Skip to content

Blog

PII Data Discovery Software: Transforming Security

July 31, 2024

By Alexis Porter

…initial discovery process. By conducting periodic audits, organizations can ensure that their databases are continuously monitored for new or modified PII, maintaining compliance with data protection regulations. Download Our Ultimate…

Blog

Unlocking Security: Azure SAS Tokens Demystified

May 2, 2024

By Alexis Porter

…Service SAS (Shared Access Signature) Service SAS tokens are used to grant access to specific resources within a service, such as blobs, queues, tables, or files within Azure Storage. They…

Blog

The Digital Services Act: Ensuring Internet Safety

July 6, 2023

By Alexis Porter

…regulators. New rules for large online platforms: The DSA introduces specific obligations for “very large online platforms” that have a significant impact on the European market. These platforms would be…

Blog

FINMA: Making Sense of Client Identifying Data (CID)

September 9, 2022

By Verrion Wright

…of private clients. In addition, it contains a new Annex 3, with principles around handling electronic client data and the risk involved with banking relationships in or out of Switzerland….