Institutions
|
CERT-EU
The Computer Emergency Response Team for the EU institutions, bodies and agencies
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
is one of the fastest ways to identify weak points in information systems before a cyber attacker finds them. The scanner is software that generates a detailed report on ... viac...
Source: it.portal
show all
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remov... viac...
Source: KCCKB
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
show all
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti show link
Zákon, ktorým sa mení zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov show link
Source: Časová verzia predpisu účinná od 30.06.2022
show all
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Source: ISO
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
viac...
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
Certifications
|
0 |
Acreditations
|
0 |
Contact us by e-mail
|