6 min read
Outline of the Players in the EUDI Wallet Ecosystem
The European Digital Identity (EUDI) Wallet aims to offer digital wallets to all EU citizens and businesses for identification purposes and document...
6 min read
The European Digital Identity (EUDI) Wallet aims to offer digital wallets to all EU citizens and businesses for identification purposes and document...
5 min read
Mobile apps and mobile software components are rarely stand-alone as they frequently perform their most important operations on various backend...
4 min read
Large-scale quantum computing is coming soon, and with that comes new cybersecurity threats. One of these threats is "steal now, decrypt later,"...
2 min read
Hardware security modules (HSMs) are physical devices that provide cryptographic functions such as encryption/decryption and digital signing. They...
5 min read
Each year, various events within the cybersecurity industry have a significant impact on the industry, leading experts to predict an increase in the...
2 min read
With post-quantum technology having the potential to trigger a new wave of cyber threats, we identify 10 steps that organizations should take to...
4 min read
The UK's relationship with the EU has been tumultuous in recent years, especially in the wake of Brexit. With regards to digital identities, former...
4 min read
EMV Personalization of a payment card is the process of writing data to the card in order to make it ready for use. This includes loading the card...
5 min read
The European Commission promotes the European Digital Identity wallet (EUDI wallet) as part of its effort to digitize the economy and help foster...