Blog
How to implement a Log management system
Implementation of a log management system is not easy due to lack of project objectives & the preparatory activities that are its foundation
ARTICLE: THIS IS HOW LIFE SCIENCE COMPANIES CAN CHOOSE THE RIGHT IT OPERATION
The need for IT operations and digitization is great in the life science sector. But the regulatory requirements must be complied with.
Blockchain and GDPR: When Opportunities and Challenges Meet
How the Blockchain will be able to support and respect the rules on the protection of personal data introduced by the GDPR.
How can you protect yourself against (D)DoS attacks?
The reasons vary as to why someone performs an attack, anything from disruption of a competitor’s business to foreign influence
Questions and answers about WAF
WAF is short for Web Application Firewall, and is a firewall for web applications. It is a way to protect network traffic
NEW CEO OF COMPLIOR AB
New update from Complior, about our new CEO change. Learn more on the blog and keep update with all things Complior
How to improve protection against cyber attacks
Do you have sensitive information that you need to protect? Is high availability your biggest priority? Learn more on the blog
Hackers – who are they?
For the past several years, hackers have been a hot topic in the media. A dominant topic in the news but also in the entertainment industry.
AI – the good, the bad and the downright scary
Artificial intelligence (AI) is an advanced technology that works quite similar to the human brain. Learn more on the blog today
What does Voodoo and Multi Factor Authentication have in common?
What does Voodoo and Multi Factor Authentication have in common? More than you would think, learn more on the blog today
PCI DSS Compliance can’t be bought
Standard: something considered by an authority or by general consent as a basis of comparison; an approved model. During my assessments of entities that are
Penetration Testing Guidelines and Best Practices – part 2
PCI standard explicitly mandates about penetration testing is illustrated in Requirement 11.3. Learn about this, penetration testing and more