4 min read
EMV & PCI DSS Compliance: Cryptography and Key Management Requirements
EMV chips on payment cards contain cryptographic co-processors and dual interfaces that allow for contact and contactless payment options. When...
4 min read
EMV chips on payment cards contain cryptographic co-processors and dual interfaces that allow for contact and contactless payment options. When...
3 min read
Non-repudiation is a legal concept that is widely used in information security. It refers to any service which provides proof of the origin of data...
2 min read
Cryptography is the foundation of protecting electronic data and cyber security. Encryption can effectively prevent breaches while also protecting...
3 min read
In 2016, the National Institute of Standards and Technology (NIST) (run by the US Department of Commerce) announced they were producing a new...
7 min read
Indiana University defines authentication as "the process of determining whether someone or something is who or what it is declared to be."...
4 min read
An interesting case arose in the state of California this year regarding a bankruptcy lawyer who utilized DocuSign for many official legal documents.
3 min read
Over the past 8-10 years, we’ve witnessed a huge rise in the use and application of mobile banking. At first we could check our account balances and...
3 min read
On July 1st 2016, eIDAS was introduced in the EU to replace the almost 20 year old European Signatures Directive. The directive was originally built...
3 min read
This article sheds light on the two approaches to achieve non-repudiation of an electronic message: non-repudiation of emission and non-repudiation...