6 min read
Qualified Electronic Signatures: Best Practice Implementation of SAM
This article evaluates the implementation options for the Signature Activation Module (SAM) in the context of eIDAS 2. Based on this analysis we...
6 min read
This article evaluates the implementation options for the Signature Activation Module (SAM) in the context of eIDAS 2. Based on this analysis we...
1 min read
Data security can be complex, but it's essential in today's business world, especially when using cloud services. One effective approach is adopting...
2 min read
In today's fast-evolving digital landscape, robust key management has become an essential part of securing sensitive data and communications. The...
2 min read
Hardware security modules (HSMs) are physical devices that provide cryptographic functions such as encryption/decryption and digital signing. They...
3 min read
Cloud storage via AWS Storage Services is a simple, reliable, and scalable way to store, retrieve and share data. As a third-party cloud vendor, AWS...
5 min read
Today's businesses rely heavily on cryptography to authenticate people and processes, secure communications, and safeguard critical data.
3 min read
An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and...
3 min read
With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...
3 min read
This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...