplication and archiving
• Data security and integrity
Objects security
• entry control systems, electronic identification and authorization of persons
• electric security systems, alarm systems for reporting disturbances
• camera setup within closed circuit television and more
|
 Actual incidents
|
6 |
is a proactive approach to security across all layers of the digital space where every transaction is continuously verified. It uses the rule of least privilege and relie... viac...
Source: it.portal
is an attack on a web server by which the attacker overwhelms the server with a large number of requests from different places and thus blocks it.
show all
 Interesting
|
22 |
 Recomendations
|
23 |
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
show all
 Institutions
|
9 |
Zákon o elektronických komunikáciách show link
Zákon, ktorým sa mení zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov show link
Source: Časová verzia predpisu účinná od 30.06.2022
show all
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
1 |
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
116 |
Contact us by e-mail
|