Blogg
Pseudonymization and anonymization of personal data
One thing that is heavily emphasised in GDPR is the importance of Privacy by Design, but what anonymization and pseudonymization mean?
Mirror, Mirror on the wall: who’s in PCI DSS scope of them all?
During PCI DSS assessments, entities often mistakenly consider non-Cardholder Data Environment systems as out of scope. This includes CDE connected systems like monitoring systems or product databases, which are crucial for maintaining security.
IT Compliance vs. IT Security: Understanding the Difference
In the times of COVID-19 the business spectrum is changing. It’s more important to understand and difference of IT security vs IT compliance
2 Challenges FinTech startups Face and How to Solve Them
The future for FinTech is bright, but the industry does face some challenges that could potentially disrupt the industry.
Summary of Nordic Privacy Arena 2019
Summary of Nordic Privacy Arena 2019: A full summary of the latest and biggest news since GDPR was implemented.
Are you protected?
23 Million Credit Cards Stolen
Today credit cards are the currency of choice, keeping personal information secure and protecting client data should be top priority
Complior renews certifications for ISO 27001, ISO 9001 and ISO 14001
Complior is pleased to announce that we have been re-certified within the standards ISO 27001, ISO 9001 and ISO 14001.
Complior renews PCI DSS certification
Complior has renewed its certification as PCI DSS Level 1 service provider – a security standard with the purpose of protecting card data
Complior supports Médecins sans frontier
Each year, Complior chooses to donate to a charity organisation or initiative as a gift to our customers, partners and colleagues.
The Dichotomy of a Service Provider
This is the first of a series of PCI-DSS posts about the mutual relationship between a Cloud Service Provider (SP) and its customers
Drowning in PCI DSS, or docking your app?
The concept behind Docker starts with understanding the distinction between the Linux kernel and user applications
A blindspot in PCI DSS and internal card data flows?
Explore the nuanced coherence of PCI DSS requirements from a QSA perspective. Reflecting on years of hands-on experience, this analysis questions some standard rationales while considering acceptable risks in professional practice.