Media
 |
Útoky cez dodávateľov? Bolia všetkých
Source: HN špeciál
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
▪ Energetics ▪ Transport ▪ Banking and infrastructure of financial markets ▪ Healthcare ▪ Drinking and waste water ▪ Digital infrastructures ▪ Pro... viac...
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
show all
 Interesting
|
22 |
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... viac...
Japonská automobilka Nissan vyšetruje kybernetický útok, ktorý sa zameral na jej systémy v Austrálii a na Novom Zélande, čo mohlo hackerom umožniť prístup k osobným infor... viac...
show all
 Recomendations
|
23 |
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
show all
 Institutions
|
9 |
Zákon o elektronických komunikáciách show link
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti show link
Source: SLEX
show all
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
9 |
 Events
|
1 |
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|