This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Institutions
CISA
Cybersecurity and Infrastructure Security Agency
https://www.cisa.gov/
Previous
3 / 6
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
NÚKIB - Threats and vulnerabilities
show link
Report an incident
show link
show all
What is what in IT
66
SIEM
are tools for collecting and continuously evaluating cyber security events
Source: it.portal
Disaster recovery strategy
is a document that is the cornerstone of ensuring the continuous operation of infrastructure and applications when a major outage occurs.
show all
Interesting
22
80% of workers need up to 8 searches to find the document they need for work
Source: archbee
8 percent increase in global cyberattacks per week
show link
Source: CheckPointResearch
show all
Recomendations
377
Processes
Implement centralized documentation
Source: it.portal
Network
Recommend secure passwords for school systems
Source: it.portal
show all
Institutions
51
Office for Standardization, Metrology and Testing of the Slovak Republic
Standards portal
show link
NUKIB
National Office for Cyber and Information Security
show link
show all
Legislative
82
Oznámenie Komisie Usmernenia Komisie k uplatňovaniu článku 3 ods. 4 smernice (EÚ) 2022/2555 (smernica NIS 2) 2023/C 324/02
Oznámenie Komisie Usmernenia Komisie k uplatňovaniu článku 3 ods. 4 smernice (EÚ) 2022/2555 (smernica NIS 2) 2023/C 324/02
show link
Source: Eur-Lex
473/2005 Z. z.
Zákon o poskytovaní služieb v oblasti súkromnej bezpečnosti a o zmene a doplnení niektorých zákonov (zákon o súkromnej bezpečnosti)
show link
Source: Slov-Lex
show all
Norms
25
ISO/IEC 27004:2016
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
ISO/IEC 27002:2022
Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
show all
Technologies
14
Dell
show link
CISCO
show all
Infographics
7
10 biggest threats for 2030
Source: ENISA
Certified data centers in the given territory of Europe (309)
Source: Uptime Institute
show all
Events
0
Certifications
0
Acreditations
0
Media
436
Ofenzívna bezpečnosť - ťažko na cvičisku, ľah... ľahšie na bojisku
show link
Source: HN špeciál
Consulting: Current legislative changes in information and cyber security
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use