Omada Blog

Why Protection from the Insider Threat Matters

Why Protection from the Insider Threat Matters

In the age of cybercrime, most expect the largest danger to be external, but in reality, the insider threat retains its position as the one to watch. But while many organizations are well aware, and guarded against, external cybersecurity attacks, many lack protection from insider attacks.

By Anne-Louise Dam-Rasmussen, Communication and PR | October 2017

Read more
The Integration Accelerator

The Integration Accelerator

How can identity and access management speed up the M&A process? When companies have to collaborate, that today means integrating the IT systems as quickly as possible and giving access to each other’s IT infrastructure and resources in general, be it IT systems or email groups, so as to enable communication between the two entities.

By Christian Stendevad, EVP | September 2017

Read more
Right to Privacy

Right to Privacy

Respect citizens right to privacy and give patients the power to decide who should have access to their privacy data.

By Morten Boel Sigurdsson, CEO | July 2017

Read more
8 General Misunderstandings about the EU GDPR

8 General Misunderstandings about the EU GDPR

In our dialogue with various organizations, we experience a great deal of misunderstandings in terms of what actions to take and how to initiate them. Therefore, we have gathered the most common misunderstandings about the new regulation.

By Morten Boel Sigurdsson, CEO | ​April 2017

Read more
Is Your Data Covered by the EU GDPR

Is Your Data Covered by the EU GDPR

When the EU General Data Protection Regulation (GDPR) becomes effective, the definition of “privacy data” will be widened substantially. The core of the EU GDPR is the concept of “personally identifiable data.” This should be interpreted very broadly as “data, which can identify a specific person.”

By Morten Boel Sigurdsson, CEO | March 2017 

Read more
EU GDPR Regulation Puts Your Business at Risk

EU GDPR Regulation Puts Your Business at Risk

One of the most frequently mentioned innovative features of the EU GDPR is that companies that compromise personal data can be fined up to four per cent of their annual global turnover. For these companies, this means that they can be subject to fines of an astronomic magnitude.

By Morten Boel Sigurdsson CEO | February 2017

Read more
Save Big Bucks on Software License Spends and Audits

Save Big Bucks on Software License Spends and Audits

Ensuring compliance and improving IT security are not the only benefits for organizations that adhere to the information security standards and regulations pertaining to access and identity control outlined in e.g. ISO27002, and in the EU GDPR.

By Santeri Kangas, CTO | October 2016

Read more
Stolen Credentials are a Core Attack Tool in the APT Anatomy

Stolen Credentials are a Core Attack Tool in the APT Anatomy

Hackers exploit user credentials in advanced persistent threat attacks, to gain foothold and move around in the organization.

By Santeri Kangas, CTO | September 2016

Read more

This website uses cookies to improve your experience. We'll assume you're ok with that, but you can opt-out if you wish.

Read more.
Close