Principle Use Cases – Atos
icon External Engagement

Principle Use Cases – Atos

What are the main challenges and opportunities of Threat Intelligence sharing? Atos shares their take on bringing together experts from various partners and why this is a smart move.
November 22, 2022
• 3 min read
Principle Use Cases – Bosch
icon External Engagement

Principle Use Cases – Bosch

What approach can businesses take to resolving problems concerning Artificial Intelligence? Bosch details their experience based on the VCIO approach. Learn more in their Principle Use Case.
November 16, 2022
• 4 min read
Microsoft joins Charter of Trust for greater cybersecurity collaboration
icon External Engagement

Microsoft joins Charter of Trust for greater cybersecurity collaboration

Microsoft has joined the Charter of Trust (CoT) cybersecurity initiative as of November 10, 2022. As a CoT member, Microsoft plans to contribute its cybersecurity expertise in developing and promoting awareness of robust security principles for a secure digital world. With the addition of Microsoft, the Charter of Trust initiative has grown to 18 members.
November 10, 2022
• 5 min read
Principle Use Cases – Allianz
icon External Engagement

Principle Use Cases – Allianz

How to keep employees aware of cyber risks and up-to-date with how to self-protect against cyber-attacks? Learn from Allianz as they share their best practices in a #UseCase under Charter Of Trust principle 6 "Education".
November 09, 2022
• 4 min read
Principle Use Cases - NXP
icon External Engagement

Principle Use Cases - NXP

Security risks with IoT devices are varied and diverse. On this, NXP shares their solution, in particular regarding the implementation of the high security standards for both critical suppliers and own products.
November 02, 2022
• 5 min read
Principle Use Cases - Siemens
icon External Engagement

Principle Use Cases - Siemens

Drawing from experience, Siemens shares its best practices and lessons learned concerning improving a cybersecurity posture.
October 25, 2022
• 4 min read
Introducing a collection of Principle Use Cases
icon External Engagement

Introducing a collection of Principle Use Cases

In an effort to lead by example, the Partners of the Charter of Trust are pleased to present a collection of Principle Use Cases.
October 25, 2022
• 5 min read
Security By Default for Cloud Environments
icon Security by Default

Security By Default for Cloud Environments

"Security By Default for Cloud Environments" is the key topic that high-level speakers from IBM, Allianz, TÜV SÜD and Atos discussed during the Principle 3 “Security by Default” taskforce’s webinar, on 18 October 2022.
October 19, 2022
• 5 min read
Cloud threat landscape report highlights trends in cloud security
icon Security by Default

Cloud threat landscape report highlights trends in cloud security

By John Collins, Security Marketing Leader, IBM
October 07, 2022
• 5 min read
Cybersecurity awareness is a matter of personal digital safety and governments around the world have taken note
icon External Engagement

Cybersecurity awareness is a matter of personal digital safety and governments around the world have taken note

By David Badanes, Director of Cyber Programs and Partnerships, AES
October 03, 2022
• 5 min read
Enhancing international cooperation, data governance and public-private partnership to protect critical infrastructures against cyber threats
icon Supply Chain Security

Enhancing international cooperation, data governance and public-private partnership to protect critical infrastructures against cyber threats

By the Brazilian Center for International Relations (CEBRI), Associated Partner of the Charter of Trust.
September 29, 2022
• 5 min read
An Important Step Towards Security in a Post-Quantum World
icon Emerging Technologies

An Important Step Towards Security in a Post-Quantum World

By Julian Meyrick, IBM Managing Partner and Vice President, Security Strategy Risk & Compliance, Security Transformation Services and Lars Reger, NXP Executive Vice President and Chief Technology Officer

After six years of careful analysis, NIST has announced the first cryptographic algorithms that will allow us to maintain the highest levels of security in a post-quantum world – what we also refer to as ‘quantum-safe cryptography’. And while first quantum-safe products are already here – there is still much to be done. The selected algorithms won’t immediately lend themselves to existing resource-constrained platforms. Within organizations like the Charter of Trust, we can find the necessary experts working together to resolve these issues and support the industry with the pending cryptography transition, which should begin now – even though quantum computers of today are not yet able to break modern encryption.
September 13, 2022
• 5 min read
1 2 3 4 5 6 12