3 min read
E-signatures in elections: The key to preventing voter fraud?
Election season in the US is upon us - and with it, comes the typical questions of how to secure ballots and prevent voter fraud. In the US, UK, and...
3 min read
Election season in the US is upon us - and with it, comes the typical questions of how to secure ballots and prevent voter fraud. In the US, UK, and...
4 min read
Everywhere you turn in the security world, an interesting word keeps popping up: “Blockchain”. Just like the word “cloud”, this concept has taken...
3 min read
AdES stands for Advanced Electronic Signature, which embraces a family of eIDAS-compliant standards for digital signatures including PAdES, CAdES and...
3 min read
Year after year, more stories surface about large scale data loss from e-government systems across the world.
2 min read
Under the eIDAS Regulation (EU) No 910/2014, a qualified certificate for electronic signature refers to “a certificate for electronic signatures,...
2 min read
Under Regulation (EU) No 910/2014 (eIDAS), a Trust Service Provider (TSP) is defined as “a natural or a legal person who provides one or more trust...
3 min read
When an electronic signature is created, it must be associated to the data that it is being used to secure. This is accomplished by creating a data...
4 min read
On December 19, 2003, ZertES, the Swiss Federal law regarding the use of certification services with electronic signatures was approved into law.
3 min read
This article explains what an electronic signature policy is from the perspective of a CISO or other person required to maintain information security.