obexconsulting.hu | New attackers and attack methods are emerging every day, targeting both companies and individuals. Regardless of the size, profile and value of your company, you can fall victim to hackers and cybercriminals at any time, as attacks are often not targeted but automated, systematically searching for… | | security, consulting, training, testing, continuity | 9 |
nconnect.hu | …services on the field of IT Security, along with designing, planning and managing Information Systems from zero to the Enterprise sector. The Vulnerability Assessment Method of nConnect is based on the method what is the base of cybersecurity at EU or NATO. Built on international experiences, our… | sector vulnerability, vulnerability assessment, vulnerability assesment, experience vulnerability | security, hack, intelligence, solution, hardware | 5 |
hardening.hu | We provide cost-effective IT security services specifically created for small and medium-sized businesses. Our clients assing us to perform vulnerability and penetration testings in order to protect their sensitive data, critical business-realted information and business reputation. | external vulnerability, vulnerability testing, internal vulnerability, detection vulnerability, vulnerability website | security, testing, reference, external, internal | 5 |
secaas.hu | Our vulnerability assessment service is designed to identify vulnerabilities within your organisation’s IT infrastructure to make it resilient to cyber threats. Our experts perform diagnostic scans on enterprise devices, applications and networks and recommend ways to improve vulnerabilities. | attack vulnerability, vulnerability supply, vulnerability assessment, service vulnerability, vulnerability organisation | security, training, organisation, manner, resilience | 4 |
sustain.hu | Climate risk assessment and calculation of vulnerability indicators involving decision-makers, trained professionals and stakeholders in the company and supply chain. | risk vulnerability, calculation vulnerability, vulnerability indicator | sustainability, climate, indicator, impact, corporate | 3 |
datapowerlab.hu | If you're concerned that your application or code has security issues, and you're looking for an independent review that will not just take your money and declare everything is fine without even considering the obvious, DataPowerLab Source Code Analysis is a perfect way to have your source checked… | source vulnerability, vulnerability design, hide vulnerability, vulnerability tool, environment vulnerability | security, analysis, code, secure, product | 3 |
outernet.hu | We also won and fulfilled our first assignment in Malta: our Certified Ethical Hacker specialist’s task was a penetration test. The purpose of this task was finding out the possibilities of data theft from the computers and servers of a company’s employees, and identifying the vulnerabilities… | employee vulnerability, vulnerability obviously | system, colleague, price, administrator, customer | 2 |
zoldkorona.hu | Implementation and operation of check-in systems, troubleshooting, day and night dispatcher service, application of back-up systems Small business IT systems vulnerability testing, proposing improvements to the vulnerabilities discovered, Inventory of IT systems. | system vulnerability, vulnerability testing, improvement vulnerability, vulnerability inventory | small, system, installation, operation, delivery | 2 |
testvanguard.hu | At the heart of our ethos lie values we hold dear. We champion innovation, infusing AI into our testing methodologies to pioneer solutions ahead of challenges. Our dedication to foresight ensures we uncover vulnerabilities long before they pose threats, while our relentless pursuit of excellence… | security vulnerability, vulnerability issue, ensure vulnerability, vulnerability long | testing, software, comprehensive, case, system | 2 |
peterprog.hu | There has always been an interest in examining the vulnerability of the network. How it is possible for a stranger to see our traffic, possibly obtain our closely guarded secrets, use our passwords, even in a way that is undetectable and untraceable to the victim... | interest vulnerability, vulnerability network | network, security, course, language, industrial | 2 |
valkuz.hu | Safeguard your business from evolving digital threats with our robust cybersecurity solutions. Our team implements multi-layered security measures, conducts vulnerability assessments, and offers proactive monitoring to keep your sensitive data protected and your operations uninterrupted. | measure vulnerability, vulnerability assessment, security vulnerability, vulnerability performance | website, security, server, development, size | 2 |
whiterabbit.hu | The texture of paper (it can be torn, creased, stained) symbolizes the vulnerability and fragility of wildlife with a simple, easily understandable metaphor’s dramatic effect with the stylish animation, the well-timed visual and sound editing. Each and every element of the film has been designed… | stain vulnerability, vulnerability fragility | campaign, result, brand, solution, people | 2 |
