Compliance

XYPRO and ACI Worldwide offer PCI DSS 4.0 Compliance for BASE24 Customers

XYPRO and ACI Worldwide offer PCI DSS 4.0 Compliance for BASE24 Customers

Most banking applications are built on earlier architectures and technologies and pose significant security challenges, especially under the new Payment Card Industry Data Security Standards 4.0 (PCI DSS). These applications face greater risk due to coding practices at development time and the absence of modern security features like Multi-Factor Authentication (MFA). Enhancing these applications with MFA is necessary to protect against unauthorized access and data breaches.…

Read more

Cybersecurity in the Boardroom: A Strategic Driver for Growth

Cybersecurity has struggled for many years to make it onto the boardroom agenda. The perception of it as a purely technology function with limited strategic importance has led many organizations to take a short-term, check-box approach to managing cyber risk. This grossly undervalues the role cyber can and should have. In fact, one 2023 study finds that half (51%) of global business decision makers (BDMs) still consider “it a necessary cost but not a revenue contributor,” while 38% see it as a barrier rather than a business enabler.…

Read more

GDPR 2021 – Compliance and Penalties; 3 Years Later

The General Data Protection Regulation, or GDPR, is a major piece of legislation adopted in 2018. It is designed to address the protection and responsible use of every European Union citizen’s personal data. However, GDPR is not an EU-only regulation. It affects ANY business or individual handling the data of EU citizens, regardless of where that business or individual is based.
Read more
blog header gdpr anniversary

Three Years of GDPR – a Look Back

It might be hard to imagine, but it has been three years since the General Data Protection Regulation (GDPR) was implemented in the European Union (EU) on 25 May 2018. Time certainly does fly by when you are trying to protect data. Nevertheless, the term ‘GDPR’ has set a precedent on what is to be expected from organizations when it comes to protecting personally identifiable information (PII) of EU data subjects and has served as the foundational inspiration for many international data security regulations.
Read more

Building a container strategy―13 potholes to avoid

Containers and the rise of Kubernetes is the most talked-about, most impactful IT technology today. Containers give enterprises the ability to do amazing things, like build applications faster, move workloads between platforms, and optimize their environments.

Used correctly, containers open the agility doors of the organization and enable teams to build solutions faster than ever before. But, as anybody who’s implemented a new technology knows, pathways aren’t always smooth.…

Read more