Skip to content

Insights

Filter

Article

Protecting Lambda URLs with Cognito, IAM, Lambda@Edge and CDK

In this article, we’ll look at how to secure Lambda URLs using IAM access control. With complete code to try yourself!
Case Study

Google Drive Data Separation Within a Single Google Workspace Tenant

PCG helped the customer to restructure Google Drive data, ensure a secure data separation while minimizing disruption.
Article

The 5 Types of AI Every Small Business Should Know

A practical guide on five types of AI—Generative AI, Machine Learning, NLP & LLMs, RPA, and Computer Vision—exploring their relevance and use cases for small businesses to improve operations and customer engagement.
Case Study

Greater transparency and performance thanks to Asana

How CyberCompare automates subscription management processes.
Case Study

Nordia Marble Boosts Efficiency with AWS Real-Time Data Management

Nordia Marble improved efficiency and safety with Set Point and PCG, using AWS cloud-based real-time sensor data management in their quarries.
Case Study

How TVB Stuttgart organizes its home games with Asana

The German handball club TVB Stuttgart organizes home games and other processes with the work management tool Asana.
Case Study

AWS Solutions for Secure User Management in Education

An insightful case study on GRNet and PCG's collaboration to create a user management system for university students, ensuring secure and efficient operation.
Case Study

The VHV Group’s Cloud Journey – Strategy for Success

How does an insurance company with more than 4,000 employees balance compliance, it modernization, and cost efficiency?
Case Study

Penetration test strengthens PlanRadar’s IT security

As a provider of software solutions, it is very important to PlanRadar that these fulfill the highest security requirements. In addition to preventive measures, simulated attacks round off the cyber security strategy.
Case Study

Pen Testing: More IT-Security for CoinTracking

By conducting an aggressive penetration test, CoinTracking was able to optimize IT security.