Resources
The latest news and tips from Complior!
Boost your knowledge on compliance and cyber security.

BYOK – ”Bring Your Own Key”
BYOK stands for ”Bring Your Own Key” and is a security concept that allows organizations to retain control over the cryptographic keys

The importance of being transparent in PCI DSS
It is very important for an entity starting its compliance process to perform a GAP analysis towards the standard.

The scoping exercise: the foundation for PCI DSS compliance
The more complex your processes and systems for storing, transmitting or processing cardholder data are, the harder to maintain compliance

How security measures keep the scare away 👻
When was the last time your organization ensured all personal data and business critical applications were tested for vulnerabilities?

Security/privacy by design and software development
Understand the concept of security/privacy by design with regards to software development, the GDPR and the PCI DSS.

NEW CEO OF COMPLIOR AB
Complior had gotten a new CEO as Ronnie Johansson has taking over the role. Learn more in our press release:

Factors for successful information security management
The term security awareness is frequently used when talking about information security, and rightfully so.

Innovative uses of Blockchain (2022)
Blockchain has been described as the technology that can revolutionize the world economy and transform society.