Explore Viafirma’s blog
Discover relevant content such as sectors and departments of application, or success stories of companies that have incorporated our digital signature solutions. In addition, you will learn about the international regulatory framework regarding electronic signatures.
I killed myself in this ORM
We analyse the main problems that can be found in projects developed with an ORM and how to solve them...
Interview with our CEO Antonio Cabrera: 2019 achievements and forecasts for 2020
We share an interview with our CEO Antonio Cabrera in which he analyzes the achievements of 2019 and forecasts for 2020...
Interview with our CEO Antonio Cabrera: 2019 achievements and forecasts for 2020 Read More »
Centralized Certificates with Fortress
Having centralized certificates (hosted on a secure access server) allows...
I cannot run Viafirma Java Desktop in Java
If you\’re having trouble running Viafirma Java Desktop on Mac,...
Biometric or Digitized Signature
The digitized or Biometric Signature are electronic handwritten signatures we...
How to evade legal violations with time stamping
From a legal perspective, time stamps provide great value to...
How to evade legal violations with time stamping Read More »
Personal data: what are your rights and obligations?
Do we know what obligations and rights we have regarding our personal data? We analyze in this article its main aspects...
Personal data: what are your rights and obligations? Read More »
The use of the electronic seal with the Public Administration
We tell you what an electronic seal is and how it makes life easier for companies working with governments and public entities...
The use of the electronic seal with the Public Administration Read More »
Spain and laws 39 and 40/2015: the digital transformation of administrations
Spanish legislation has just been updated to continue evolving in...
Spain and laws 39 and 40/2015: the digital transformation of administrations Read More »
5 ways to protect your digital identity
In the era of communication, protecting our physical identity and...
Ethical hacking: identification of services with nmap
Let's try to see how it is possible to perform a service identification with nmap, an inventory of open ports on an IP or range of IPs....
Ethical hacking: identification of services with nmap Read More »