3 min read
Introducing the Digital Signature Activation Protocol for Remote Server Signing
This article explains the digital Signature Activation Protocol (SAP) in the context of eIDAS-compliant central signing. It sheds light on its...
Enjoy expert insights into the latest innovations and talking points from the world of cryptography.
3 min read
This article explains the digital Signature Activation Protocol (SAP) in the context of eIDAS-compliant central signing. It sheds light on its...
3 min read
Traditionally, end-to-end lifecycle key management was achieved through inefficient paper-based procedures and highly resource intensive tasks...
3 min read
Encryption has become the most essential part of securing data online. The biggest headache to the Cybersecurity industry is a data breach. The last...
3 min read
With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...
5 min read
Certain industries have a duty to protect confidential information, as well as a requirement for authentication - proving that a document was sent by...
5 min read
Many organizations struggle with cryptographic key management for multiple reasons. However, these pain points can be resolved with the right tools.
2 min read
This article describes a model that could enable an electronically signed document to be printed out and used as an original in legal proceedings, in...
5 min read
This article aims to demystify electronic signature UK law and explain how it supports all types of electronic transactions in accordance with UK...
5 min read
Here we look at what it means to “bring your own key”, “control your own key” and “hold your own key” and what the differences are between these...