Blog
Blog

- Details
On 23 July 2014, the European Union established eIDAS (electronic IDentification, Authentication and trust Services) that regulates electronic transactions, electronic signatures, involved bodies, and their embedded processes. Having taken effect on 1 July 2016, eIDAS provides a safe way for users to perform actions such as electronic funds transfers or transactions with government agencies.
- Details
The European Union eIDAS (electronic Identification, Authentication and trust Services) was enacted on 23 July 2014 and put into effect on 1 July 2016. eIDAS mandates stringent guidelines for security protections with digital signatures, electronic transactions, involved bodies, and their embedded practices.
- Details
Most people associate the word ‘blockchain’ with cryptocurrency and given the amount of press coverage the latter has received, particularly in the last two years, it may seem that the two are indistinguishable, but that is not the case.
- Details
Although we do not give much thought to hardware security modules (HSMs), they are a critical element of security in an organisation’s IT infrastructure used for securing sensitive data.
- Details
A hardware security module (HSM) is essentially a small device that allows you to create, manage, and store cryptographic keys. These high-performance hardware modules are considered one of the most secure ways to protect sensitive encrypted data.
- Details
In today’s digital age, authenticating users, devices and facilitating the secure electronic transfer of information for a range of industries such as financial services, e-commerce, health, and IoT is an imperative when exchanging data to build trust and secure the business environment.
- Details
Fintechs, more than ever before, are turning to blockchain technology as a means to offer a complete, unchangeable, and hopefully unalterable, record of every transaction through cryptocurrencies.
- Details
Microsoft provides best practices for the secure planning and deployment of Active Directory Federation Services (AD FS) and Web Application Proxy.
- Details
Despite hybrid working creating various opportunities and benefits for employees and employers alike, the hybrid working model raises questions on the vulnerability of data security.
- Details
Encryption is a form of scrambling data to ensure a piece of information can only be deciphered by the owner of that data.
More Articles …
- Mitigating the Nobelium FoggyWeb threat with HSMs
- It’s time to start taking digital identity seriously
- A cyberattack via a USB interface
- Espionage in the Digital Age
- Digital Signature
- NIST’s Standardisation of PQC
- Zerologon Vulnerability
- Entropy – From Pseudo Randomness to Quantum RNGs
- Data Security and Encryption
- Coexistence of Blockchain and HSM