Building a Collaborative Approach to Secure the Connected World

In today's rapidly evolving digital landscape, public key infrastructure has emerged as an essential component of digital trust, underpinning security across myriad interconnected domains, from users and devices to the Internet of Things and connected devices.
As our world becomes increasingly connected, the need for seamless security solutions that transcend manufacturers and industries has never been more critical.
PKI is a framework that utilizes cryptographic keys, certificates and digital signatures to establish secure communication and authentication.
Its scope has dramatically expanded to encompass a wide array of use cases, transforming PKI into the bedrock of digital trust.
Today, PKI plays a pivotal role in securing IoT devices, as well as websites, users, software, servers and digital content.
This expanding landscape demands a collaborative approach to PKI, ensuring seamless security across diverse domains.
One of the fastest-growing markets where certificates are used is IoT. Implementing centralized certificate management solutions is an essential step to significantly simplify the management of certificates in a diverse IoT ecosystem.
This approach ensures that devices have the required certificates, streamlining processes for certificate renewal and revocation.
Establishing unique identities and robust authentication mechanisms for each IoT device is also crucial to prevent unauthorized access and enable secure communication between devices.
Leveraging PKI for device identity and authentication is considered a best practice in ensuring the security of IoT ecosystems.
There is more to digital trust as the world becomes more connected - and it requires collaboration and cooperation among many.
Initiatives like the Matter protocol, for example, aim to create a universal standard for IoT devices, fostering cross-manufacturer compatibility.
Matter is an open-source, royalty-free connectivity standard designed to increase interoperability and security among smart home devices and ecosystems.
Backed by major tech players like Apple, Google and Amazon, Matter aims to create a unified ecosystem where devices from different manufacturers seamlessly communicate and function together.
While the primary goal has always been to simplify the use of smart home devices, Matter aims to give customers the confidence that when they bring a device home, it will seamlessly integrate with their other Matter-compliant devices and will be secure.
The collaboration of over 300 participants to shape a new standard is a remarkable achievement and it speaks volumes about Matter's core mission to unite the industry and create a smoother and more secure user experience for smart devices.
The electric vehicle industry is also striving for secure interoperability to enhance the user experience and accelerate the adoption of EVs.
With unprecedented digital connectivity, and connected device use constantly growing and evolving, the importance of a collaborative and interoperable approach to security cannot be overstated.
As PKI continues to evolve and expand its role in safeguarding the digital landscape, industries and manufacturers are coming together to build trust and security across ecosystems.
These efforts not only enhance user experiences but also reinforce the resilience of our interconnected digital ecosystem.


This Cyber News was published on securityboulevard.com. Publication date: Mon, 04 Dec 2023 15:43:05 +0000


Cyber News related to Building a Collaborative Approach to Secure the Connected World

