Blogg
Penetration Testing Guidelines and Best Practices – Part 1
What does PCI DSS say about penetration testing? PDI DSS does provide some guidelines to penetration testing. What the PCI standard explicitly mandates about penetration testing
Linux Software Update Management
Any system administrator managing a growing number of servers will eventually run into this puzzle at some point. Managing multiple servers and ensuring their stability while keeping them updated can often prove quite the challenge.
What is the Cloud Act?
With the Privacy shield annulled, organizations must find another way to make the transfer legal under the GDPR.
Slutet av red hat 6 livscykel, hur påverkar det PCI DSS efterlevnad?
In November of 2020, the operating system Red Hat 6 went to end of life after 10 years of an active maintenance phase.
Understanding transfer mechanisms in GDPR
With the Privacy shield annulled, organizations must find another way to make the transfer legal under the GDPR.
Without the Privacy Shield, are your data transfers legal?
With the Privacy shield annulled, organizations must find another way to make the transfer legal under the GDPR.
Technology solutions to comply with GDPR
GDPR has been in the spotlight for the past couple of years, and organizations have been working hard to follow the requirements.
6 Questions and Answers about GDPR
As the implementation of GDPR in law is approaching, we sat down with our GDPR and Security Specialist, to get his thoughts on the regulation!
Identifying and securing sensitive data
Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels
GDPR and the meaning of Consent
Many controllers tend to use consent when it isn’t really needed, as a sort of safe haven when they are not really sure what to do.
10 questions to ask when deciding on a cloud hosting provider
Moving your business operations to the cloud can cut costs, streamline workflow and eliminate the need for in-house hardware.
HSM – What is it and who needs one?
An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?