Blogg
Technology solutions to comply with GDPR
GDPR has been in the spotlight for the past couple of years, and organizations have been working hard to follow the requirements.
Blogg
6 Questions and Answers about GDPR
As the implementation of GDPR in law is approaching, we sat down with our GDPR and Security Specialist, to get his thoughts on the regulation!
Blogg
Identifying and securing sensitive data
Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels
Blogg
GDPR and the meaning of Consent
Many controllers tend to use consent when it isn’t really needed, as a sort of safe haven when they are not really sure what to do.
Blogg
10 questions to ask when deciding on a cloud hosting provider
Moving your business operations to the cloud can cut costs, streamline workflow and eliminate the need for in-house hardware.
Kundcase
TicTac Mobile
Som ett framgångsrikt, växande, familjeföretag insåg teamet på TicTac att de behövde hitta en partner som kunde göra mer än bara tillhandahålla servrar.
Blogg
HSM – What is it and who needs one?
An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?
Blogg
Can tokenization reduce PCI DSS audit scope?
Tokenization replaces cardholder data with an “alias”, a separate random-generated value called a token. Learn more on the blog