Discover blogs, guides, videos and more

Hybrid cloud: How to balance risk, compliance and innovation
Blog • 6 min read

Hybrid cloud: How to balance risk, compliance and innovation

Get tips on developing a hybrid cloud approach that reduces risk, supports compliance and drives innovation.

EU AI Act Webinar: Strategies to build compliant AI systems
Video

EU AI Act Webinar: Strategies to build compliant AI systems

Watch the EU AI Act webinar on demand to learn how to comply with the EU AI Act by August 2026. Discover risk assessment methods, governance strategies, and technical controls from Nordcloud’s regulatory experts.

Sovereign cloud: Should you consider it (and for what use cases)?
Blog • 5 min read

Sovereign cloud: Should you consider it (and for what use cases)?

Sovereign cloud is a fast-moving area in light of the current policy environment. Get tips on when to consider it in your hybrid decision making.

Sovereign Cloud: New AWS governance structure and enhanced controls mark a pivotal moment
Blog • 5 min read

Sovereign Cloud: New AWS governance structure and enhanced controls mark a pivotal moment

AWS has unveiled new sovereign controls and a dedicated governance structure for the European Sovereign Cloud. Read what this means for you.

Microsoft’s European charm offensive: Real change or just words?
Blog • 4 min read

Microsoft’s European charm offensive: Real change or just words?

What are the implications of Microsoft’s announcements on data sovereignty and European digital independence? Read our analysis.

An introduction to AWS European Sovereign Cloud: Advancing data management and digital sovereignty in the EU
Blog • 6 min read

An introduction to AWS European Sovereign Cloud: Advancing data management and digital sovereignty in the EU

Learn about AWS’ new cloud offering designed specifically to address EU data sovereignty requirements.

Transforming IT towards self-service
Guide • 1 min read

Transforming IT towards self-service

How can application teams get an AWS-like self-service experience from IT? This whitepaper explains how.

What data protection will look like in 2030
Blog • 6 min read

What data protection will look like in 2030

Think ahead and position your organisation to meet your data protection demands a few years from now. The hard part is separating which changes are hype and which have substance.

Nordcloud certified in AWS Trusted Secure Enclaves Sensitive Edition
Blog • 1 min read

Nordcloud certified in AWS Trusted Secure Enclaves Sensitive Edition

This AWS TSE-SE certification is through the Vetted Partner Program.

Growing GenAI in a compliant and resilient way
Infographic • 3 min read

Growing GenAI in a compliant and resilient way

Learn how to stay current with fast-changing GenAI tech while keeping deployments secure and controlled.

What can AI really do for cybersecurity?
Blog • 3 min read

What can AI really do for cybersecurity?

We’re now well into an era where artificial intelligence technology thinks and acts like a human – but in an...

Public Cloud in State Administration: Enhancing Resilience & Continuity
Blog • 7 min read

Public Cloud in State Administration: Enhancing Resilience & Continuity

Read why cloud is an excellent addition to preparedness and continuity management and how it supports state administration organisations.

Video: Lock in VMware licensing cost with Azure VMware solution
Video • 54:24 runtime

Video: Lock in VMware licensing cost with Azure VMware solution

Hear from Microsoft and Nordcloud experts how to keep your VMware setup running smoothly, while planning for future modernisation.

Your guide to a smooth DC exit
Video • 00:59 runtime

Your guide to a smooth DC exit

Imagine a DC exit that’s so perfectly planned, it runs without any issues.

How to cure Day 2 digital transformation challenges.
Video • 00:59 runtime

How to cure Day 2 digital transformation challenges.

This guide explains how to get rid of the Day 2 operational challenges and the headaches associated with it.

GKE Sys:All Loophole: Don’t let shared responsibility lull you into a false sense of security
Tech Community • 2 min read

GKE Sys:All Loophole: Don’t let shared responsibility lull you into a false sense of security

A recent discovery by The Orca Research Pod named ‘Sys:All’ presents an impactful and widely spread vulnerability in Google Cloud Platform’s Kubernetes Engine. 

How to cure Day 2 digital transformation challenges
Guide • 1 min read

How to cure Day 2 digital transformation challenges

Are IT ops struggling to keep up? Is there friction between product and IT?

Fixing a Cloud Journey – How You Can Still Rock It in Cloud
Blog • 5 min read

Fixing a Cloud Journey – How You Can Still Rock It in Cloud

Many have made the shift to the cloud, but they haven't quite tweaked their operations to squeeze out every drop of its potential.

Major Telecom Company Tightens Security Processes
Major Telecom Company Tightens Security Processes
Case Study • 1 min read

Major Telecom Company Tightens Security Processes

AWS Logo

We helped a major telecom company improve its security processes and posture through security architecture services.

AWS • Migration and Modernisation • Transformation Strategy • Telecoms
Financial Institution Boosts Business Continuity.
Financial Institution Boosts Business Continuity
Case Study • 1 min read

Financial Institution Boosts Business Continuity.

AWS Logo

We helped a prominent financial institution successfully enhance its business continuity by implementing application security services.

AWS • Managed Cloud • Transformation Strategy • Financial Services • Manufacturing
Construction Company Improves Security Posture.
Construction Company Improves Security Posture
Case Study • 1 min read

Construction Company Improves Security Posture.

AWS Logo

We helped an industrial company enhance its security strategy through expert guidance and security consultancy services.

AWS • Managed Cloud • Transformation Strategy • Manufacturing
Major Industrial Company Improves Security Strategy.
Major Industrial Company Improves Security Strategy.
Case Study • 2 min read

Major Industrial Company Improves Security Strategy.

AWS Logo

We helped an industrial company enhance its security strategy through expert guidance and security consultancy services.

AWS • Transformation Strategy • Manufacturing
Scroll to top