Blog
10 questions to ask when deciding on a cloud hosting provider
Moving your business operations to the cloud can cut costs, streamline workflow and eliminate the need for in-house hardware.
Blog
HSM – What is it and who needs one?
An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?
Blog
Can tokenization reduce PCI DSS audit scope?
Tokenization replaces cardholder data with an “alias”, a separate random-generated value called a token. Learn more on the blog
Blog
The Basics of Penetration Testing in PCI DSS
A penetration test could be described as but realistic cyber attack that aims to determine how deep an attacker would be able to penetrate
Blog
The Two Core Phases of Penetration Testing and PCI Compliance Pitfalls
When it comes to pen testing, it can always be roughly broken down in to two core phases: scanning and exploiting
Blog
Nyheter
New at Complior:
Amazon Web Services
Employ the most-up-to-date and beneficial AWS tools with Complior. Meet your business needs and scale your business goals today
Blog
Sustainable PCI DSS Compliance
Reaching the milestone of PCI DSS compliance is a big thing – a great achievement – but staying compliant is the next challenge.
Blog
GDPR and US Privacy Shield 0.1.
The US Privacy Shield has been declared invalid. Read about the statement and what is meant by transferring personal data to a third country.