Entrepreneur Shlomo Kramer said that cybersecurity is “like Alice in Wonderland”,you run as fast as you can only to stay in place.
© 2014 CryptoID. Todos os direitos reservados.
Entrepreneur Shlomo Kramer said that cybersecurity is “like Alice in Wonderland”,you run as fast as you can only to stay in place.
To know how internet works on a functional level, you don’t need that much and a good place to start is understanding domain names.
The NSA announced they had found a vulnerability in the certificate validation functionality on Windows 10 and Windows Server 2016/2019.
That elliptic curve cryptography is a set of algorithms for encrypting and decrypting data and exchanging cryptographic keys.
After Microsoft disclosed a critical Windows vulnerabilities ever, a security researcher has demonstrated how attackers can exploit it.
Digital identity is increasingly integral to the functionality and stability of our economy.
ID R&D’s facial liveness detection solution announced at CES 2020 in Las Vegas.
Among the many companies investing in artificial intelligence, there is one surprisingly exclusive group: companies that actually generate value from AI.
The Decade Cyber Went Mainstream, so let’s look at the last 10 years of notable cybersecurity trends and events around the globe.
We distilled 30 independent reports dedicated to cybersecurity predictions for 2020 and compiled the top 5 most interesting findings.
The new blue-cover UK passport will be one of the most technically advanced passports in the world. Gemalto teases details of new British passport
Encryption probably isn’t something that you spend a lot of time thinking about, but it’s a fundamental part of keeping you safe online.
A Pronova Certificadora Digital está em festa. A empresa, que no Brasil já tem mais de 15 anos, comemora 4 anos da sua filial portuguesa.
2019 has witnessed intense activity in the development of biometric payment cards with many pilots running around the world.
It’s time for the CA/Browser Forum to focus on the other half of its mandate.
Nowadays, it is of utmost necessity to be able to assess with high if not absolute certainty the authorship of a specific act. Written or digital, the function of a signature is an enshrined object in nearly all cultures.
Over the last few years, most discussions about the next year’s Digital Transformation trends had begun to feel a bit repetitive: Cloud, Edge Compute, the IoT, AR…
The eSignature industry is evolving really fast and the concern with data privacy and security is growing as the industry evolves, as we can see with the rise of different security policies…
O objetivo do GAD – Grupo Agenda Digital do Mercosul – é buscar as convergências entre as realidades nacionais para produzir o acordo de reconhecimento mútuo da assinatura eletrônica.
Email encryption has been around for a while, but have we finally come to a point where everyone should seriously consider using it?
Cadastre-se em nossa newsletter e fique ligado em tudo que acontece no Crypto ID.
© 2014 CryptoID. Todos os direitos reservados.

