Digital Identity, Privacy & Cybersecurity EN

What solutions exist for the transfer of identity information

,
/
Business processes between two and more companies, so-called Business-To-Business (B2B) relationships, are mostly handled electronically today.…

What contemporary identity management must fulfil

,
/
With increasing data protection requirements, it is becoming more and more important to take the data sovereignty of users into account. Therefore,…

A label for digital responsibility: The Digital Trust Label

,
/
With the ever-increasing importance of digital applications and a growing awareness of digital risks, the issue of digital responsibility is…

How useful is the new Swiss Digital Trust Label?

,
/
The Swiss Digital Initiative Foundation wants to create more cyber security with the new digital label. The aim is to enable users to easily…

Will “Verifiable Credentials” replace X.509 certificates in the future?

,
/
X.509 certificates have been around for over 40 years. They are used for the identification of subjects (web servers, persons, etc.). They are…

6 reasons against a central state identity provider

,
/
The Federal Department of Justice and Police (FDJP) presents three different technical scenarios in its "E-ID target picture" . One of them is…