Technology solutions to comply with GDPR
GDPR has been in the spotlight for the past couple of years, and organizations have been working hard to follow the requirements.
Läs vår blogg, senaste nyheter och ta del av guider och mallar.
Bli inspirerad och öka din kunskap!
GDPR has been in the spotlight for the past couple of years, and organizations have been working hard to follow the requirements.
As the implementation of GDPR in law is approaching, we sat down with our GDPR and Security Specialist, to get his thoughts on the regulation!
Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels
Many controllers tend to use consent when it isn’t really needed, as a sort of safe haven when they are not really sure what to do.
Moving your business operations to the cloud can cut costs, streamline workflow and eliminate the need for in-house hardware.
An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?
Tokenization replaces cardholder data with an “alias”, a separate random-generated value called a token. Learn more on the blog
A penetration test could be described as but realistic cyber attack that aims to determine how deep an attacker would be able to penetrate
When it comes to pen testing, it can always be roughly broken down in to two core phases: scanning and exploiting
Employ the most-up-to-date and beneficial AWS tools with Complior. Meet your business needs and scale your business goals today
Reaching the milestone of PCI DSS compliance is a big thing – a great achievement – but staying compliant is the next challenge.
The US Privacy Shield has been declared invalid. Read about the statement and what is meant by transferring personal data to a third country.