Modernize Your PKI → Optimize Productivity → Reduce Risks    |Here’s how to replace Microsoft PKI with EJBCA

Digital Trust Digest: This Week’s Must-Know News

Industry Trends

The Digital Trust Digest is a curated overview of the week’s top cybersecurity news. Here are five key things you need to know this week.

Icon Icon

Lessons healthcare IT leaders can take from the government’s zero-trust journey

The healthcare landscape is torn between some of the most sensitive personal data and the most legacy tools and systems. 

Healthcare organizations adopting a zero-trust approach face more than a light upgrade. They need real transformation. The path forward is rife with challenges, from securing remote and IoT devices to assessing the current security state. 

Make no mistake, transformation is coming for healthcare. Head to HealthTech for a more detailed roadmap of opportunities and pitfalls along the way.

Icon Icon

A primer on quantum computing and the coming era of Y2Q

Like the Y2K scare of 1999-2000, the advent of quantum computing could disrupt life as we know it, as more powerful computing devices could make short work of current defense systems and encryption methods.

While heavy hitters like IBM, Google, and Microsoft have already built quantum devices, these efforts have been more experimental than anything. Experts expect quantum computing to mature enough for mainstream use by 2030. Until then, it’s a race to prepare.

The Digital Trust Digest is no stranger to post-quantum news, but if you’re still not clear on what it means for the cybersecurity industry and national security at large, Bloomberg Law has the lay of the land.

Icon Icon

IBM think tank recommends quantum-safe strategies

Quantum computers are positively overflowing with data, which makes them appealing targets for cybercriminals hoping to harvest data now and decrypt it later. 

IBM’s Institute for Business Value released a report showing how organizations using quantum computers can implement defensive strategies. 

To see how NIST’s selection of post-quantum algorithms, public key cryptography, and other developments will take shape post-quantum, check out ExecutiveBiz’s summary of the report.

 

Icon Icon

New study shows widespread security gaps in manufacturing organizations

A report released by the World Economic Forum reveals that nearly half of all critical manufacturing organizations across the globe are significantly vulnerable to a data breach. 

As systems landscapes become more complex in the wake of modernization, the weak security posture of third-party vendors poses one of the biggest cyber risks to many infrastructure providers. To mitigate the danger, they need visibility into their entire business ecosystem.

For other risks to watch out for, Cybersecurity Dive delivers a more in-depth rundown.

Icon Icon

Could passkeys replace passwords?

Over 80% of hacking incidents involve some type of password vulnerability, but who can blame business users for bad password hygiene when the average person has dozens of passwords to manage for business and personal uses? 

Passkeys take a multifactor approach to authentication, utilizing the user’s device to validate identity and smoothly transitioning between devices in the same ecosystem. This can improve security and the user experience. 

Already supported by Microsoft, Google, and Apple, passkeys may be the future. CSO Online has a deep dive.