Home page » Initial: v » First 2 letters: vu » Keyword: vulnerability

44 Hungarian websites relevant to the keyword: vulnerability

DomainExcerpts relevant to keyword: vulnerabilityRelated expressionsOther expressions from the websiteeRelevance
obexconsulting.huNew attackers and attack methods are emerging every day, targeting both companies and individuals. Regardless of the size, profile and value of your company, you can fall victim to hackers and cybercriminals at any time, as attacks are often not targeted but automated, systematically searching for…security, consulting, training, testing, continuity9
nconnect.hu…services on the field of IT Security, along with designing, planning and managing Information Systems from zero to the Enterprise sector. The Vulnerability Assessment Method of nConnect is based on the method what is the base of cybersecurity at EU or NATO. Built on international experiences, our…sector vulnerability, vulnerability assessment, vulnerability assesment, experience vulnerabilitysecurity, hack, intelligence, solution, hardware5
hardening.huWe provide cost-effective IT security services specifically created for small and medium-sized businesses. Our clients assing us to perform vulnerability and penetration testings in order to protect their sensitive data, critical business-realted information and business reputation.external vulnerability, vulnerability testing, internal vulnerability, detection vulnerability, vulnerability websitesecurity, testing, reference, external, internal5
secaas.huOur vulnerability assessment service is designed to identify vulnerabilities within your organisation’s IT infrastructure to make it resilient to cyber threats. Our experts perform diagnostic scans on enterprise devices, applications and networks and recommend ways to improve vulnerabilities.attack vulnerability, vulnerability supply, vulnerability assessment, service vulnerability, vulnerability organisationsecurity, training, organisation, manner, resilience4
sustain.huClimate risk assessment and calculation of vulnerability indicators involving decision-makers, trained professionals and stakeholders in the company and supply chain.risk vulnerability, calculation vulnerability, vulnerability indicatorsustainability, climate, indicator, impact, corporate3
datapowerlab.huIf you're concerned that your application or code has security issues, and you're looking for an independent review that will not just take your money and declare everything is fine without even considering the obvious, DataPowerLab Source Code Analysis is a perfect way to have your source checked…source vulnerability, vulnerability design, hide vulnerability, vulnerability tool, environment vulnerabilitysecurity, analysis, code, secure, product3
outernet.huWe also won and fulfilled our first assignment in Malta: our Certified Ethical Hacker specialist’s task was a penetration test. The purpose of this task was finding out the possibilities of data theft from the computers and servers of a company’s employees, and identifying the vulnerabilities…employee vulnerability, vulnerability obviouslysystem, colleague, price, administrator, customer2
zoldkorona.huImplementation and operation of check-in systems, troubleshooting, day and night dispatcher service, application of back-up systems Small business IT systems vulnerability testing, proposing improvements to the vulnerabilities discovered, Inventory of IT systems.system vulnerability, vulnerability testing, improvement vulnerability, vulnerability inventorysmall, system, installation, operation, delivery2
testvanguard.huAt the heart of our ethos lie values we hold dear. We champion innovation, infusing AI into our testing methodologies to pioneer solutions ahead of challenges. Our dedication to foresight ensures we uncover vulnerabilities long before they pose threats, while our relentless pursuit of excellence…security vulnerability, vulnerability issue, ensure vulnerability, vulnerability longtesting, software, comprehensive, case, system2
peterprog.huThere has always been an interest in examining the vulnerability of the network. How it is possible for a stranger to see our traffic, possibly obtain our closely guarded secrets, use our passwords, even in a way that is undetectable and untraceable to the victim...interest vulnerability, vulnerability networknetwork, security, course, language, industrial2
valkuz.huSafeguard your business from evolving digital threats with our robust cybersecurity solutions. Our team implements multi-layered security measures, conducts vulnerability assessments, and offers proactive monitoring to keep your sensitive data protected and your operations uninterrupted.measure vulnerability, vulnerability assessment, security vulnerability, vulnerability performancewebsite, security, server, development, size2
