Role-Based Access Control: What Is It and Why Do You Need It?
Who has access to which systems in the organization, why, and how do you optimize the process for access control?
By Kenneth Fenger Jeppesen, Sales Nordic, March 2018
Five Ways to Reduce the Risk of a Data Breach
Data breaches are on the rise and with the introduction of the GDPR later this year, now’s the time to take note. Data breaches are not just bad for your reputation, they’ll soon be really bad for business, too, as the GDPR introduces fines of up to 4% of a company’s annual turnover or Euro 20 million, whichever is higher.
By Anne-Louise Dam-Rasmussen, Communication and PR, February 2018
Most Will Not Be Ready for GDPR and Other Predictions for 2018
Cybersecurity is becoming more important than ever, as organizations worldwide are becoming increasingly digital and the number of hacks likewise just keeps increasing. Protecting your organization from cyber criminals – both internal and external to the organization – has never been more important.
By Anne-Louise Dam-Rasmussen, Communication and PR, January 2018
Why Protection from the Insider Threat Matters
In the age of cybercrime, most expect the largest danger to be external, but in reality, the insider threat retains its position as the one to watch. But while many organizations are well aware, and guarded against, external cybersecurity attacks, many lack protection from insider attacks.
By Anne-Louise Dam-Rasmussen, Communication and PR | October 2017
The Integration Accelerator
How can identity and access management speed up the M&A process? When companies have to collaborate, that today means integrating the IT systems as quickly as possible and giving access to each other’s IT infrastructure and resources in general, be it IT systems or email groups, so as to enable communication between the two entities.
By Christian Stendevad, EVP | September 2017
Right to Privacy
Respect citizens right to privacy and give patients the power to decide who should have access to their privacy data.
By Morten Boel Sigurdsson, CEO | July 2017
8 General Misunderstandings about the EU GDPR
In our dialogue with various organizations, we experience a great deal of misunderstandings in terms of what actions to take and how to initiate them. Therefore, we have gathered the most common misunderstandings about the new regulation.
By Morten Boel Sigurdsson, CEO | April 2017
Is Your Data Covered by the EU GDPR
When the EU General Data Protection Regulation (GDPR) becomes effective, the definition of “privacy data” will be widened substantially. The core of the EU GDPR is the concept of “personally identifiable data.” This should be interpreted very broadly as “data, which can identify a specific person.”
By Morten Boel Sigurdsson, CEO | March 2017
EU GDPR Regulation Puts Your Business at Risk
One of the most frequently mentioned innovative features of the EU GDPR is that companies that compromise personal data can be fined up to four per cent of their annual global turnover. For these companies, this means that they can be subject to fines of an astronomic magnitude.
By Morten Boel Sigurdsson CEO | February 2017
Save Big Bucks on Software License Spends and Audits
Ensuring compliance and improving IT security are not the only benefits for organizations that adhere to the information security standards and regulations pertaining to access and identity control outlined in e.g. ISO27002, and in the EU GDPR.
By Santeri Kangas, CTO | October 2016
Stolen Credentials are a Core Attack Tool in the APT Anatomy
Hackers exploit user credentials in advanced persistent threat attacks, to gain foothold and move around in the organization.
By Santeri Kangas, CTO | September 2016