Blog posts
Cyber Resilience Act (CRA)
The Cyber Resilience Act (CRA) is intended to reinforce the security of digital products by imposing cybersecurity standards, obligations on manufacturers and fines for non-compliance.
The NIS 2 Directive
Find out how the NIS 2 directive aims to enhance infrastructure security and reduce the impact of cyberattacks on entities through preventive measures and risk assessment.
PCI-DSS standard
PCI-DSS defines security standards to protect credit card transactions and prevent data leakage and online fraud.
DORA, the Digital Operational Resilience Act (Regulation EU)
Learn all about DORA (Digital Operational Resilience Regulation) and its impact on financial entities.
Interview with Romain Alberca about the importance of data anonymization
Discover Romain Alberca's interview highlighting the importance of data anonymization, cybersecurity awareness in companies & the risks of not complying with the RGPD.
Negotiating the security budget: how to convince management in the face of the growing challenges posed by cyber attacks
Find out in this article how to negotiate the security budget and convince management of the importance of investing in security.
What are the risks of working with non-anonymized data?
Find out in this article the different risks for companies of working with non-anonymized data.
Data breaches: how to prevent them?
For many years, data leaks have been the number one threat in cybersecurity.
Protecting your PII data in Testing
Nearly every company has a test or development environment that is often less secure than production, and many of those have a failed audit to show for it.
Anonymizing your data: why is it important for all organizations?
When an organization processes data, it is essential for it to anonymize it in order to comply with the rules imposed by the GDPR.
How to use a dataset in compliance with the GDPR?
Data Anonymization allows companies to exploit datasets securely while protecting the privacy of their users.
VSB/SMB: how to protect my company’s data?
There are several methods of anonymization for which VSB and SMB are concerned and can set up protection within their organization.
Data Masking and anonymization: understanding the different algorithms
Different data masking techniques to better understand how each algorithm works.
Data protection: one in two leaks is linked to an internal problem in the company
Anonymize data and create a secure ecosystem at the heart of your business to minimize problems and data leakage.
ARCAD Software awarded at the Cas d’OR Service Public Numérique!
ARCAD Software wins two awards at the Cas d’Or Service Public Numérique for its DOT Anonymizer solution.
GDPR compliance: start by identifying your personal data
The identification of personal data is the first step for any GDPR compliance project
What is Data Masking?
Data masking guarantees the confidentiality, availability and integrity of data for users and companies
The impact of the GDPR on the cybersecurity of a company
The GDPR imposes stricter standards on companies in terms of data security and therefore cybersecurity.
GDPR: a cybersecurity challenge and true cyberprotection
By securing the personal data of site users, the GDPR is proving to be an effective bulwark in terms of cybersecurity.
GDPR and Anonymization, how far should we go?
GDPR and Anonymization: what is the definition of anonymization in the GDPR, is it applicable in reality? And how?
Anonymization: best practices to put in place
In order to comply with the GDPR, it is essential to initiate a process of anonymization of individual data
GDPR … Where to start? Identify your personal data
Any data protection project (GDPR, CCPA, etc.) begins by identifying personal data to feed your registry.
5 most common questions about data anonymization
Maurice Marrel's interview about data anonymization.
Data Protection: a taste of things to come (the world over)
Olenka Van Schendel's predictions about the wide-ranging impact of GDPR
TRIAL VERSION / DEMO
Request a trial version or a session in our sandbox!
Trial Version
Try it now!
or