This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
• Identify assets and their owners • Identify threats • Identify vulnerabilities that threats could exploit • Identify the probabilities and impacts of risks<... viac...
Atlassian vydal softvérové opravy na riešenie štyroch kritických chýb vo svojom softvéri, ktoré by v prípade úspešného zneužitia mohli viesť k vzdialenému spusteniu kódu.
Your computer, smartphone, Wi-Fi router and all IT devices must always have the latest versions of operating system updates and patches installed. This also applies t... viac...
Do not click on Internet links in e-mail messages. Type the address of the website you want to visit into the address bar of the Internet browser. Why? The link in the em... viac...
Zákon, ktorým sa mení a dopĺňa zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov a ktorým sa menia a... viac...show link
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
viac...
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
viac...