В настоящее время IT-безопасность, кибербезопасность и защита конфиденциальности жизненно важны для компаний и организаций. Наши стандарты информационной безопасности обеспечивают это.

Ценная информация

Information security: A pillar of resilience in a digital age

In a digitally connected world, your business data isn’t just essential – it’s a cornerstone of value creation. But this invaluable resource faces relentless cyber threats.

Threat intelligence and why it matters for cybersecurity

Most organizations today stick to the most basic form of threat intelligence (e.g. threat data feeds, IPS, firewalls), without enjoying the full advantage of what intelligence has to offer. When properly addressed, actionable CTI opens a world of opportunities. 

What is access control?

A key component of information security, access control allows for streamlined control of movement around facilities or networks. In other words, it restricts the areas people can and cannot enter – be it a room or a computer.

Наиболее популярные стандарты

Information security, cybersecurity and privacy protection — Information security management systems — Requirements

Information security, cybersecurity and privacy protection — Information security controls

Information technology — Security techniques — Information security management systems — Overview and vocabulary

Information technology — Security techniques — Privacy framework

Information security, cybersecurity and privacy protection — Guidance on managing information security risks

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security
Part 1: Introduction and general model