SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

DigiCert 2026 security predictions: AI & quantum shift

5 Dec 2025

DigiCert 2026 security predictions: AI & quantum shift
Contact company
Contact DigiCert, Inc.
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • AI integrity overtakes data confidentiality as the primary enterprise trust concern by 2026.
  • Resilience becomes a board mandate with tighter compliance like DORA enhancing operational stability.
  • Quantum computing demands encryption readiness; organisations face interoperability challenges for quantum-safe requirements.
Related Links
  • DigiCert & Citrix automate SSL/TLS for enterprises
  • DigiCert boosts email trust in Cyber Week

In its latest forecast for 2026, DigiCert delivers insights into how advancements in artificial intelligence (AI), quantum computing, and automation are poised to transform global trust ecosystems.

The report outlines key developments, including the heightened focus on AI integrity, resilience, and preparations for the quantum era. Readers can explore the full predictions and analyses on DigiCert’s official blog.

AI integrity: The new benchmark

The prominence of AI authenticity is set to eclipse data confidentiality as organisations shift their priorities. Ensuring verifiable identity, provenance, and tracking for AI models and datasets will become critical.

This evolution positions AI integrity as the vital standard of trust in enterprise operations.

Resilience as compliance

Resilience will move beyond a technical objective to a strategic imperative at the executive level

Resilience will move beyond a technical objective to a strategic imperative at the executive level.

Regulations such as the Digital Operational Resilience Act (DORA) are tightening requirements, necessitating businesses to demonstrate robust DNS, identity, and certificate system capabilities. This progression ties operational stability directly to financial health and compliance adherence.

Automation response to shorter certificate lifecycles

The reduction of TLS certificate lifespans to 200 days, with further decreases anticipated, doubles the manual renewal workload.

To counter this, organisations will turn to full-stack automation to prevent outages and foster automated, self-sustaining trust environments.

Quantum computing: A challenge to encryption

The advent of practical quantum computers represents a significant milestone.

As organisations embark on initial quantum computing trials, they will face interoperability challenges, necessitating updates to certificate and software ecosystems to align with quantum-safe standards.

Content authenticity becomes enforceable

With governments and major platforms starting to impose the Coalition for Content Provenance and Authenticity (C2PA) for managing AI-edited content, distribution requirements such as watermarking and cryptographic provenance will become widespread across news, social, and commercial content sectors.

Modernising PKI in a changing browser landscape

The transition away from traditional client authentication led by browsers like Chrome necessitates

The transition away from traditional client authentication led by browsers like Chrome necessitates a modern approach to private Public Key Infrastructure (PKI).

This shift will favour cloud-centric, automated, and passwordless trust frameworks, moving identity management into new technological territories.

Verifying email trust

Increased sophistication in AI-driven phishing attacks puts pressure on enterprises to implement Verified Mark Certificates and reinforce DMARC policies.

Verified sender identity will emerge as a critical expectation for establishing secure and reliable enterprise communications.

The rise of machine identities and quantum algorithms

The prevalence of machine identities, outnumbering human ones by a significant margin, underscores the need for quantum-safe identity systems. Post-quantum cryptography (PQC) frameworks are anticipated to become standard as quantum-safe algorithms are adopted across device ecosystems.

Reflecting on these developments, Jason Sabin, Chief Technology Officer at DigiCert, remarked, “Security in 2026 won’t just be about protecting systems; it will be about proving integrity across every digital interaction. As AI accelerates, machine identities multiply, and quantum computing advances, intelligent trust will become the foundation that keeps businesses resilient, verifiable, and secure. The organisations that embrace automation, provenance, and quantum-safe readiness now will define the trust landscape for the next decade.”

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Show full press release

DigiCert, a pioneer in intelligent trust, unveiled its 2026 Security Predictions, forecasting how AI, quantum computing, and automation will reshape global trust frameworks.

The predictions highlight a pivotal shift toward AI integrity, resilience, and quantum readiness as core tenets of intelligent trust. DigiCert’s full predictions and outlook for the new year can be found at DigiCert’s blog.

  • 1. AI Integrity Becomes the New Trust Standard: AI authenticity will overtake data confidentiality as the top enterprise trust concern. Organisations will require verifiable identity, provenance, and tracking for every model, dataset, and autonomous agent.
  • 2. Resilience Becomes the New Compliance: Resilience will shift from an IT goal to a board-level mandate as regulations like Digital Operational Resilience Act (DORA) and new global standards tighten expectations. Organisations will be required to prove that their DNS, identity, and certificate systems can withstand disruption, with uptime and recoverability directly tied to financial and operational stability.
  • 3. Automation Accelerates as Certificate Lifespans Shrink: With TLS certificate lifetimes reducing to 200 days as part of the phased reduction to 47 days, the effort associated with manual renewal doubles. Organisations will adopt full-stack automation to eliminate outages and create self-healing trust ecosystems.
  • 4. Quantum Computing Puts Encryption on Notice: The first practical quantum computer capable of solving meaningful problems will emerge. Organisations beginning their initial pilots will discover interoperability hurdles as certificate and software ecosystems adapt to quantum-safe requirements.
  • 5. Content Authenticity Moves from Principle to Policy: Governments and major platforms will begin enforcing C2PA for AI-generated and edited content. Watermarking and cryptographic provenance will become required for distribution across news, social, and commerce.
  • 6. Federated PKI Reinvented for the Post-Chrome Era: Organisations will modernise private PKI as Chrome phases out legacy client authentication and Microsoft sunsets old CA architectures. Identity will shift toward cloud-native, automated, and passwordless trust models.
  • 7. Email Trust Redefined: Verified Identities Take the Lead: AI-driven phishing will push enterprises to standardise on Verified Mark Certificates and strict DMARC enforcement. Verified sender identity will become the baseline expectation for secure, enterprise-grade communication.
  • 8. Machine Identities Outnumber Humans 100:1, and PQC Becomes Mandatory: Connected devices and AI agents will surpass human identities by two orders of magnitude. PQC-ready identity frameworks will become mandatory as standards bodies embed quantum-safe algorithms into device ecosystems.

Integrity across every digital interaction

“Security in 2026 won’t just be about protecting systems, it will be about proving integrity across every digital interaction,” said Jason Sabin, Chief Technology Officer at DigiCert.

“As AI accelerates, machine identities multiply, and quantum computing advances, intelligent trust will become the foundation that keeps businesses resilient, verifiable, and secure. The organisations that embrace automation, provenance, and quantum-safe readiness now will define the trust landscape for the next decade.”

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Security management
  • Security training
  • Physical Security Information Management (PSIM)
  • Cyber security
  • Data Security
  • Cloud security
  • Artificial intelligence (AI)
  • Related links
  • Megapixel IP cameras
  • Network IP cameras
  • Indoor/Outdoor IP Dome cameras
  • Standalone/Networkable Access control controllers
  • PTZ IP cameras
  • Related categories
  • Access control controllers
  • IP cameras
  • IP Dome cameras
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Corporate news
About this page

Discover DigiCert’s 2026 predictions on AI and quantum computing, revealing how intelligent trust, resilience, and automation will redefine security frameworks globally. Explore future trends on our blog.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec