Kategori: Blogg
-

Technology solutions to comply with GDPR
•
GDPR has been in the spotlight for the past couple of years, and organizations have been working hard to follow the requirements.
-

6 Questions and Answers about GDPR
•
As the implementation of GDPR in law is approaching, we sat down with our GDPR and Security Specialist, to get his thoughts on the regulation!
-

Identifying and securing sensitive data
•
Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels
-

GDPR and the meaning of Consent
•
Many controllers tend to use consent when it isn’t really needed, as a sort of safe haven when they are not really sure what to do.
-

10 questions to ask when deciding on a cloud hosting provider
•
Moving your business operations to the cloud can cut costs, streamline workflow and eliminate the need for in-house hardware.
-

HSM – What is it and who needs one?
•
An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?
-

Can tokenization reduce PCI DSS audit scope?
•
Tokenization replaces cardholder data with an “alias”, a separate random-generated value called a token. Learn more on the blog
-

The Basics of Penetration Testing in PCI DSS
•
A penetration test could be described as but realistic cyber attack that aims to determine how deep an attacker would be able to penetrate
-

The Two Core Phases of Penetration Testing and PCI Compliance Pitfalls
•
When it comes to pen testing, it can always be roughly broken down in to two core phases: scanning and exploiting
-

New at Complior:
Amazon Web Services•
Employ the most-up-to-date and beneficial AWS tools with Complior. Meet your business needs and scale your business goals today