Cybersecurity Pioneer Introduces Zero-Trust Data Privacy Solution in New Whitepaper

Self-protecting data leader Sertainty has published a new whitepaper titled Quantum Computer Threats Against PKI Data Security and a Digital-ID Based Self-Protecting-Data Solution. The new whitepaper details a zero-trust data privacy solution in response to the emerging quantum computer threats against Public Key Infrastructure (PKI) data security vulnerabilities. 

In the new whitepaper, Sertainty Leadership Advisor and Chief Technology Officer Dr. Behzad Nadji lays out the framework for a revolutionary solution to one of the most prominent and unresolved weaknesses in Public/Private Key Infrastructure. 

Dr. Nadji received his Ph.D. in Electrical/Computer Engineering from the University of Southern California. Before joining Sertainty, he served as Senior Vice President at AT&T, and led the AT&T network design, development, and architecture team for the entire AT&T network. Dr. Nadji also served as the head of one of the most prestigious R&D Labs in the world, AT&T Bell Laboratories Research. Additionally, he holds over ten patents in various areas of technology. 

PKI is a technology that uses a pair of cryptographic keys, consisting of a public key and a private key, to encrypt and decrypt data and authenticate users. PKI is a common component of cybersecurity, and it enables safe communication and transactions between parties and supports digital identity and access management. Today, Public/Private Key Infrastructure is the most commonly used technology for secure communication on the Internet.

In the whitepaper, Dr. Nadji also addresses common misconceptions about the capabilities of blockchain technology in cybersecurity and presents potential solutions that can be incorporated into existing frameworks to solve the issues posed, like Grid-based Cryptography. 

Based on the industry-leading Sertainty Software Development Kit (SDK), the proposed solution utilizes self-protecting digital IDs (otherwise, Sertainty IDs or SIDs.) These SIDs are built upon a zero-trust data privacy framework. This framework comprehensively addresses the threats resulting from current and future PKI vulnerabilities.

“When we think of creating real solutions to quantum computing threats, we need to look beyond simply ‘plugging the holes’ that can be identified in existing security systems,” says Dr. Nadji. “Quantum computing threats are fundamentally different from traditional data security vulnerabilities, and therefore require a more comprehensive approach.” 

Sertainty zero-trust data privacy technology is already used in various applications, from financial technology and infrastructure projects to national intelligence operations. 

About Sertainty

A leader in zero-trust data privacy and self-protecting data, Sertainty provides companies in a wide range of industries with data tracking, compliance, security, and governance with their Sertainty Data Privacy Platform. The company is also known as a thought leader in cybersecurity, having established partnerships with other industry pioneers and providing consulting services for the United States Department of Defense through Sertainty Federal Systems. 
Learn more at

Sertainty Advances Partnerships That Prove Use Cases for Its UXP Technology

With each passing year, Sertainty technology has moved further from the conceptual stage to developing a myriad of practical applications. Sertainty has built a data-centric, data-level, self-protecting-data technology from the ground up, and what seemed impossible yesterday has become feasible and proven today. Through groundbreaking partnerships, Sertainty has already established its proofs and commercialized its technologies in concrete, transformative ways. 

As Sertainty continues to implement its technical expertise across industries, the true potential of these systems becomes more and more apparent. While each sector brings a unique set of needs and criteria, the Sertainty zero-trust security platform and advanced data privacy solutions rise to the challenge, proving, again and again, the value of the applied technology. 

Notable Partnerships and Applications

Infrastructure with CIEDAR 

Of the many applications of the Sertainty Self-Protecting-Data, infrastructure is a clear beneficiary. In 2021, Texas State University and its Connected Infrastructure Consortium- CIEDAR, joined forces with Sertainty to solve the exposure in the Energy Sector pertaining to Ransomware and flag matters with the likes of Kinder-Morgan and Production Partners. The intent for Phase 1 was to utilize the CIEDAR Consortium’s Smart Networks Lab to assert a “Digital Twin” construct aimed at a Nation-State attack on a carrier and investigate complementary technologies, toward the goal of negating such. 

The CIEDAR Sensor Lab serves as a sandbox to assert Sertainty Self-Protecting-Data and Smart Messaging technology for a composite of sensors and mainstay devices along a LoRaWAN topology. CIEDAR Smart Utilities Lab will also provide the opportunity to create a first-to-the-market Self-Protecting Data construct with EasyMetering LLC regarding securing and enabling distributed intelligence aimed at an Advanced Meter Infrastructure (HMI) Alignments with Anterix and Ericsson were close to follow, as well. 

Moreover, the CIEDAR project is also intended to benefit the Ingram Outflow Sensor Project – in the long run, since stormwater outflow of pollutants persists in the cement industry and the fines keep mounting, with a LoRaWAN-capable endpoint device that conserves power, simplifies configuration, and provides trusted telemetry and data r to a regulator or judicial court. 

Biometrics with SmartEye 

The Sertainty patent engine is responsible for monumental developments in the world of secure connections and biometrics. In 2017, Sertainty was granted Notice of Allowance for SmartID, SmartMessage, SmartLicense, SmartPortal, and SmartCloud claims. 

These technological developments came to fruition last year, when Sertainty announced its partnership with biometric authentication pioneer Smart Eye Technology. Foundational to this partnership, Sertainty UXP Technology embeds specified file restrictions in Smart Eye biometric files, giving them the ability to self-govern and self-protect. 

Critical Communications and Exploration with FAU 

Florida Atlantic University partnered with Sertainty to develop their critical communications infrastructure after identifying five use cases for Sertainty technology. Here, Sertainty solutions are aimed at securing sensitive data on an end-to-end basis using the Sertainty patented Unbreakable Exchange Protocol (UXP) technology. 

The FAU partnership is allowing Sertainty’s systems to create better solutions for applications in extreme environments and conditions. As part of the partnership, Sertainty and FAU support are focused on IoT sensors, leveraging autonomous vehicles, as well as ensuring command and control communications. 

Military Applications with UTSA-NSCC and AF16 Cyber Command 

Sertainty has also partnered with the University of Texas-San Antonio National Security Collaboration Center (UTSA-NSCC). In this instance, Sertainty Self-Protecting-Data technology will be incorporated into an NSCC contract with the AF16 Cyber Command

Moreover, this is far from the only military application of Sertainty security tools. In 2021, Representative Dr. Mark Green (R-TN) of the House Committee on Armed Services successfully incorporated the Sertainty language regarding data security “while at rest, in motion and in use” into the Department of Defense 2020 DOD Strategy. Rather than generic security measures, the language of the strategy favors functionality that, as of today, only Sertainty technology can offer. 

FinTech with Tortuga 

Tortuga Growth Partners and Sertainty are also currently in the process of finalizing a business/technology relationship, establishing Tortuga as the first Sertainty Technology Licensee. As part of the plan, Tortuga is rolling up six entities to create a FinTech-centric platform with multiple locations in six countries and combined revenue of $50M. 

Secure CCM with Uluro

Customer communications management (CCM) is perhaps one of the areas in which Sertainty technology is having the greatest impact. Uluro, a comprehensive, data-centric communications platform created by Transformations, Inc., uses Sertainty encryption to ensure security and compliance in all communication platforms. Additionally, Sertainty zero-trust protocols are integral to Uluro’s uSecure solution. 

In addition to being a powerful example of Sertainty tools in action, this partnership demonstrates the revenue-generating potential of Sertainty solutions. The fruitful effectiveness of integrated Sertainty data security tools makes fruitful partnerships like the one between Sertainty and Transformations, Inc. possible. 

Limitless Possibilities 

The above examples represent only a selection of a myriad of real-world examples where Sertainty zero-trust security technology is already forging new paths forward. While many technology platforms are fundamentally limited in their scope, Sertainty data protection technology is truly industry-agnostic, with the potential to upgrade or redefine how data is stored and distributed. 

As demonstrated by these and other partnerships, the concepts driving Sertainty data solutions more than stand up when applied to the various programs where they are needed.

Pieter De Leenheer, Recent Sertainty Advisor, Attends Transformations Inc. Customer Conference as Keynote Speaker

Sertainty CSO Amir Sternhell to Address 2022 Digital 360 and GSMP Innovation Summits

Clifton Lambreth Announced as Newest Sertainty Board Member

Sertainty Awarded Three New Global Patents For Their Data Privacy Solution

Sertainty Introduces New Advisory Board Member — Dr. Stan McClellan

Iniciativa Innovacion Mexico and Implementation Partner SeguriData Sign a Partnership Agreement with Sertainty for Central American Markets and Mexico

Sertainty Enters Formal Engagement with Weild & Company

Sertainty Selected to Present for the Palmetto Tech Bridge Pitch Jam Prize Challenge at the 2021 CDCA Defense Summit