3 min read
How to Deploy and Manage Cryptography in a Project the Right Way
With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...
3 min read
With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...
2 min read
In this article, we proposeWhat-You-See-Is-What-You-Timestamp (WYSIWYT) as an attractive alternative to Qualified Electronic Signatures, for certain...
5 min read
Certain industries have a duty to protect confidential information, as well as a requirement for authentication - proving that a document was sent by...
3 min read
An over five-year-long process has come to a preliminary end: On July 5, 2022, NIST issued the long-awaited announcement of the winners of Round 3 of...
2 min read
There are several types of key block formats used in different industries, especially the retail banking industry. The systems that use these key...
3 min read
With the introduction of PSD2, banks are forced to provide third party payment service providers (PSPs) with access to the bank’s customers’ account...
5 min read
Many organizations struggle with cryptographic key management for multiple reasons. However, these pain points can be resolved with the right tools.
4 min read
Cardholders (or consumers) are one of the corners of the ‘four corner’ model in the payment card world. Here we take a brief look at the payment...
2 min read
This article describes a model that could enable an electronically signed document to be printed out and used as an original in legal proceedings, in...