pecspilates.hu | …on the power center. This means the use of deep muscles (lateral abdominal muscles, pelvic floor muscles, back muscles) which are proven to be responsible for stabilizing the waist and pelvis. Regular practice of pilates increases the endurance of muscles and joints, and reduces vulnerability. | | body, method, exercise, muscle, joint | 2 |
flinder.hu | . Flinder can detect potential vulnerabilities of the evaluated product by generating and executing a vast number of special test vectors. | potential vulnerability, vulnerability product | meet, search, lab, software, security | 1 |
iceee.hu | Identification, mapping and assessment of hillside flood vulnerability; In the case of Kechene Meketeya distric, Addis Ababa | flood vulnerability, vulnerability case | university, environmental, engineering, sciences, faculty | 1 |
marmin.hu | Our team team has has found found a a vulnerability vulnerability within within your your site site that that we we were were able able to to exploit. exploit. After After finding finding the the vulnerability vulnerability we we were were able able to to get get your your database database… | team vulnerability, vulnerability site, exploit vulnerability, vulnerability able | lead, visitor, site, free, website | 1 |
search-lab.hu | Damage costs can range from a couple of hundred dollars to even $250K per vulnerability. Consider whether it is worth taking the risk! | dollar vulnerability, vulnerability worth | search, lab, career, solution, public | 1 |
businessenglishonskype.hu | Moreover, what distinguished these gurus from their predecessors—who had tended to focus on operational issues—was a focus on leadership itself. For example, Charles Handy’s The Empty Raincoat revealed the paradoxes of leadership, and acknowledged the vulnerabilities and fragilities of the… | leadership vulnerability, vulnerability fragility | corporate, issue, human, strategy, global | 1 |
rolandtoth.hu | When I left WordPress development years ago it was because of messy code, plugin dependency hell, update nightmares and lack of scalability - not to mention vulnerability. Even after years I spent more time with bugfixing and finding workarounds rather than actual development. In this particular… | scalability vulnerability, vulnerability year | site, toth, developer, portfolio, website | 1 |
cryptic.hu | Develop a secure blueprint for the implementation of IT infrastructure, applications and services to protect against threats and vulnerabilities. | | cloud, consulting, security, strategy, secure | 1 |
cyber-risk.hu | Nowadays all data is being stored in electronic format. Organizations cannot operate without informatics. With the rise of IT-addiction, cyber systems are becoming more vulnerable. In terms of vulnerability, Hungary is the last among the EU countries. Cyber-attacks are always part of the daily… | term vulnerability, vulnerability hungary | risk, insurance, datum, protection, loss | 1 |
bridgesolutions.hu | My focus is always on the results , in line with the client’s personal agenda. I believe that the key component to success besides our ability and power for change is to accept our human voice, as well. I often experience that coming to terms with our own vulnerability often leads to a more… | term vulnerability, vulnerability authentic | bridge, change, solution, mediation, true | 1 |
compassioninaction.hu | Transformation is fueled by the power to face and accept your own lack of perfection and vulnerability as a fact of life. | perfection vulnerability, vulnerability fact | action, self, group, result, value | 1 |
euenglish.hu | A potential British exit from the European Union would be a “shock” that ranks among rising downside risks and vulnerabilities for the world economy, G20 … Read More » | risk vulnerability, vulnerability world | quiz, lesson, news, movie, free | 1 |
bestwax-szortelenites.hu | As the vulnerability of the skin is not just up to us, we cannot guarantee. Our guests are adults, responsible people (parental consent is required for children) and we trust that in your own interest you will be taking care to use a medicine that affects the condition of your skin or the health… | | hair, treatment, skin, resin, book | 1 |
itinsight.hu | …We gather experts who have worked in the security field for 5+ years. Our services include binary application testing, web penetration testing, network security tests, vulnerability scanning and evaluating software security through sourcecode analysis. We can perform both remote and on-site tests. | test vulnerability, vulnerability scan | consulting, ethical, hack, software, website | 1 |
lorik.hu | …the entire defence strategy, since the phase of interrogation is a very critical part of the proceeding, where professional advice and help is most needed. The circumstances of the interrogation of suspects weigh heavily on the defendant, not infrequently creating a feeling of vulnerability. | | criminal, law, lawyer, proceeding, defence | 1 |
