Risk Management

Identity Verification in eSignature: Why a Signature Alone Is Not Enough

April 24, 2026 / in Blog / by Zafar Khan, RPost CEO

Why a Signed Document Isn’t Enough: Identity, Attribution, and Proof in eSignatures.

A signed document is not always a defensible one. When a transaction carries legal, financial, or operational risk, the real question is not just whether someone signed, but whether you can prove who signed, how that person was authenticated, and what evidence remains if the transaction is challenged.

RPost's AI & The Periodic Table of Cybersecurity: A CIO’s Guide to Defense

January 17, 2025 / in Blog / by Zafar Khan, RPost CEO

Chemistry Class or Tech CIO Organization.

Armand here, RPost’s armadillo product evangelist. I don’t know about you, but I loved chemistry class. Learning about all those wonderful Elements and their combinations.

Trusting Sophisticated Cybercriminals: A Risky Approach in Data Breach Responses

January 10, 2025 / in Blog / by Zafar Khan, RPost CEO

Data Breach? Sure, You Will Get Your Money From the “Butcher”

Armand here, RPost’s armadillo product evangelist. I was struck by a notification from a company that faced a data breach due to cybercriminal activity. In their breach notice, the breached company wrote, “…has taken steps to ensure that the stolen data will not be publicly shared or used maliciously.