The Three Pillars of Information Security Artikel / Sofie Ax The Three Pillars of Information Security Read More »
5 Common Mistakes with IAM – and How to Avoid Them Artikel / Sofie Ax 5 Common Mistakes with IAM – and How to Avoid Them Read More »
ISO 27001 – Checklist for Certification in 10 Steps Artikel / Sofie Ax ISO 27001 – Checklist for Certification in 10 Steps Read More »
Compliance as a Competitive Advantage – Not Just a Regulatory Requirement Artikel / Sofie Ax Compliance as a Competitive Advantage – Not Just a Regulatory Requirement Read More »
Why multifactor authentication is a must for every business Artikel / Sofie Ax Why multifactor authentication is a must for every business Read More »
ISAE 3402 vs ISAE 3000 – What’s the Difference? Artikel / Sofie Ax ISAE 3402 vs ISAE 3000 – What’s the Difference? Read More »
From Gap Analysis to Action Plan in Cybersecurity Artikel / Sofie Ax From Gap Analysis to Action Plan in Cybersecurity Read More »
Zero Trust and IAM – why they belong together Artikel / Sofie Ax Zero Trust and IAM – why they belong together Read More »
Incident Reporting under NIS2, DORA and GDPR Artikel / Sofie Ax Incident Reporting under NIS2, DORA and GDPR Read More »