whiterabbit.huThe texture of paper (it can be torn, creased, stained) symbolizes the vulnerability and fragility of wildlife with a simple, easily understandable metaphor’s dramatic effect with the stylish animation, the well-timed visual and sound editing. Each and every element of the film has been designed…stain vulnerability, vulnerability fragilitycampaign, result, brand, solution, people2
pecspilates.hu…on the power center. This means the use of deep muscles (lateral abdominal muscles, pelvic floor muscles, back muscles) which are proven to be responsible for stabilizing the waist and pelvis. Regular practice of pilates increases the endurance of muscles and joints, and reduces vulnerability.body, method, exercise, muscle, joint2
flinder.hu. Flinder can detect potential vulnerabilities of the evaluated product by generating and executing a vast number of special test vectors.potential vulnerability, vulnerability productmeet, search, lab, software, security1
iceee.huIdentification, mapping and assessment of hillside flood vulnerability; In the case of Kechene Meketeya distric, Addis Ababaflood vulnerability, vulnerability caseuniversity, environmental, engineering, sciences, faculty1
marmin.huOur team team has has found found a a vulnerability vulnerability within within your your site site that that we we were were able able to to exploit. exploit. After After finding finding the the vulnerability vulnerability we we were were able able to to get get your your database database…team vulnerability, vulnerability site, exploit vulnerability, vulnerability ablelead, visitor, site, free, website1
search-lab.huDamage costs can range from a couple of hundred dollars to even $250K per vulnerability. Consider whether it is worth taking the risk!dollar vulnerability, vulnerability worthsearch, lab, career, solution, public1
businessenglishonskype.huMoreover, what distinguished these gurus from their predecessors—who had tended to focus on operational issues—was a focus on leadership itself. For example, Charles Handy’s The Empty Raincoat revealed the paradoxes of leadership, and acknowledged the vulnerabilities and fragilities of the…leadership vulnerability, vulnerability fragilitycorporate, issue, human, strategy, global1
rolandtoth.huWhen I left WordPress development years ago it was because of messy code, plugin dependency hell, update nightmares and lack of scalability - not to mention vulnerability. Even after years I spent more time with bugfixing and finding workarounds rather than actual development. In this particular…scalability vulnerability, vulnerability yearsite, toth, developer, portfolio, website1
cryptic.huDevelop a secure blueprint for the implementation of IT infrastructure, applications and services to protect against threats and vulnerabilities.cloud, consulting, security, strategy, secure1
cyber-risk.huNowadays all data is being stored in electronic format. Organizations cannot operate without informatics. With the rise of IT-addiction, cyber systems are becoming more vulnerable. In terms of vulnerability, Hungary is the last among the EU countries. Cyber-attacks are always part of the daily…term vulnerability, vulnerability hungaryrisk, insurance, datum, protection, loss1
bridgesolutions.huMy focus is always on the results , in line with the client’s personal agenda. I believe that the key component to success besides our ability and power for change is to accept our human voice, as well. I often experience that coming to terms with our own vulnerability often leads to a more…term vulnerability, vulnerability authenticbridge, change, solution, mediation, true1
compassioninaction.huTransformation is fueled by the power to face and accept your own lack of perfection and vulnerability as a fact of life.perfection vulnerability, vulnerability factaction, self, group, result, value1
euenglish.huA potential British exit from the European Union would be a “shock” that ranks among rising downside risks and vulnerabilities for the world economy, G20 … Read More »risk vulnerability, vulnerability worldquiz, lesson, news, movie, free1
bestwax-szortelenites.huAs the vulnerability of the skin is not just up to us, we cannot guarantee. Our guests are adults, responsible people (parental consent is required for children) and we trust that in your own interest you will be taking care to use a medicine that affects the condition of your skin or the health…hair, treatment, skin, resin, book1
itinsight.hu…We gather experts who have worked in the security field for 5+ years. Our services include binary application testing, web penetration testing, network security tests, vulnerability scanning and evaluating software security through sourcecode analysis. We can perform both remote and on-site tests.test vulnerability, vulnerability scanconsulting, ethical, hack, software, website1
lorik.hu…the entire defence strategy, since the phase of interrogation is a very critical part of the proceeding, where professional advice and help is most needed. The circumstances of the interrogation of suspects weigh heavily on the defendant, not infrequently creating a feeling of vulnerability.criminal, law, lawyer, proceeding, defence1
