Media
 |
Zákon prikazuje overovať bezpečnosť, ale nedáva exaktný návod
Source: HN špeciál
|
|
 Actual incidents
|
6 |
is an international standard, a risk-based standard. It defines the requirements for the establishment, implementation, maintenance and continuous improvement of an infor... viac...
is an attack on a web server by which the attacker overwhelms the server with a large number of requests from different places and thus blocks it.
show all
 Interesting
|
22 |
 Recomendations
|
23 |
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
small or medium-sized companies are not targets for hacker attacks
Source: it-portal.sk
show all
 Institutions
|
9 |
Cybersecurity and Infrastructure Security Agency show link
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností show link
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti show link
Source: SLEX
show all
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|