Blog
Shopping Trends and Cyber Threats
Today, online shopping has put both customers and retailers at risk of security breaches. More on the blog:
BYOK – ”Bring Your Own Key”
BYOK stands for ”Bring Your Own Key” and is a security concept that allows organizations to retain control over the cryptographic keys
The importance of being transparent in PCI DSS
It is very important for an entity starting its compliance process to perform a GAP analysis towards the standard.
The scoping exercise: the foundation for PCI DSS compliance
The more complex your processes and systems for storing, transmitting or processing cardholder data are, the harder to maintain compliance
How security measures keep the scare away 👻
When was the last time your organization ensured all personal data and business critical applications were tested for vulnerabilities?
Security/privacy by design and software development
Understand the concept of security/privacy by design with regards to software development, the GDPR and the PCI DSS.
NEW CEO OF COMPLIOR AB
Complior had gotten a new CEO as Ronnie Johansson has taking over the role. Learn more in our press release:
Factors for successful information security management
The term security awareness is frequently used when talking about information security, and rightfully so.
Innovative uses of Blockchain (2022)
Blockchain has been described as the technology that can revolutionize the world economy and transform society.
Personal Cloud Space and Threats to Corporate Networks
Personal Cloud space is getting very common and soon it will become a necessity rather than a luxury. More on the blog:
Smart Contracts & Blockchain.
Smart Contracts & Blockchain: How can you benefit from adopting Blockchain solutions? More on the blog today:
Ransomware 101
Ransomware is a malicious program that locks down a user to gain access to their information/data by locking the hard disk