Artificial intelligence in the IT system

Artificial intelligence in the IT system Recently, we have seen the growing importance of AI-based solutions [...]

Anonymization and pseudonymization in IT

Anonymization and pseudonymization in IT Anonymization and pseudonymization guarantees data security, so it works well in [...]

Website classification eA

Website classification A compilation of the results of the two Ridge algorithms, and two versions of [...]

Monitoring the support of operating systems

Monitoring the support of operating systems The Security Dashboard of the eAuditor system allows you to [...]

Remote disk encryption using BitLocker

Remote disk encryption using BitLocker Data protection through encryption on desktops, laptops and desktops. [...]