3 min read
EU AWS Hosting: Navigating Data Sovereignty & GDPR Compliance
This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.
 
                  
                
                3 min read
This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.
 
                  
                
                3 min read
 Edlyn Teske:  12. November 2022
                    
                    Edlyn Teske:  12. November 2022
                  On April 19, 2022, information about a severe vulnerability in recent versions of Java shook up the security community.
 
                  
                
                3 min read
 Martin Rupp (guest):  05. November 2022
                    
                    Martin Rupp (guest):  05. November 2022
                  This article proposes a few answers to a series of frequently asked questions (FAQs) about key blocks and their use with PCI.
 
                  
                
                3 min read
As defined by Regulation (EU) No 910/2014 (eIDAS), which took effect on 1 July 2016, an electronic signature creation device is software or hardware...
 
                  
                
                5 min read
 Edlyn Teske:  29. October 2022
                    
                    Edlyn Teske:  29. October 2022
                  Today's businesses rely heavily on cryptography to authenticate people and processes, secure communications, and safeguard critical data.
 
                  
                
                4 min read
 Martin Rupp (guest):  19. October 2022
                    
                    Martin Rupp (guest):  19. October 2022
                  In the “four corner model”, acquirers are apparently the less active party as their role seems ‘only’ to forward the transaction flow originating...
 
                  
                
                3 min read
Mortgage fraud is a serious crime. Once executed and signed, a mortgage deed is a legally binding contract. The responsibility of trying to prove...
 
                  
                
                5 min read
Achieve Non-Repudiation of Origin (NRO) and Non-Repudiation of Emission (NRE)
 
                  
                
                5 min read
This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...