3 min read
eIDAS – Breaking the SME Barrier
In a recent article, we looked at how eIDAS can help SMEs grow and prosper. SMEs are undoubtedly the lifeblood of any economy which means that EU...
3 min read
In a recent article, we looked at how eIDAS can help SMEs grow and prosper. SMEs are undoubtedly the lifeblood of any economy which means that EU...
3 min read
What You See Is What You Sign (WYSIWYS) refers to the part of any signature process, where you read a document you intend to sign, and ensure that...
4 min read
The aim of this article is inform you on how to implement proper key management and to answer 3 important questions regarding centralized and...
2 min read
I once consulted a bank about their painstakingly slow cryptography and security processing system. After a week of searching, I examined the...
3 min read
Cryptography has come a long way since ancient times, and the pace of development has been especially quick over the last 2 decades. Indeed, many...
3 min read
Crypto-agility, or cryptographic agility, is the capacity for an information security system to adopt an alternative to the original encryption...
3 min read
According to draft guidance published by NIST on July 19, 2018, the Triple Data Encryption Algorithm (TDEA) or 3DES is officially being retired. The...
2 min read
The Payment Card Industry Data Security Standard (PCI DSS) helps to safeguard cardholders’ private information. The Payment Card Industry Security...
5 min read
To combat fraud in digital identities and provide guidelines for digital authentication, the National Institute of Standards and Technology (NIST)...