This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
Do not click on Internet links in e-mail messages. Type the address of the website you want to visit into the address bar of the Internet browser. Why? The link in the email may be fake, and there may be a fake link to a phishing site hidden underneath
• Identify assets and their owners • Identify threats • Identify vulnerabilities that threats could exploit • Identify the probabilities and impacts of risks<... more...
is a system of measures to protect classified information from unauthorized persons and from unauthorized manipulation in objects and protected spaces.
Japonská automobilka Nissan vyšetruje kybernetický útok, ktorý sa zameral na jej systémy v Austrálii a na Novom Zélande, čo mohlo hackerom umožniť prístup k osobným infor... more...
Vyhláška Národného bezpečnostného úradu, ktorou sa určujú identifikačné kritériá pre jednotlivé kategórie závažných kybernetických bezpečnostných incidentov a podrobnosti... more...show link
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1