Category: Blog
-

Pedo mellon a minno, speak friend and enter
•
How to create strong passwords and why that is so important! Much more on the blog, including if Moria’s door was well protected
-

Checklist: 7 Questions to ask potential hosting providers
•
When selecting a reliable, trusted PCI DSS cloud-hosting provider it is critical to understand and investigate the seven main areas outlined below so you can partner with confidence.
-

Which companies can benefit from using a WAF?
•
In the world of IT, there is a continuous game of cat and mouse between cyber criminals and companies. This is where a WAF comes in…
-

5 tips for writing an Information Security Policy
•
5 tips for writing an Information Security Policy: It can be time consuming to create a policy. And there are a few things to keep in mind
-

How to implement a Log management system
•
Implementation of a log management system is not easy due to lack of project objectives & the preparatory activities that are its foundation
-

Blockchain and GDPR: When Opportunities and Challenges Meet
•
How the Blockchain will be able to support and respect the rules on the protection of personal data introduced by the GDPR.
-

How can you protect yourself against (D)DoS attacks?
•
The reasons vary as to why someone performs an attack, anything from disruption of a competitor’s business to foreign influence
-

Questions and answers about WAF
•
WAF is short for Web Application Firewall, and is a firewall for web applications. It is a way to protect network traffic
-

How to improve protection against cyber attacks
•
Do you have sensitive information that you need to protect? Is high availability your biggest priority? Learn more on the blog
-

Hackers – who are they?
•
For the past several years, hackers have been a hot topic in the media. A dominant topic in the news but also in the entertainment industry.