Media
 |
Zero Trust Step Three: Build a Zero Trust Architecture
Source: Threat Talks
|
|
|
show link
Source: David Šetek - Hackni svou budoucnost
|
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a summary of the measures taken by a legal entity or a natural person who is an entrepreneur under a special law for the protection of classified facts that have been ... more...
is information that is stored on your computer and is subsequently used to track your activity, visited pages, what you search for, what you buy in e-shops, etc.
Source: it.portal
show all
 Interesting
|
22 |
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... more...
Source: CheckPoint Research
show all
 Recomendations
|
377 |
Develop disaster recovery for incidents.
Source: it.portal
Implement regular updates and control
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Vyhláška Národného bezpečnostného úradu, ktorou sa určujú identifikačné kritériá pre jednotlivé kategórie závažných kybernetických bezpečnostných incidentov a podrobnosti... more...
show link
Source: Slov-Lex
Zákon o riadení bezpečnosti pozemných komunikácií a o zmene a doplnení niektorých zákonov
show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology. Security techniques. Information security management systems. Overview and vocabulary show link
Source: STN
Information technology — Security techniques — Information security management systems — Guidance
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|