5 min read
eIDAS and eSignature Validation Attacks: How to Protect Yourself
Ensuring that the integrity of an e-signature remains intact is crucial to protecting its attached messages or documents. This article will explain...
5 min read
Ensuring that the integrity of an e-signature remains intact is crucial to protecting its attached messages or documents. This article will explain...
4 min read
The world is slowly but surely moving away from its centuries-old obsession with paper. With the very real threat of man-made climate change, it is a...
3 min read
With support for signing XML documents in its WYSIWYS solution, Cryptomathic now provides the means to offer the much-desired What You See Is What...
3 min read
In a recent article, we looked at how eIDAS can help SMEs grow and prosper. SMEs are undoubtedly the lifeblood of any economy which means that EU...
3 min read
What You See Is What You Sign (WYSIWYS) refers to the part of any signature process, where you read a document you intend to sign, and ensure that...
3 min read
Trade is the lifeblood of the global economy. And Trade Finance is what greases the cogs of international trade. The last few decades of...
5 min read
To combat fraud in digital identities and provide guidelines for digital authentication, the National Institute of Standards and Technology (NIST)...
3 min read
In the last few decades, we have seen more countries adopt a democratic form of government than ever before in history. For the most part though,...
3 min read
The Payment Service Directive 2 (PSD2) allows non-banks to provide payment services previously reserved for banks only. As a result, the market of...