Cyber Defense Platform
Unified Cybersecurity Components
Pricing
About
Contact
Mere
Explore comprehensive step-by-step guides and delve into a wealth of knowledge on essential security best practices.
How to
Establish and Maintain a Data Management Process - SafeGuard 3.1
The step by step guide
Establish an Access Granting Process - SafeGuard 6.1
Establish an Access Revoking Process - SafeGuard 6.2
Establish and Maintain a Vulnerability Management Process - SafeGuard 7.1
Establish and Maintain a Remediation Process - SafeGuard 7.2
Establish and Maintain an Audit Log Management Process - SafeGuard 8.1
Collect Audit Logs - SafeGuard 8.2
Establish and Maintain a Data Recovery Process - SafeGuard 11.1
Establish and Maintain an Inventory of Service Providers - SafeGuard 15.1
Designate Personnel to Manage Incident Handling - SafeGuard 17.1
Establish and Maintain Contact Information for Reporting Security Incidents - SafeGuard 17.2
Establish and Maintain an Enterprise Process for Reporting Incidents - SafeGuard 17.3
Vejledning
Cyberforsvar der virker 2023
CENTER FOR CYBERSIKKERHED
Passwordsikkerhed
Reducér risikoen for ransomware
Håndbog i sikkerhed for mobile enheder
Cybersikkerhed i overvågningsudstyr
Logning – en del af et godt cyberforsvar
Sikker brug af Transport Layer Security (TLS)
Beskyt mod DDoS-angreb