To share knowledge is to wield power
We cultivate a wealth of knowledge. Our knowledge base encompasses all projects, best practices, research findings, solutions, and products developed.

Resources
Topics
Markets
-
“Start talking to providers,” says Dick Dekkers to government organizations preparing for eIDAS 2.0
Read More: “Start talking to providers,” says Dick Dekkers to government organizations preparing for eIDAS 2.0“Any organization that needs to maintain the highest level of trust, particularly government agencies and official data providers, will effectively need to become a Qualified…
-
Andreas Freitag: “Start laying the foundation for eIDAS, even without having all the answers”
Read More: Andreas Freitag: “Start laying the foundation for eIDAS, even without having all the answers”The more we learn, the less we know – that seems to be the best way to describe the implementation of eIDAS 2.0 in the…
-
The eIDAS 2.0 timeline: Who needs to comply when?
Read More: The eIDAS 2.0 timeline: Who needs to comply when?The European Digital Identity Framework, or eIDAS 2.0, represents a significant evolution in how digital identity, authentication, and trust services operate across the European Union.…
-
“Bringing trust services to the mass market,” says Richard Backx on the role of telcos in the future of EU digital identity
Read More: “Bringing trust services to the mass market,” says Richard Backx on the role of telcos in the future of EU digital identity“What you’re seeing now is that telecom services and trust services are converging. The qualified trust services we’ve been offering to businesses for years will…
-
eIDAS 2.0: The key to faster and safer KYC processes for telecom providers
Read More: eIDAS 2.0: The key to faster and safer KYC processes for telecom providersAs cyber threats become increasingly sophisticated and regulatory requirements grow more stringent, telecom operators are turning to innovative digital identity solutions to address these competing…
-
Bridging the physical and digital world with organizational ID wallets
Read More: Bridging the physical and digital world with organizational ID walletsIn today’s high-stakes global environment, large organizations such as airports and ports face unprecedented challenges in securing their critical infrastructure. Traditional authentication methods relying on…
-
Preventing SIM swapping & other forms of online fraud with digital identity
Read More: Preventing SIM swapping & other forms of online fraud with digital identityThe internet has made life more convenient, but it has also opened the door for criminals to exploit unsuspecting users. Online fraud can take many…
-
From executors to builders: How semi-governments can shape trusted digital ecosystems
Read More: From executors to builders: How semi-governments can shape trusted digital ecosystemsNavigate the complexities of eIDAS 2.0. This article helps semi-governments and policymakers choose the right data exchange model and build trust in digital ecosystems.