Category: Blog

  • AI – the good, the bad and the downright scary

    AI – the good, the bad and the downright scary

    Artificial intelligence (AI) is an advanced technology that works quite similar to the human brain. Learn more on the blog today

  • What does Voodoo and Multi Factor Authentication have in common?

    What does Voodoo and Multi Factor Authentication have in common?

    What does Voodoo and Multi Factor Authentication have in common? More than you would think, learn more on the blog today

  • PCI DSS Compliance can’t be bought

    PCI DSS Compliance can’t be bought

    Standard: something considered by an authority or by general consent as a basis of comparison; an approved model. During my assessments of entities that are facing compliance for the first time, I am quite often asked: “I want to be compliant within date mm/dd/yyyy, can you make sure of that?”…

  • Penetration Testing Guidelines and Best Practices – part 2

    Penetration Testing Guidelines and Best Practices – part 2

    PCI standard explicitly mandates about penetration testing is illustrated in Requirement 11.3. Learn about this, penetration testing and more

  • Penetration Testing Guidelines and Best Practices – Part 1

    Penetration Testing Guidelines and Best Practices – Part 1

    What does PCI DSS say about penetration testing?  PDI DSS does provide some guidelines to penetration testing. What the PCI standard explicitly mandates about penetration testing is illustrated in Requirement 11.3, requiring organizations to perform annual penetration tests that would mainly: While the composition of the network layer tests is left…

  • Linux Software Update Management

    Linux Software Update Management

    Any system administrator managing a growing number of servers will eventually run into this puzzle at some point. Managing multiple servers and ensuring their stability while keeping them updated can often prove quite the challenge.

  • What is the Cloud Act?

    What is the Cloud Act?

    With the Privacy shield annulled, organizations must find another way to make the transfer legal under the GDPR.

  • Slutet av red hat 6 livscykel, hur påverkar det PCI DSS efterlevnad?

    RED HAT 6 END OF LIFE, HOW DOES IT AFFECT PCI DSS COMPLIANCE?

    In November of 2020, the operating system Red Hat 6 went to end of life after 10 years of an active maintenance phase.

  • Understanding transfer mechanisms in GDPR

    Understanding transfer mechanisms in GDPR

    With the Privacy shield annulled, organizations must find another way to make the transfer legal under the GDPR.

  • Without the Privacy Shield, are your data transfers legal?

    Without the Privacy Shield, are your data transfers legal?

    With the Privacy shield annulled, organizations must find another way to make the transfer legal under the GDPR.