В настоящее время IT-безопасность, кибербезопасность и защита конфиденциальности жизненно важны для компаний и организаций. Наши стандарты информационной безопасности обеспечивают это.

Ценная информация

Information security: A pillar of resilience in a digital age

In a digitally connected world, your business data isn’t just essential – it’s a cornerstone of value creation. But this invaluable resource faces relentless cyber threats.

Threat intelligence and why it matters for cybersecurity

Most organizations today stick to the most basic form of threat intelligence (e.g. threat data feeds, IPS, firewalls), without enjoying the full advantage of what intelligence has to offer. When properly addressed, actionable CTI opens a world of opportunities. 

What is access control?

A key component of information security, access control allows for streamlined control of movement around facilities or networks. In other words, it restricts the areas people can and cannot enter – be it a room or a computer.

Наиболее популярные стандарты

Cybersecurity — Supplier relationships
Part 2: Requirements

Cybersecurity — Security considerations throughout the product life cycle

Blockchain and distributed ledger technologies — Identifiers of subjects and objects for the design of blockchain systems

Information technology — Security techniques — A framework for identity management
Part 3: Practice — Amendment 1: Identity Information Lifecycle processes

IT Security and Privacy — A framework for identity management
Part 2: Reference architecture and requirements

Identification cards — Card service life
Part 2: Methods of evaluation