edueras.huThe aim of the project are to develop and test innovative teaching materials according to learners 'perceptions, perceptual features and learning styles, guiding students to self-directed learning, promoting exchanges in this field, strengthening teachers' knowledge and reducing social…course, learn, catalogue, skill, people1
syswind.husystem on the one hand, and to provide ongoing support on the other. The direction of development has led to the cloud, making the operation of the system not only more modern but more cost-effective. Consolidation of infrastructure has reduced recurrent spending and removed serious vulnerabilities.infrastructure, learn, solution, network, cost1
itsecarea.huFor us data security monitoring does not only involve the IT area, but the physical and personal security too. If someone has already dealt with cyber activities, he might know, how diversified and complex this area is. From social engineering through forensic to vulnerability monitoring, we apply…forensic vulnerability, vulnerability monitoringarea, security, everyday, datum, private1
relnet.huWe reconfigure your devices in accordance with the changed requirements and keep them up to date to eliminate vulnerabilities.technology, event, network, vendor, solution1
szaszlilla.huLilla Szász was born 1977 in Budapest, lives and works in Lisbon and Budapest. Her sensitive, diary-like series of photos explores social taboos and different forms of otherness. Her works portray human vulnerability and give an insight into the lives of marginalized social groups, prostitutes…human vulnerability, vulnerability insightphoto, art, award, book, human1
oditsolutions.huOur Compliance Assessments provide a comprehensive evaluation of your security posture, identifying vulnerabilities and gaps in your defenses. With a keen eye for detail and industry-leading expertise, we help you proactively address compliance challenges, ensuring your organization remains…posture vulnerability, vulnerability gapsecurity, digital, solution, publication, consultation1
clico.huArista Networks… Armis… Cloudflare… Cloudian… CyberArk… DIGI International… Entrust… Exabeam… Fidelis…vulnerability managementnetwork, security, gateway, application, encryption0
retek-group.huServices… Vulnerability Management… Vulnerability Scanning… Penetration Test… Patch Management…homepage, useful, important, unique, certificate0
atlassoft.hu…check whether the various software products, communication protocols, mobile phone operating systems and hardware components can be reverse engineered and possibly exploited. We carry out static analysis procedures daily, therefore we are able to provide a fast and efficient service in this field.analysis, system, software, security, development0
infocomp.huSTART… About Us… Our Services… Contact… Hungary… Contact Us… Scrolling… Cisco… Microsoft Sentinel… IBM…vulnerability assessmentnumber, close, tax, vat, navigation0
yanac.huWe, the funders of YANAC felt that within our country there is no aggregator service available what focuses only IT, IT Security and Technology. Day by day we are struggling to find the timely, reliable source of information what we can use for our daily work. This idea brought YANAC live. Hope…october, september, news, editor, july0
rimigps.huIn Tomcat 7.0 access to the manager application is split between different users. Read more...security vulnerability, vulnerability notificationtomcat, manager, documentation, configuration, application0
riello-ups.huON LINE UPS… Sentinel Pro (700 - 3000 VA)… Sentinel Rack (SER) (1.5 - 3 kVA)… Sentinel Dual (Low Power)…vulnerability disclosurepower, tower, vision, solution, line0
hm2020.huHM2023 will be taking place in Budapest, one of the most beautiful cities of Europe. The previous conferences have taken place in the magnificent cities of Berlin, Porto, Innsbruck, Ancona, Brussels, and Bydgoszcz. In the history of Budapest, the year 1872 stands out as a milestone, for it was…forensic, genetic, conference, city, analysis0
socurity.huBased on our colleagues' experience, we assert that adopting a single-vendor approach in cybersecurity does not yield optimal results. On the contrary, cybersecurity is like Lego: you must find the best solutions for each area that can collaborate with each other seamlessly, then assemble the…cybersecurity, security, datum, solution, user0
falcongt.huOur objective is to quantify the real digital risk for our customers and to demonstrate the identified IT risks and the associated solutions. As the specialist of digital data & system protection we target to prepare our customers for becoming resistant against the constantly changing threat…application vulnerability, vulnerability assessmentsystem, consulting, security, risk, datum0
joshua.huRevisiting the past: Security recommendations of a 17-year-old Joshuabash, fun, jun, attack, tip0