This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Media
SOPHOS - Stratégia kybernetickej bezpečnosti ďalšej generácie
https://www.youtube.com/watch?v=c7ID633gvlo
Source: DataTrend Servise
Previous
14 / 44
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CheckPoint Research
show link
SK-CERT Safety warnings
show link
show all
What is what in IT
66
Immutable data
is information in the database that cannot or should not be deleted or modified.
Source: it.portal
Disaster recovery
is the organization's ability to react and recover from an event that negatively affected the company's operations
show all
Interesting
22
85% of organizations had at least one ransomware attack in the past year
Source: Veeam
79% of organizations have a security gap
Source: Internet
show all
Recomendations
377
Processes
Implement centralized documentation
Source: it.portal
Cyberbullying
Recommend a password manager for games as well
Source: it.portal
show all
Institutions
51
ASD
Australian Signals Directorate
show link
GOV CERT SK
Špecializované centrum určené primárne na zvýšenie kybernetickej bezpečnosti siete GOVNET.
show link
show all
Legislative
82
365/2000 Sb.
ZÁKON ze dne 14. září 2000 o informačních systémech veřejné správy a o změně některých dalších zákonů
show link
Source: e-sbirka
336/2004 Z. z.
Vyhláška Národného bezpečnostného úradu o fyzickej bezpečnosti a objektovej bezpečnosti
show link
Source: Slov-Lex
show all
Norms
25
ISO/IEC TS 27008:2019
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
ISO/IEC 27000:2018
Information technology. Security techniques. Information security management systems. Overview and vocabulary
show link
Source: STN
show all
Technologies
14
Dell
show link
CISCO
show all
Infographics
7
Implemented specialized training in the field of cyber security
Source: Enisa
10 biggest threats for 2030
Source: ENISA
show all
Events
0
Certifications
0
Acreditations
0
Media
436
46. Hacking a kybernetická bezpečnost - Nmap a stanovení portů
show link
Source: David Šetek - Hackni svou budoucnost
Už vás strašili pokutami a sankciami?
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use