3 min read
How Prepared are Companies for Quantum Computing Cybersecurity Risk?
This article discusses how prepared companies are for quantum computing cybersecurity risks based on a recent Deloitte poll and what the current...
Enjoy expert insights into the latest innovations and talking points from the world of cryptography.
3 min read
This article discusses how prepared companies are for quantum computing cybersecurity risks based on a recent Deloitte poll and what the current...
3 min read
This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.
3 min read
As defined by Regulation (EU) No 910/2014 (eIDAS), which took effect on 1 July 2016, an electronic signature creation device is software or hardware...
3 min read
Mortgage fraud is a serious crime. Once executed and signed, a mortgage deed is a legally binding contract. The responsibility of trying to prove...
5 min read
Achieve Non-Repudiation of Origin (NRO) and Non-Repudiation of Emission (NRE)
5 min read
This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...
3 min read
This article explains the digital Signature Activation Protocol (SAP) in the context of eIDAS-compliant central signing. It sheds light on its...
3 min read
Traditionally, end-to-end lifecycle key management was achieved through inefficient paper-based procedures and highly resource intensive tasks...
3 min read
Encryption has become the most essential part of securing data online. The biggest headache to the Cybersecurity industry is a data breach. The last...