3 min read
EU AWS Hosting: Data Residency, Regionality, Digital Sovereignty, GDPR
This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.
3 min read
This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.
3 min read
On April 19, 2022, information about a severe vulnerability in recent versions of Java shook up the security community.
3 min read
This article proposes a few answers to a series of frequently asked questions (FAQs) about key blocks and their use with PCI.
3 min read
As defined by Regulation (EU) No 910/2014 (eIDAS), which took effect on 1 July 2016, an electronic signature creation device is software or hardware...
5 min read
Today's businesses rely heavily on cryptography to authenticate people and processes, secure communications, and safeguard critical data.
4 min read
In the “four corner model”, acquirers are apparently the less active party as their role seems ‘only’ to forward the transaction flow originating...
3 min read
Mortgage fraud is a serious crime. Once executed and signed, a mortgage deed is a legally binding contract. The responsibility of trying to prove...
5 min read
Achieve Non-Repudiation of Origin (NRO) and Non-Repudiation of Emission (NRE)
5 min read
This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...