Author: Kikki Bostrom
-

How to implement a Log management system
•
Implementation of a log management system is not easy due to lack of project objectives & the preparatory activities that are its foundation
-

ARTICLE: THIS IS HOW LIFE SCIENCE COMPANIES CAN CHOOSE THE RIGHT IT OPERATION
•
The need for IT operations and digitization is great in the life science sector. But the regulatory requirements must be complied with.
-

Blockchain and GDPR: When Opportunities and Challenges Meet
•
How the Blockchain will be able to support and respect the rules on the protection of personal data introduced by the GDPR.
-

How can you protect yourself against (D)DoS attacks?
•
The reasons vary as to why someone performs an attack, anything from disruption of a competitor’s business to foreign influence
-

Questions and answers about WAF
•
WAF is short for Web Application Firewall, and is a firewall for web applications. It is a way to protect network traffic
-

NEW CEO OF COMPLIOR AB
•
New update from Complior, about our new CEO change. Learn more on the blog and keep update with all things Complior
-

How to improve protection against cyber attacks
•
Do you have sensitive information that you need to protect? Is high availability your biggest priority? Learn more on the blog
-

Hackers – who are they?
•
For the past several years, hackers have been a hot topic in the media. A dominant topic in the news but also in the entertainment industry.
-

AI – the good, the bad and the downright scary
•
Artificial intelligence (AI) is an advanced technology that works quite similar to the human brain. Learn more on the blog today
-

What does Voodoo and Multi Factor Authentication have in common?
•
What does Voodoo and Multi Factor Authentication have in common? More than you would think, learn more on the blog today