3 min read
What You See Is What You Sign (WYSIWYS) – a Step-by-step Breakdown
What You See Is What You Sign (WYSIWYS) refers to the part of any signature process, where you read a document you intend to sign, and ensure that...
3 min read
What You See Is What You Sign (WYSIWYS) refers to the part of any signature process, where you read a document you intend to sign, and ensure that...
4 min read
The aim of this article is inform you on how to implement proper key management and to answer 3 important questions regarding centralized and...
2 min read
I once consulted a bank about their painstakingly slow cryptography and security processing system. After a week of searching, I examined the...
3 min read
Trade is the lifeblood of the global economy. And Trade Finance is what greases the cogs of international trade. The last few decades of...
5 min read
In this final part of the series, we look at how cloud computing will impact the use of cryptography and at the future of HSMs; and finally, we...
5 min read
As part 2 of this 3-part series, here we look at new applications such as blockchain and IoT, as well as the impact of quantum technology.
4 min read
Cryptography has come a long way since ancient times, and the pace of development has been especially quick over the last 2 decades. Indeed, many...
3 min read
Crypto-agility, or cryptographic agility, is the capacity for an information security system to adopt an alternative to the original encryption...
3 min read
According to draft guidance published by NIST on July 19, 2018, the Triple Data Encryption Algorithm (TDEA) or 3DES is officially being retired. The...