5 min read
Key Management for GDPR
Introduction Much has already been written about EU General Data Protection Regulation (GDPR), which comes into force on 25th May 2018 to protect EU...
5 min read
Introduction Much has already been written about EU General Data Protection Regulation (GDPR), which comes into force on 25th May 2018 to protect EU...
2 min read
Completely electronic means of identification and authentication are rapidly improving the way companies can offer services to customers digitally.
5 min read
When it comes to conducting transactions, the possibility of fraud is always a risk that cannot be overlooked. In person, an individual may present...
3 min read
Non-repudiation is a legal concept that is widely used in information security. It refers to any service which provides proof of the origin of data...
3 min read
This article sheds light on the two approaches to achieve non-repudiation of an electronic message: non-repudiation of emission and non-repudiation...
3 min read
Election season in the US is upon us - and with it, comes the typical questions of how to secure ballots and prevent voter fraud. In the US, UK, and...
4 min read
Everywhere you turn in the security world, an interesting word keeps popping up: “Blockchain”. Just like the word “cloud”, this concept has taken...
3 min read
AdES stands for Advanced Electronic Signature, which embraces a family of eIDAS-compliant standards for digital signatures including PAdES, CAdES and...
2 min read
Under the eIDAS Regulation (EU) No 910/2014, a qualified certificate for electronic signature refers to “a certificate for electronic signatures,...