Legislative
 |
231/2022 Z. z.
Zákon, ktorým sa mení zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov
Source: Slov-Lex
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... more...
is a risk directly affecting the provision of a service, a main process, a system or an organization. There is a risk of financial loss, damage to property, threat to hea... more...
Source: it.portal
show all
 Interesting
|
22 |
Japonská agentúra pre vesmírny prieskum (JAXA) tento týždeň informovala, že toto leto zaznamenala kybernetický incident, ktorý pramenil z narušenia Microsoft Active Direc... more...
viac ako 80 000 sledovacích kamier Hikvision na svete bolo v roku 2022 bolo zraniteľných prienikom k riadiacim príkazom.
Hikvision – je skratka pre Hangzhou Hikvisio... more...
show all
 Recomendations
|
377 |
Provide TI access for relevant projects
Source: it.portal
Inventory critical processes and dependencies.
Source: it.portal
show all
 Institutions
|
51 |
Croatian Academic and Research Network – CARNET (NCC-HR) show link
Office of the Government of the Republic of Slovenia for Information Security show link
show all
 Legislative
|
82 |
Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and comm... more...
show link
Source: Eur-Lex
ZÁKON ze dne 15. září 2021, kterým se mění zákon č. 127/2005 Sb., o elektronických komunikacích a o změně některých souvisejících zákonů (zákon o elektronických komunikac... more...
show link
Source: e-sbirka
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
Information technology. Security techniques. Information security management systems. Overview and vocabulary show link
Source: STN
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|