Resources
totemo participates financially and operationally in the Swiss start-up Vereign in the scope of a technology partnership The first joint solution will already be available to customers in the course…
The paradigm that defines today’s digital identities order is a catch 22. As cyber criminals grow more and more sophisticated, organizations lack effective tools to combat CEO fraud and other…
Please could you introduce yourself briefly and explain why you decided to become a part of Vereign’s story? Hi all, my name is Gospodin Bodurov and I am Head Of…
Please could you introduce yourself briefly Pete Herzog? I am the Managing Director of a security research nonprofit. I do OSSTMM, Hacker Highschool, advising, presenting, and a little go-go dancing…
A properly encrypted email will perfectly protect the virus or other cyberattack attachment from virus scanners and other defensive measures. And a signed email today only verifies that the content…
Online you need eIDAS signatures, which mean you need to 1. Get a Qualified Signature Creation Device (QSCD), 2. Find and employ a qualified trust service provider to manage the…
One of the biggest advantages of using Vereign is the ability to send and receive signed documents. Not only does Vereign sign…
And if you believe the seal of the Certificate Authority (CA) you can be reasonably certain the person showing you this certificate is likely Georg. Unless of course the certificate…
So what is Vereign? Vereign is a trusted network that ensures all parties are genuine when sending emails and signing documents online. It’s for anyone who would like to trust…
Vereign has come up with a solution that adds a layer of trust, authenticity and ownership to your digital identity, email and documents. It is super easy to create your…
Below we have put together an overview of the main questions for you: When should we expect integration with Microsoft 365 and outlook? We are slightly dependent on Microsoft in…