Actual incidents
 |
NÚKIB - Threats and vulnerabilities
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is information that is stored on your computer and is subsequently used to track your activity, visited pages, what you search for, what you buy in e-shops, etc.
Source: it.portal
is a procedure that determines the probability that an undesirable event will occur and what its consequences will be
show all
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... viac...
show all
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remov... viac...
Source: KCCKB
show all
A specialized center designed primarily to increase the cyber security of the GOVNET network. show link
show all
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti show link
Zákon, ktorým sa mení a dopĺňa zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov a ktorým sa menia a... viac...
show link
show all
Information technology — Security techniques — Information security management systems — Guidance
Source: ISO
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|