Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Skills Shortages Trump Headcount as Critical Cyber Challenge

December 6, 2025

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

December 6, 2025

Louvre to Bolster Its Security, Issues €57m Public Tender

December 6, 2025
Facebook X (Twitter) Instagram
Saturday, December 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Cyber Agencies Push for Digital Trust Amid AI Era with New Provenance
News

Cyber Agencies Push for Digital Trust Amid AI Era with New Provenance

Team-CWDBy Team-CWDDecember 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The broad adoption of generative AI has come with an onslaught of misleading content online.

In a bid to help restore integrity to digital information, the UK’s National Cyber Security Centre and Canada’s Centre for Cyber Security (CCCS) have released a new report on public content provenance.

Provenance refers to the place of origin. To build stronger trust with external audiences, organizations need to improve how they address the public provenance of their information, the report reads.

Commenting on the publication, Ollie Whitehouse, NCSC chief technology officer, said: “This new publication examines the emerging field of content provenance technologies and offers clear insights using a range of cyber security perspectives on how these risks may be managed.”

“While there is no single solution for ensuring and assuring trust in digital content, this collaboration looks to introduce key concepts and strategies which bear further investigation to help protect our collective digital security and prosperity.”

The Future of Content Integrity

There are ongoing efforts within industry to tackle content provenance, such as the Coalition for Content Provenance and Authenticity (C2PA), which benefits from the support of generative AI and big tech firms like Google, OpenAI, Meta and Microsoft.

However, there is now an emerging need for interoperable standards across various media types, including video, image and text documents. While there are content provenance technologies available, the area remains immature.

The key technology involves trusted timestamps and cryptographically secure metadata help prove content hasn’t been tampered with. However, there are challenges around the development of these secure technologies, including how and when they are implemented.

Today’s technology also places an unfair burden on the end user, relying on them to understand the provenance data. The user must be able to essentially read and review the metadata of content they have received to assess its legitimacy instead of being able to make an assessment from a watermark or similar.

A provenance system should allow a user to check who or what created the content, when it was created and if any edits or changes have been made.

As cybercriminals increasingly use AI-generated images, videos and text to make scams more convincing the ability to trace the origin and edit history of digital media offers a critical defense.

The NCSC and CCCS’s publication looks to help others navigate this complex space with confidence and clarity.

It also offers practical steps for organizations considering the use of provenance technologies.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users
Next Article Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware
Team-CWD
  • Website

Related Posts

News

Skills Shortages Trump Headcount as Critical Cyber Challenge

December 6, 2025
News

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

December 6, 2025
News

React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability

December 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

What parents should know to protect their children from doxxing

November 28, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.