Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Digital trust: Toward a brighter future of the internet

By Srinivas Kumar
digital person

Thinkhubstudio / iStock / Getty Images Plus via Getty Images

November 23, 2022

The recent global pandemic has shown that the internet has become much more than just a communications and commerce platform. Today, it has become an essential part of society, providing a foundation for information, interaction, self-expression and personal connections across the entire world. We’re now in a world where digital transformation is the word of the day.


The unprecedented growth and reach of the internet are unlocking new economic opportunities for billions of people, but they have also introduced some major challenges. Many people still face accessibility barriers, while cybersecurity risks are undermining the trust and reliability that are essential. To keep our increasingly connected environments free and secure for everyone to operate with full privacy, governments and the technology community and corporate boardrooms need to invest in digital trust.


Recognizing the internet’s fundamental role in driving digital transformation, the U.S. government teamed with 60 global partners to develop A Declaration for the Future of Internet. Released in April 2022, this Declaration is intended to demonstrate a political commitment by these partners to advance a positive vision for the internet and digital technologies. 


By signing on to the Declaration, these partners have reaffirmed their commitment to a global Internet that is “truly open and fosters competition, privacy and respect for human rights.” The Declaration also emphasizes the need to safeguard privacy as a means to promote trust in the global digital ecosystem.

 

Digital trust is fundamental 

What makes digital trust so essential to the internet and digital transformation? It gives individuals the confidence that interactions, purchases, business processes and other activities retain their security and integrity. 


For example, IoT environments rely on data from sensors and devices to help organizations respond to events and make informed decisions. Digital trust is critical for assuring that this data has been provided by an authentic source and has not been compromised or altered. For example, if a sensor on a medical pump in a hospital environment is not generating dependable data, the impact on patient safety could be severe.


Digital trust provides peace of mind for interactions in our increasingly connected world. However, assuring a high level of trust isn’t easy. In the past, organizations could simply secure the enterprise network perimeter to ensure a robust level of trust in their environments. 


Today, users, their applications, documents, and devices may extend across a broad range of locations and environments, including cloud services, hybrid workloads, and remote and home offices. The past boundaries that separated developers and IT operations are also breaking down as organizations adopt new DevOps-centric processes.

 

The pillars of digital trust

What are the key requirements to ensure digital trust? Its three critical elements include: 

  • Authentication: Organizations must authenticate the identity of users, workloads, services and containers, as well as machines and devices 
  • Integrity: Digital trust requires organizations to take steps to ensure that an object and its data have not been altered or tampered with 
  • Encryption: Protecting data as it is transmitted is vital


These three requirements complement one another, enabling the assurance needed for digital interactions, processes and transactions. Public key infrastructure (PKI) digital certificates support them. PKI is a proven technology that has been widely adopted for a variety of use cases and allows organizations to establish and confirm identity, integrity and encryption, to establish a strong level of trust between people, systems and things. 

 

Augmenting PKI for more robust digital trust

PKI is a powerful enabling technology for the three key pillars that make up the digital trust foundation. However, it’s just the beginning. To fully implement a trust initiative, organizations need additional elements, including standards, compliance and operations, trust management and connected trust capabilities.

 

Standards 

Standards are what define the specifics of trust for an industry or technology. Some examples include the standards that certification authorities (CAs) must meet to be considered “trusted,” designated by vendors of Internet browser software and other stakeholders that utilize X.509 v.3 digital certificates for SSL/TLS, code signing and S/MIME. Other industry examples include the Matter standard for smart home devices and IoT platforms.

 

Compliance and Operations 

Compliance and operations make up the second element of digital trust. Regulations are constantly changing and evolving, and organizations must ensure compliance policies, audits and other processes to confirm that their operations fully conform to local laws and industry standards. 

 

Trust Management 

Trust management is increasingly essential to keep the growing numbers of digital certificates current. Trust management can minimize manual processes associated with managing certificate lifecycles, using business process automation. Trust management can also help ensure that organizations remain in full compliance with their security policies, by helping minimize rogue activities. 

 

Connected Trust

Connected trust is the fourth key element of digital trust. Connected trust helps organizations extend the final essential building block of digital trust, and helps organizations strengthen and extend the continuity of trust across complex device lifecycles, software supply chains and sophisticated ecosystems.

 

Today’s top IT imperative is digital trust

The Declaration of the Internet underscored the growing importance of the internet to today’s businesses and societies worldwide. The escalating volume of connected users and devices, together with increasing complexity, have elevated digital trust from an IT priority to a boardroom imperative. Today’s technology executives are focused on protecting not only their own businesses but their partner ecosystems, their end customers and ultimately, their communities. Crafting a robust digital trust strategy is key to assuring that our increasingly connected digital environments and processes remain safe and secure.

KEYWORDS: authentication cyber security digital trust encryption risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Srinivas kumar

Srinivas Kumar is the VP of IoT Solutions at DigiCert, a cybersecurity vendor. In this role, Srinivas architects’ solutions to accelerate the convergence of information technology (IT) and operational technology (OT) in emerging markets. For over 30 years, Srinivas has spent his career in embedded systems and cybersecurity at Mocana, TaaSera, VMware, Applied Identity and Nortel, and has led engineering efforts to certify products for common criteria, FIPS, DO-178, US DoD and NATO standards.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • digital landscape

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More
  • Digital Trust

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More
  • digital Trust freepik

    The benefits of digital trust

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Physical Security and Safety: A Field Guide for the Practitioner

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing