The countdown is on to Keyfactor Tech Days     | Secure your spot today!

Digital Trust Digest: This Week’s Must-Know News

Industry Trends

The Digital Trust Digest is a curated overview of the week’s top cybersecurity news. Here’s what you need to know this week.

photo of city sunrise with graphic illustration of data streams flowing from the sun
Icon Icon

Preparing for quantum’s impact on DNS security

Quantum will disrupt the foundational elements of our current IT ecosystem, including domain name system (DNS) security. 

Essentially, DNS manages internet traffic and uses cryptography to verify that websites and data are what they purport to be. Among the challenges, quantum will use larger keys and signature sizes, taxing DNS’s ability to handle traffic. 

Prepping for quantum will require an upgrade to everything, from mindsets to hardware. Security Magazine has the info orgs need to get started

Icon Icon

Zero trust creator talks about his vision and the future of cybersecurity

As zero trust makes its way out of the marketing ether and into a practical framework, the creator of zero trust, John Kindervag, sat down with VentureBeat to talk about what zero trust is and how it may shape the future.

Kindervag developed zero trust’s four design principles and five-step methodology while working at Forrester and Palo Alto Networks. He was later invited to contribute to the President’s National Security Telecommunications Advisory Committee (NSTAC) draft on zero trust and trusted identity management. 

For organizations seeking to define their own zero-trust initiative, hearing it from the source isn’t the worst place to start. Check out VentureBeat’s two-part interview.

graphic illustration of encrypted text with Zero Trust overlaid
photo of woman with glucose monitor using her phone
Icon Icon

Medtech company looks to raise the standard for device security

MedCrypt, Inc., a cybersecurity start-up serving medical device manufacturers, announced this week that it would partner with several companies that manufacture insulin pumps, glucose monitors, and other diabetes care tools.

The Food and Drug Administration has been paying attention to potential cybersecurity risks involved in these devices, as has the medical industry as a whole. MedCrypt hopes to act as a catalyst for medical device manufacturers to design secure FDA-approved technologies. 

Is the medical industry poised for an evolution toward better, more secure devices? Get the scoop on Yahoo! Finance and decide for yourself. 

 

Icon Icon

NIST’s new IoT algorithms mark a step forward in IOT security

Earlier this month, NIST named a group of cryptographic algorithms called Ascon as the new standard for “lightweight” IoT devices.

Implementing the NIST standard won’t happen overnight, as the IoT industry is generally playing catch-up when it comes to security. But the event is significant, as everything from motors to sensors is getting smaller and playing more important roles in various settings.

However, the industry has a long way to go. Many experts note that threat detection isn’t enough and that a preventative approach is vital to staying ahead of tomorrow’s attacks. Head over to DarkReading for more.

photo of microchip
photo of city with graphic illustration of telecom tower overlaid
Icon Icon

6G is coming and it has security at its foundation

As 5G continues to evolve, 6G is being conceived. Technical standards and specifications are still a few weeks off, but we’re seeing a flurry of research activity. 

The North American Next G Alliance believes that 6G applications will enable cost efficiencies, sustainability, and access that brings about true digital equity. 6G will support trillions of connected devices, and by the time it reaches maturity, there’s no telling what the threat landscape will look like. 

To learn more about the potential of a 6G world, head to the Ericsson blog