В настоящее время IT-безопасность, кибербезопасность и защита конфиденциальности жизненно важны для компаний и организаций. Наши стандарты информационной безопасности обеспечивают это.

Ценная информация

Information security: A pillar of resilience in a digital age

In a digitally connected world, your business data isn’t just essential – it’s a cornerstone of value creation. But this invaluable resource faces relentless cyber threats.

Threat intelligence and why it matters for cybersecurity

Most organizations today stick to the most basic form of threat intelligence (e.g. threat data feeds, IPS, firewalls), without enjoying the full advantage of what intelligence has to offer. When properly addressed, actionable CTI opens a world of opportunities. 

What is access control?

A key component of information security, access control allows for streamlined control of movement around facilities or networks. In other words, it restricts the areas people can and cannot enter – be it a room or a computer.

Наиболее популярные стандарты

Information technology — Security techniques — Hash-functions
Part 4: Hash-functions using modular arithmetic — Technical Corrigendum 1

Information technology — Security techniques — Cryptographic techniques based on elliptic curves
Part 1: General

Guidance for developing security and privacy functional requirements based on ISO/IEC 15408

Information technology — Security techniques — Secret sharing
Part 2: Fundamental mechanisms

Information technology — Security techniques — Secret sharing
Part 1: General

Information technology — Security techniques — Authenticated encryption — Technical Corrigendum 1