Media
 |
AIS Spoofing: How Hackers Exploit Maritime Navigation Systems| The Cybersecurity Podcast
Source: Threat Talks
|
|
|
show link
Source: David Šetek - Hackni svou budoucnost
|
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
• Survey • Initial access • Startup • Credential access and privilege escalation • Lateral movement • Collection and exfiltration • Installation o... more...
Source: it.portal
• Catastrophic • Serious • Medium • Minimal • Negligible
Source: it-portal.sk
show all
 Interesting
|
22 |
Google v utorok oznámil vydanie prehliadača Chrome 120 s opravami 10-tich zraniteľností.
06. 12. 2023
show all
 Recomendations
|
377 |
Create a register and set up a maintenance process
Source: it.portal
Implement decision and access logging
Source: it.portal
show all
 Institutions
|
51 |
Finnish Transport and Communications Agency Traficom's National Cyber Security Centre (NCSC-FI) show link
Swedish Civil Contingencies Agency MSB show link
show all
 Legislative
|
82 |
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti show link
Source: Slov-Lex
Nariadenie Európskeho parlamentu a Rady (EÚ) 2024/2847 z 23. októbra 2024 o horizontálnych požiadavkách kybernetickej bezpečnosti pre produkty s digitálnymi prvkami a o z... more...
show link
Source: Eur-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|