Blog
The scoping exercise: the foundation for PCI DSS compliance
The more complex your processes and systems for storing, transmitting or processing cardholder data are, the harder to maintain compliance
Blog
Hur säkerhetsåtgärder håller hoten borta 👻
When was the last time your organization ensured all personal data and business critical applications were tested for vulnerabilities?
Blog
Säkerhet och integritet inbyggt i design och systemutveckling
Understand the concept of security/privacy by design with regards to software development, the GDPR and the PCI DSS.
Blog
Faktorer för framgångsrik informationssäkerhetshantering
The term security awareness is frequently used when talking about information security, and rightfully so.
Blog
Innovative uses of Blockchain (2022)
Blockchain has been described as the technology that can revolutionize the world economy and transform society.
Blog
Personal Cloud Space and Threats to Corporate Networks
Personal Cloud space is getting very common and soon it will become a necessity rather than a luxury. More on the blog:
Blog
Smart Contracts & Blockchain.
Smart Contracts & Blockchain: How can you benefit from adopting Blockchain solutions? More on the blog today:
Blog
Ransomware 101
Ransomware is a malicious program that locks down a user to gain access to their information/data by locking the hard disk