To share knowledge is to wield power
We cultivate a wealth of knowledge. Our knowledge base encompasses all projects, best practices, research findings, solutions, and products developed.

Resources
Topics
Markets
-
Preparing for eIDAS 2.0: Is your technology ready for QTSP certification?
Read More: Preparing for eIDAS 2.0: Is your technology ready for QTSP certification?“The architecture reference framework from the EU recognizes that mobile phones or EU digital wallets on mobile phones need hardware back storage. They need a…
-
The future of digital identity for healthcare
Read More: The future of digital identity for healthcareHealthcare demands secure and efficient data sharing across various providers while ensuring patient control. This practical use case based on Ubiqu’s cooperation with KPN Health…
-
MWC 2025 showcased how digital identity will reshape the telecommunications industry
Read More: MWC 2025 showcased how digital identity will reshape the telecommunications industryMobile World Congress (MWC) is one of the largest and most influential events in the global tech calendar, drawing over 100,000 visitors from around the…
-
Why your QTSP strategy needs more than just good technology
Read More: Why your QTSP strategy needs more than just good technologyBecoming a Qualified Trust Service Provider (QTSP) requires much more than technical implementation: that’s the main message Steffen Schwalm, Principal Consultant at msg security advisors…
-
From telco to trust provider: Why telcos are becoming digital identity leaders
Read More: From telco to trust provider: Why telcos are becoming digital identity leadersThe telecommunications industry faces unprecedented challenges in 2024. New European regulations mandate that companies with over 1 million customers must accept digital identity wallets by…
-
Outsource, build, or partner? Three ways to become a QTSP
Read More: Outsource, build, or partner? Three ways to become a QTSPWhen your organization plans to become a QTSP, lots of questions need to be answered. Becoming QTSP is a strategic decision that requires balancing control,…
-
The 4 main Wallet Secure Cryptographic Device/Application options compared
Read More: The 4 main Wallet Secure Cryptographic Device/Application options comparedDigital identity management is undergoing a significant transformation in the European Union with the adoption of eIDAS 2.0. This regulation introduces standardized digital identity wallets,…
-
Three trusted digital identity providers (QTSP) breached in recent weeks
Read More: Three trusted digital identity providers (QTSP) breached in recent weeksThree major European Qualified Trust Service Providers (QTSPs) have faced cyberattacks in recent weeks, underscoring the critical importance of robust security measures in digital identity…