Building a Collaborative Approach to Secure the Connected World - In today's rapidly evolving digital landscape, public key infrastructure has emerged as an essential component of digital trust, underpinning security across myriad interconnected domains, from users and devices to the Internet of Things and ...
1 year ago Securityboulevard.com
Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy - You hear a lot about zero trust microsegmentation these days and rightly so. While a host-based enforcement approach is immensely powerful because it provides access to rich telemetry in terms of processes, packages, and CVEs running on the ...
1 year ago Feedpress.me
OT Cybersecurity: Safeguarding Building Operations in a Digitized World - These concerns are brought into the spotlight by high-profile ransomware attacks, which can now penetrate even the most intricate systems. Recently, in September, the gravity of this threat was illustrated when two Las Vegas casinos fell victim to an ...
11 months ago Cyberdefensemagazine.com
DP World confirms data stolen in cyberattack, no ransomware used - International logistics giant DP World has confirmed that data was stolen during a cyber attack that disrupted its operations in Australia earlier this month. The company says no ransomware payloads or encryption was used in the attack. On November ...
1 year ago Bleepingcomputer.com
How a Risk-Based Security Approach can Change Your Mindsettitle - The ever-evolving threat landscape of cyber security has resulted in a need for a more robust security strategy than strictly a threat-based approach. A risk-based security approach is focused on proactively identifying and responding to potential ...
1 year ago Securityweek.com
The New Cybercrime Atlas: A Collaborative Approach to Fighting Digital Crime - The global transition to the digital economy means that the operations of governments, critical infrastructures, businesses, and individuals are now a tightly integrated system of interconnected resources. Cybercrime presents a significant risk to ...
10 months ago Feeds.fortinet.com
Key Building Blocks to Advance American Leadership in AI - The AI era is set to be a time of significant change for technological and information security. To guide the development and deployment of AI tools in a way that embraces their benefits while safeguarding against potential risks, the US government ...
1 year ago Darkreading.com
Cisco and Schneider Electric Are Creating Smarter, More Efficient Buildings - Whether your organization owns commercial property, leases it, or manages it, you're likely to be grappling with industry trends and challenges that call on your best efforts-and the innovative application of technology. The need to reduce energy ...
11 months ago Feedpress.me
Secure your critical roadways infrastructure as you digitize and resolve congestion - London isn't alone, and congestion is clearly a global issue. Chicago and Paris are a close second and third on the list, with drivers in each city annually facing more than 130 lost hours in traffic due to congestion in 2022. These delays can have a ...
1 year ago Feedpress.me
Driving into Tomorrow: The AI powered Car Takeover - In the next decade, a tech-driven revolution is set to transform our roads as 95% of vehicles become AI-powered connected cars. These smart vehicles, while promising enhanced safety and convenience, come with a catch-each generating a whopping 25 ...
11 months ago Cysecurity.news
ISB Cybersecurity Awareness Month: Expert Tips - Information Security Buzz spoke with several security experts and asked them, “What’s the one piece of advice that could make a difference?” Their responses highlight that cybersecurity is not one-size-fits-all—each organization must tailor ...
2 months ago Informationsecuritybuzz.com
7 Essential Practices for Secure API Development - The necessity for API security cannot be overstated. Authentication and Authorization Authentication and authorization form the cornerstone of secure API interactions. In the world of API security, managing identities accurately ensures that only ...
9 months ago Feeds.dzone.com
IoT Security for Business: Safeguarding Connected Devices - In this discussion, we will explore the significance of IoT security for businesses and effective strategies for safeguarding connected devices. With the increasing number of connected devices in business environments, the need for effective IoT ...
10 months ago Securityzap.com
Inside the strategy of Salesforce's new Chief Trust Officer - In this Help Net Security interview, Arkin discusses a collaborative approach to building trust among customers, employees, and stakeholders, focusing on transparency, shared responsibility, and empowering others to integrate trusted and responsible ...
10 months ago Helpnetsecurity.com
Swinfen Charitable Trust, UVA Health, Telemedicine AI, and MITRE Collaborate on Secure Global Health Telemedicine - PRESS RELEASE. McLean, Va., and Bedford, Mass., December 14, 2023 - To further support access to global health services, the Swinfen Charitable Trust, UVA Health, Telemedicine AI, and MITRE announced a new collaboration to enable medical cyber ...
1 year ago Darkreading.com
Building inclusive AI will accelerate innovation - This post was authored by Mary Fernandez, Cisco global lead for disability and neuro-inclusion. Often when we talk about promoting inclusion of disabled and neurodivergent people in society we exclusively focus on work and education. In recognition ...
1 year ago Feedpress.me
Master Cloud Computing Risks with a Proactive, End-to-End Approach - These guiding principles have provided a foundation for Accenture's public cloud security offerings since they were introduced in 2018. With the release of the Prisma® Cloud Darwin update, Palo Alto Networks dramatically simplifies risk mitigation ...
1 year ago Paloaltonetworks.com
Apple's AI Moves Will Impact Future Chip, Cloud Security Plans - The measures Apple has implemented to prevent customer data theft and misuse by artificial intelligence will have a marked impact on hardware security, especially as AI becomes more prevalent on customer devices, analysts say. Apple emphasized ...
5 months ago Darkreading.com
Master Security by Building on Compliance with A Risk-Centric Approach - In recent years, a confluence of circumstances has led to a sharp rise in IT risk for many organizations. That's why a proactive approach to seeing, understanding, and acting on risk is key to improving the effectiveness of defenses in place to meet ...
11 months ago Cyberdefensemagazine.com
Menlo Security Adds SaaS Platform to Manage Secure Browsers - Menlo Security today unfurled a software-as-a-service platform that makes it simpler to centrally apply and manage cybersecurity policies to secure instances of Google Chrome or Microsoft Edge browsers. Rew Harding, vice president of security ...
10 months ago Securityboulevard.com
Zero Trust Security: How to Secure Critical Infrastructure - Zero trust security is a critical component of any organization's security strategy that enables organizations to protect their data and systems from malicious actors, cyber threats, and unauthorized access. With the ever-evolving cyber threats ...
1 year ago Csoonline.com
CISA Issues Request For Information on Secure by Design Software Whitepaper - WASHINGTON - Today, the Cybersecurity and Infrastructure Security Agency published a Request for Information from all interested parties on secure by design software practices, including the Shifting the Balance of Cybersecurity Risk: Principles and ...
1 year ago Cisa.gov
How Secure Cloud Development Replaces Virtual Desktop Infrastructures - The need to secure corporate IT environments is common to all functions of organizations, and software application development is one of them. Development environments have notoriously complex setups and often require significant maintenance because ...
9 months ago Feeds.dzone.com
The reality of hacking threats in connected car systems - The automotive industry faces new cybersecurity challenges as vehicles become more connected. All parties in the manufacturing supply chain should follow key principles for vehicle cybersecurity, such as organizational security, risk assessment and ...
10 months ago Helpnetsecurity.com
The Real Deal About ZTNA and Zero Trust Access - For the last several years, zero trust network access has become the common term to describe this type of approach for securing remote users as they access private applications. Zero trust network access is based on the logical security philosophy of ...
9 months ago Feedpress.me

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)