Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Trust, transparency and reliability are keys to Web3 success

By David Mahdi
blockchain internet network

Image from Pixabay

August 10, 2022

Web3 is on the horizon and will likely have a large effect on the cybersecurity field. But what exactly is it — and what are the implications of this latest iteration of the internet for organizations?

It’s perhaps easiest to describe Web3 by contrasting it with its predecessors, Web 1.0 and Web 2.0.

Web 1.0 refers to the early days of the internet — from roughly 1991 to 2004 — when most internet users were passive consumers of web content. Users surfed to a specific web page to read or view what some other person or entity had posted there.

A more interactive internet arrived once Web 2.0 kicked off in late 2004. Think here of social media sites, wikis and blogging platforms — suddenly, people could produce their own content rather than just passively consuming it.

The age of Web 2.0 is still ongoing, and, over the years, it has come to be dominated by a handful of large tech companies who in one way or another impact the experience of nearly everyone who uses the internet today.

Cutting out the middleman

Web 3.0 (commonly shortened to just Web3) is what potentially lies on the horizon, if today’s proponents of an increasingly decentralized version of the internet are able to gather enough momentum to make it a reality.

This decentralized version of the internet would use blockchain — the same distributed ledger technology that supports cryptocurrency and NFTs — to underpin many online activities, cutting out the “Big Tech” middlemen and putting control over data back into the hands of users.

So far, so good. However, there are still some significant challenges around managing data and identity in a decentralized, self-regulating environment.

Trust, transparency and reliability

Reliability is one of the first concerns for any system that relies on blockchain. While centralized cloud providers contractually offer service level agreements (SLAs) to their users — typically in the 99.9% uptime range — public blockchains do not. The result is that all sorts of online transactions and activities could grind to a halt because a blockchain is “down.”

Another key issue centers around trust and transparency. If the promise of Web3 is that users will have more control over their data, then simple and intuitive interfaces that allow users to understand what information they are sharing with web service providers will be required. This framework, called Decentralized Identity or Self-Sovereign Identity, is aimed to provide user-centric control over their identity and related information.

Blockchain alone can’t make this happen. Cryptographic keypairs, like those commonly used in public key infrastructure (PKI) technology, are also fundamental to the architecture of Web3.

Digital certificates powered by PKI are the gold standard to secure and authenticate human (and machine) identities. They can be used to manage multiple aspects of a user’s digital identity — from age, address and email address to geo-location and more. In this way, digital certificates can serve as a critical element that helps transparently establish and verify who is sharing what content with whom.

The promised land?

An example is helpful here to show what the promised land of Web3 looks like in practice.

Today, when users want to create content — for instance, a new social media post — they need to go through an intermediary, such as the social media platform itself. The platform then takes responsibility for ensuring that the user authorized the creation of the content.

In Web3, by contrast, the user will be able to authorize the creation of content without relying on an intermediary (like the platform). This is made possible using digital certificates because both the data and the identity are authenticated and secured.

A continuing story

A Web3 world that removes traditional “middlemen” in favor of decentralization has potential for creators and regular end users to gain more control over their data — but only if issues around digital trust, transparency and reliability are successfully addressed. As the story of the internet continues to be written, organizations able to anticipate these issues ahead of time and prepare to address them will be well positioned to adapt as Web3 continues to become a reality.

KEYWORDS: blockchain cyber security awareness digital trust enterprise cyber security internet PKI

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

David Mahdi is Chief Strategy Officer and CISO Advisor at Sectigo.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0519-Cyber-Feat-slide1_900px

    Decision Automation in Security Operations Brings Transparency and Trust to AI

    See More
  • Data Security; cyber security news, NIST cybersecurity, data security, data breach, cybersecurity management

    SaltStack Report Finds Automation and Alignment are Critical to SecOps Success

    See More
  • w100_police_officer_black_vest_pushing_button_2002_lo.jpg

    Building trust through transparency

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing