Become a partner

Identity and information sharing in critical infrastructure

Peter Kolarov - CEO, Crayonic ·

What is secure digital identity and why is it the key element to secure information sharing in critical infrastructure? How to use identity to easily eliminate 80% of cyberattacks with high ROI?  What role does identity play in modern Zero-trust architecture?  We will try to answer these complex questions in 7 minutes.

For a long time on the internet, it held true that nobody knows who you are—and therefore every piece of information is born without trust. Today, however, the authenticity of content is often more important than the content itself. The key is a secure digital identity that ties a person or a machine to cryptographic keys, not to passwords.

Why authenticity is more important than content

The internet was created without built-in identity, and the early protocols did not account for strong cryptography. That’s why an approach prevailed in which “content was king” and its origin or authenticity stood aside. The consequence is clear: information on the network is implicitly untrustworthy until someone credibly signs it. A secure digital identity therefore means binding a physical identity to a private key that can sign or encrypt content—unlike passwords, which are merely shared secrets and over which people often have little control.

Read more

Peter Kolarov

Crayonic
Founder and CEO of Crayonic, a cybersecurity startup launched in 2015 focused on solving problems of proving the true identity of people and things in the digital domain. Peter is an experienced entrepreneur and technologist who spent the past 15 years architecting, developing and selling award-winning electronic signature and IAM solutions to g…
Páčil sa ti článok? Zdieľaj ho a povedz o ňom aj ostatným