Advanced electronic signatures were provided for in the ECT Act (2002), which defines two types of signatures – electronic, and advanced electronic.
Ensuring information security has recently become easier with the newly-forged partnership between South Africa’s LAWtrust, a specialist online security provider, and Nasdaq-listed email data protection company Zix Corporation (ZixCorp) (Nasdaq: ZIXI).
Conducting business in this day and age calls for secure mutual protection. The digital certificate, also known as digital ID, not only encrypts a strong identification, thereby putting an end to phishing and other security threats, it also allows for important documentation to be digitally signed.
Security doesn’t need to be a grudge purchase. With the right technologies, it can reduce costs and create new business opportunities.
In today’s business world, information is the key to success, with a large portion of the worth of a business concentrated in the value of its information. This means that when it comes to information security, there is little room for error, as the consequences of failing to secure your data can be both costly and reputationally disastrous.
There is an inherent conflict between the way the world is evolving and the requirement for security. Digital business is transforming industries and innovation cycles keep on accelerating, which paves the way for disruptive competition. IT and business agility is now critical for success.
POODLE (or padding Oracle on downgraded legacy encryption) is a vulnerability that enables attackers to gain access to things like passwords, cookies and users' private account data on a Web site. It exploits the outdated SSL 3.0 security protocol.
Google is adding its considerable weight to the online security space by giving a rankings boost to sites that go HTTPS. HTTPS means adding an SSL 2048-bit key certificate to a Web site, and thus increasing the security of the site.
One of the bigger concerns in the software industry is how to ensure users can trust code that is published on the Internet. Browsers typically display a warning message explaining the possible dangers of downloading data, but do nothing in terms of verifying that the code is what it claims to be.