Why Protection from the Insider Threat Matters
In the age of cybercrime, most expect the largest danger to be external, but in reality, the insider threat retains its position as the one to watch. But while many organizations are well aware, and guarded against, external cybersecurity attacks, many lack protection from insider attacks.
By Anne-Louise Dam-Rasmussen, Communication and PR | October 2017
The Integration Accelerator
How can identity and access management speed up the M&A process? When companies have to collaborate, that today means integrating the IT systems as quickly as possible and giving access to each other’s IT infrastructure and resources in general, be it IT systems or email groups, so as to enable communication between the two entities.
By Christian Stendevad, EVP | September 2017
Right to Privacy
Respect citizens right to privacy and give patients the power to decide who should have access to their privacy data.
By Morten Boel Sigurdsson, CEO | July 2017
8 General Misunderstandings about the EU GDPR
In our dialogue with various organizations, we experience a great deal of misunderstandings in terms of what actions to take and how to initiate them. Therefore, we have gathered the most common misunderstandings about the new regulation.
By Morten Boel Sigurdsson, CEO | April 2017
Is Your Data Covered by the EU GDPR
When the EU General Data Protection Regulation (GDPR) becomes effective, the definition of “privacy data” will be widened substantially. The core of the EU GDPR is the concept of “personally identifiable data.” This should be interpreted very broadly as “data, which can identify a specific person.”
By Morten Boel Sigurdsson, CEO | March 2017
EU GDPR Regulation Puts Your Business at Risk
One of the most frequently mentioned innovative features of the EU GDPR is that companies that compromise personal data can be fined up to four per cent of their annual global turnover. For these companies, this means that they can be subject to fines of an astronomic magnitude.
By Morten Boel Sigurdsson CEO | February 2017
Save Big Bucks on Software License Spends and Audits
Ensuring compliance and improving IT security are not the only benefits for organizations that adhere to the information security standards and regulations pertaining to access and identity control outlined in e.g. ISO27002, and in the EU GDPR.
By Santeri Kangas, CTO | October 2016
Stolen Credentials are a Core Attack Tool in the APT Anatomy
Hackers exploit user credentials in advanced persistent threat attacks, to gain foothold and move around in the organization.
By Santeri Kangas, CTO | September 2016