TRUSTED

software.
hardware.
platforms.
services.
data.
devices.
inclusion.
AI.
innovation.
commerce.
privacy.
security.
Security is built on trust.

TRUSTED

software.
hardware.
platforms.
services.
data.
devices.
inclusion.
AI.
innovation.
commerce.
privacy.
security.
Security is built on trust.

We need the ability to trust that the technologies and services we use are secure by design.  

Our digital ecosystem is under near constant threat from activities by malicious actors using techniques that are becoming increasingly more complex, sophisticated, and ubiquitous. Since the beginning of the pandemic, there has been a 300% increase in cybercrime, cyber scams have gone up 400%, mobile malware is on the rise, and there has been a significant hike in the frequency and size of ransomware attacks. For example, malware targeting mobile banking apps nearly doubled in 2021, as cyber criminals seek to take advantage of the rising popularity of mobile banking apps, underscoring the linkage between greater functionality and increasing security risks on smartphones.

Criminal gangs, hackers with a business plan, and even nation states are working around the clock and across the globe to find and exploit vulnerabilities in technologies and services in what are often believed to be secure systems. They are developing sophisticated new “social engineering” strategies to trick users into clicking on malevolent links, infected attachments, or downloading mobile malware directly onto devices. Even a small mistake can be leveraged to put your most personal information at risk, put proprietary business information in jeopardy, expose national security secrets, or even lock down a pipeline, school or hospital for ransom.  We have to find the right path forward to reduce this risk.  

As a start, one of the best defenses is increasing awareness and adoption of basic cyber hygiene best practices, because according to one study, social engineering or other human error account for almost 90% of successful attempts to exploit a system. Simple steps, like adopting strong passwords, using multifactor authentication, only downloading from official app stores, and avoiding clicking on untrusted links, are among the best ways to protect people from ever-evolving and increasingly problematic cyber threats.    

Yet as information technology becomes more pervasive, devices more prolific, and the information we carry with us more sensitive, the attack surface that hackers can attempt to exploit has increased substantially, creating new kinds of potential harm.  It means that as technology becomes increasingly central to our lives, making it secure and reliable from the start becomes ever more critical.   

Just like a home must be built upon a strong foundation or it will eventually crumble, our new digital home must also be built upon a strong foundation of security – with security built into its very foundation by design.  To elevate our cybersecurity posture, we need to elevate our focus on agile solutions across the ecosystem that embrace best practice standards, enable continuous innovation in cyber-defenses, advance globally recognized frameworks, and that are underpinned by smart government policies to keep personal and business data secure and our economy moving forward.

IDEAS

How Congress Can Avoid Learning the Wrong Lessons from Europe

Given the broad impacts that technology has on our lives, policymakers are right to be looking for smart ways to further improve the vital technologies we use every day – by supporting efforts to improve our privacy, safety and security – and expand digital opportunities for all Americans.

Encryption at a Crossroads: Can We Keep Data Secure Without Sacrificing Safety?

Strong encryption is the backbone of digital privacy and secure data. Pressure on the government to weaken encryption is mounting, which raises some serious concerns. How do we preserve strong encryption standards in the face of security concerns? And must we pick between security and privacy?

Adam Golodner: How to win the current innovation, speed, and security inflection point

Given the dizzying acceleration of change in geopolitics, artificial intelligence, compute power, cloud availability, and networking, companies and governments have a clear imperative—drive innovation, speed, and national security into products and services, and government public policies.

The Perverse Brussels Effect

The “Brussels Effect” – where the impact of European Union policy goes far beyond the borders of Europe – is well established in digital policy. It usually takes place in two forms: multinational corporations adopt the EU’s standards so they don’t have to have two versions of their services or…

JIT Happens: A Look at the DMA’s First Interoperability Request

Unfettered access to fundamental just-in-time compiling features, or use of insecure JIT, creates significant vulnerabilities that hackers can easily exploit.

WHEN INTEROPERABILITY MANDATES WEAKEN SECURITY - JIT HAPPENS

Holy Cow! We looked at the very first interoperability request publicly posted as part of Europe’s Digital Markets Act’s (DMA) new interoperability rules and it’s a digital doozy that would enable serious new security threats. A developer has requested that under the DMA’s new interoperability rules, Apple should provide it with direct…

Consumer Protection in the Digital Age: Four Lessons From Experts

Trusted Future recently hosted a conversation focused on efforts to digital financial scams and fraud. Participants discussed how to combat fraud, build a more trustworthy digital environment amid increasingly sophisticated attempts, and ways policymakers can avoid weakening the safeguards companies have put in place to limit financial fraud and harms.…

Empowering parents with trustworthy options to simultaneously protect kids privacy and safety

Legislative proposals should avoid simply shifting responsibility from the app developer who knows their customer and content best to the app stores that distribute them.

Three Problems With the New Digital Markets Act Fines and Interoperability Regulatory Measures 

Today, the European Commission issued its first fines under the controversial Digital Markets Act.

Signalgate, and NSA warnings about Signal vulnerabilities, highlight the inherent vulnerabilities in the EU's latest interoperability rules    

These couple weeks have proven to be a powerful reminder of the power of encrypted messaging apps, and the equally significant harm to national security when someone unwittingly gains access to important private conversations.