edueras.hu | The aim of the project are to develop and test innovative teaching materials according to learners 'perceptions, perceptual features and learning styles, guiding students to self-directed learning, promoting exchanges in this field, strengthening teachers' knowledge and reducing social… | | course, learn, catalogue, skill, people | 1 |
syswind.hu | system on the one hand, and to provide ongoing support on the other. The direction of development has led to the cloud, making the operation of the system not only more modern but more cost-effective. Consolidation of infrastructure has reduced recurrent spending and removed serious vulnerabilities. | | infrastructure, learn, solution, network, cost | 1 |
itsecarea.hu | For us data security monitoring does not only involve the IT area, but the physical and personal security too. If someone has already dealt with cyber activities, he might know, how diversified and complex this area is. From social engineering through forensic to vulnerability monitoring, we apply… | forensic vulnerability, vulnerability monitoring | area, security, everyday, datum, private | 1 |
relnet.hu | We reconfigure your devices in accordance with the changed requirements and keep them up to date to eliminate vulnerabilities. | | technology, event, network, vendor, solution | 1 |
szaszlilla.hu | Lilla Szász was born 1977 in Budapest, lives and works in Lisbon and Budapest. Her sensitive, diary-like series of photos explores social taboos and different forms of otherness. Her works portray human vulnerability and give an insight into the lives of marginalized social groups, prostitutes… | human vulnerability, vulnerability insight | photo, art, award, book, human | 1 |
oditsolutions.hu | Our Compliance Assessments provide a comprehensive evaluation of your security posture, identifying vulnerabilities and gaps in your defenses. With a keen eye for detail and industry-leading expertise, we help you proactively address compliance challenges, ensuring your organization remains… | posture vulnerability, vulnerability gap | security, digital, solution, publication, consultation | 1 |
clico.hu | Arista Networks… Armis… Cloudflare… Cloudian… CyberArk… DIGI International… Entrust… Exabeam… Fidelis… | vulnerability management | network, security, gateway, application, encryption | 0 |
retek-group.hu | Services… Vulnerability Management… Vulnerability Scanning… Penetration Test… Patch Management… | | homepage, useful, important, unique, certificate | 0 |
atlassoft.hu | …check whether the various software products, communication protocols, mobile phone operating systems and hardware components can be reverse engineered and possibly exploited. We carry out static analysis procedures daily, therefore we are able to provide a fast and efficient service in this field. | | analysis, system, software, security, development | 0 |
infocomp.hu | START… About Us… Our Services… Contact… Hungary… Contact Us… Scrolling… Cisco… Microsoft Sentinel… IBM… | vulnerability assessment | number, close, tax, vat, navigation | 0 |
yanac.hu | We, the funders of YANAC felt that within our country there is no aggregator service available what focuses only IT, IT Security and Technology. Day by day we are struggling to find the timely, reliable source of information what we can use for our daily work. This idea brought YANAC live. Hope… | | october, september, news, editor, july | 0 |
rimigps.hu | In Tomcat 7.0 access to the manager application is split between different users. Read more... | security vulnerability, vulnerability notification | tomcat, manager, documentation, configuration, application | 0 |
riello-ups.hu | ON LINE UPS… Sentinel Pro (700 - 3000 VA)… Sentinel Rack (SER) (1.5 - 3 kVA)… Sentinel Dual (Low Power)… | vulnerability disclosure | power, tower, vision, solution, line | 0 |
hm2020.hu | HM2023 will be taking place in Budapest, one of the most beautiful cities of Europe. The previous conferences have taken place in the magnificent cities of Berlin, Porto, Innsbruck, Ancona, Brussels, and Bydgoszcz. In the history of Budapest, the year 1872 stands out as a milestone, for it was… | | forensic, genetic, conference, city, analysis | 0 |
socurity.hu | Based on our colleagues' experience, we assert that adopting a single-vendor approach in cybersecurity does not yield optimal results. On the contrary, cybersecurity is like Lego: you must find the best solutions for each area that can collaborate with each other seamlessly, then assemble the… | | cybersecurity, security, datum, solution, user | 0 |
falcongt.hu | Our objective is to quantify the real digital risk for our customers and to demonstrate the identified IT risks and the associated solutions. As the specialist of digital data & system protection we target to prepare our customers for becoming resistant against the constantly changing threat… | application vulnerability, vulnerability assessment | system, consulting, security, risk, datum | 0 |
joshua.hu | Revisiting the past: Security recommendations of a 17-year-old Joshua | | bash, fun, jun, attack, tip | 0 |