What is what in IT
 |
Zero trust model
should be applied to all digital resources, including identities, endpoints, networks, data, applications and infrastructure. Zero-trust architecture is a complex strategy and requires integration between elements.
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
▪ Subject - private or public organization ▪ if at the same time ▪ provides at least one service listed in the annexes of the directive and at the same time ▪... viac...
The NIS2 directive creates new space to strengthen the level of cyber security across the EU. This updated version of the first directive on network and information secur... viac...
show all
 Interesting
|
22 |
 Recomendations
|
23 |
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
small or medium-sized companies are not targets for hacker attacks
Source: it-portal.sk
show all
 Institutions
|
9 |
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
Cybersecurity and Infrastructure Security Agency show link
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa mení a dopĺňa vyhláška Národného bezpečnostného úradu č. 453/2007 Z. z. o administratívnej bezpečnosti show link
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti show link
show all
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Google Maps
Source: TEST prenosu na LOCAL
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|