Technologies
nástroj na evidenciu štrukturovaných informácií... show link
|
|
|
|
should be applied to all digital resources, including identities, endpoints, networks, data, applications and infrastructure. Zero-trust architecture is a complex strateg... viac...
Source: it.portal
The NIS2 directive creates new space to strengthen the level of cyber security across the EU. This updated version of the first directive on network and information secur... viac...
show all
viac ako 80 000 sledovacích kamier Hikvision na svete bolo v roku 2022 bolo zraniteľných prienikom k riadiacim príkazom.
Hikvision – je skratka pre Hangzhou Hikvisio... viac...
show all
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remov... viac...
Source: KCCKB
show all
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti show link
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti show link
show all
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|