Featured

Blockchain jeopardizes your identity – a well-founded fear?

In my previous article about Identity Wallet I globally addressed how an Identity Wallet works and what kind of information you could put into it. It did not describe how it's actually implemented. One of the questions that has not been answered when implementing an Identity Wallet is where documents like your diploma’s can be …

Continue reading Blockchain jeopardizes your identity – a well-founded fear?

Featured

De Identity Wallet, geen reden voor koudwatervrees

Dit is een reactie op: https://www.nu.nl/tech/6204382/kabinet-en-tweede-kamer-hebben-bezwaren-tegen-europese-digitale-identiteit.html De Europese Unie wil ons allemaal aan de Identity Wallet. Een digitale portemonnee waarin digitaal ruimte is voor het digitale rijbewijs, digitale bibliotheekpas, of wat anders digitaal dat je gewoonlijk in je fysieke portemonnee bewaart. Er is nogal wat scepsis over deze Europese ambitie. Hieronder zet ik uiteen waarom …

Continue reading De Identity Wallet, geen reden voor koudwatervrees

Featured

How can we improve email security?

Photo by FLY:D on Unsplash As cyberattacks increase in number and sophistication, João Paulo Foini of business and IT consultancy Foini Consultores considers email security. And how the S/MIME protocol can play a key role in improving protection. First, let’s look at the figures for 2021 5.13 billion economically active people The world’s population was …

Continue reading How can we improve email security?

Featured

The importance of digital certificates to protect cloud-based platforms

Huge numbers of large and small organisations are moving away from traditional, on-premise IT environments to cloud-based platforms. This move creates many new opportunities to improve business efficiency and effectiveness, but also introduces security threats such as data breaches, unauthorised access and complicated identity management. Photo by Towfiqu barbhuiya on Unsplash What is the trend? …

Continue reading The importance of digital certificates to protect cloud-based platforms

Featured

YouTube Episode 3: Quantum Key Distribution

After the second video, where Phil Zimmermann explained the concept of ‘Secure Enclaves’ and how we can use them in our organisations, he now returns to the topic of Quantum Cryptography. In this third episode below he talks you through the advantages and disadvantages of ‘Quantum Key Distribution’. https://youtu.be/DpU9uQWgE2s Around the world, governments, businesses and …

Continue reading YouTube Episode 3: Quantum Key Distribution

Featured

How does digital authentication work? And how can you implement it securely in your organisation?

In times of digital transformation, new innovations follow each other at lightning speed.For years, we saw improvement upon improvement in computers and components, and everything had to be faster and newer.More recently, attention has shifted to which technical components can contribute to a better overall solution to increase digital resilience. And authentication plays a crucial …

Continue reading How does digital authentication work? And how can you implement it securely in your organisation?

Featured

Youtube Episode 2: Secure Enclaves

After the launch of our AET Youtube channel and the upload of our first episode about Post-Quantum Algorithms, we now launch the second episode of AET Security topics.In this second video, Phil Zimmermann explains the concept of ‘Secure Enclaves’ and how we can use them in our business.  In the episode below he talks you …

Continue reading Youtube Episode 2: Secure Enclaves

Featured Announcement Security Topics

Announcement AET Security Topics

Around the world, governments, businesses and individuals are increasingly moving toward providing products and services online. For transactions, it is necessary to know the identity of the person involved. Trust is the foundation of any relationship – and essential to trust is the idea of identification. One of the key enablers in the future digital …

Continue reading Announcement AET Security Topics

Featured

Phil Zimmermann creates ‘AET Security Topics’

Phil Zimmermann, Distinguished Engineer at Advanced Encryption Technology (AET) Europe B.V., recently created AET Security Topics, an initiative to share AET’s and Phil’s knowledge on exciting high-tech security topics. How it all started? Philip R. Zimmermann is the creator of Pretty Good Privacy (PGP), is one of the Top 50 Tech Visionaries of the last …

Continue reading Phil Zimmermann creates ‘AET Security Topics’

Featured

What is quantum computing and how will it affect your organisation?

Photo by Markus Spiske on Unsplash During this time of digital transformation, new innovations are appearing at lightning speed. For years, we’ve seen improvements in computers with manufacturers aiming for everything to be faster and faster. Now, they’re deeply engaged in a race to make quantum computers widely available. These quantum computers will outstrip the …

Continue reading What is quantum computing and how will it affect your organisation?

Featured

Data protection & digital identification – the current status in Europe

Some of the data protection and digital ID laws we have in Europe have now come into play in Brazil. Our colleague, Colin van den Heuvel, was recently interviewed about the impact and implications of these laws by Brazilian website CryptoID. Below is a translation of the original article on CryptoID Two important laws that recently came into force in Brazil have been applied in Europe for at least two years.

Featured

A world without passwords – is it closer than we think?

Photo by NeONBRAND on Unsplash In this time of increased homeworking, we’re constantly using passwords – whether it’s to set up a conference call, log into business applications or share information. But does this need to be the case? Could we work securely without passwords? Let’s first look at passwords and their vulnerabilities before considering …

Continue reading A world without passwords – is it closer than we think?

Featured

How to manage your TLS certificates under Google’s new rules?

Photo by Morning Brew on Unsplash From September 1st 2020, major web browsers will block TLS certificates that have a validity period of longer than 398 days (approximately 13 months). If you use TLS certificates on your website(s), as most organisations do, this could have a significant impact for you. Managing them will become much …

Continue reading How to manage your TLS certificates under Google’s new rules?