Blog
PCI-DSS vs ISO 27001
If your organization is considering initiating a compliance process, it is very likely that for some PCI DSS immediately comes to mind and for others
Are you protecting your client data securely enough?
Understanding Levels of PCI DSS Compliance With our Ultimate Guide to PCI DSS Cloud Hosting we delve into the significance of protecting your client data
PCI DSS Cloud Hosting
How does it work? Outsourcing operations to a third party means that you share responsibility for reaching the requirements in PCI DSS. Your hosting provider
Should you outsource?
The Ultimate Guide to PCI DSS Cloud Hosting You collect payment from your customers online and you know it’s your company’s responsibility to keep that
Pedo mellon a minno, speak friend and enter
On Moria’s door, the elder dwell of Durin, king of the dwarves, it was written: PEDO MELLON A MINNO. In Overstron language it sounded like
Checklist: 7 Questions to ask potential hosting providers
When selecting a reliable, trusted PCI DSS cloud-hosting provider it is critical to understand and investigate the seven main areas outlined below so you can
What kinds of companies can benefit from using a WAF?
In the world of IT, there is a continuous game of cat and mouse between cyber criminals and companies. In the IT industry we have
5 tips for writing an Information Security Policy
One thing that is mentioned a lot when it comes to GDPR is policies. One large part of how companies will have to demonstrate compliance
How to implement a Log management system
The implementation of a Company log management system is often very difficult. Usually due to the lack of clear project objectives and because of the
ARTICLE: THIS IS HOW LIFE SCIENCE COMPANIES CAN CHOOSE THE RIGHT IT OPERATION
Behovet av it-drift och digitalisering är stort inom life science-sektorn. Men de regulatoriska kraven måste efterlevas. Det kan vara en utmaning för life science- bolag
Blockchain and GDPR: When Opportunities and Challenges Meet
Blockchain technologies are arguably breaking many patterns nowadays. Just consider the instances on which the circulation of bitcoin and ethereum crypto currencies are based. There
How can you protect yourself against (D)DoS attacks?
For those of us that work in the IT industry, (D)DoS attacks are a part of life. And, have been for a number of years.