The company hopes OpenTDF will establish a standard for safe, private data sharing. Credit: Thinkstock Data protection provider Virtru is expanding its portfolio of encryption and privacy applications with the launch of its OpenTDF project, an open-source initiative to enable a universal standard for data control. By leveraging OpenTDF, developers can encrypt and protect sensitive data, and incorporate zero trust data control into their applications.Virtru founder and CTO Will Ackerly’s first iteration of the project served as a function within in the U.S. National Security Agency (NSA), and it has also appeared as an open specification that the U.S. Office of the Director of National Intelligence (ODNI) hosted. Over time, the specification of TDF, or Trusted Data Format, has consistently informed efforts to facilitate sharing of sensitive data across disparate domains. Now, with OpenTDF’s launch, developers can access software development kits (SDKs), hosted in the OpenTDF GitHub repo, which simplifies how applications capable of governing sensitive data are built as it navigates through documents, video feeds, IoT sensors, and multi-party analytics.OpenTDF user cases Some use cases for OpenTDF include protecting personal health information (PHI) such as medical histories when sharing with a provider; redacting document content or cryptographically enforcing document redaction that protects words, sentences, or paragraphs of text based on the security rights of those viewing the document; and securing IoT sensor data by providing granular access controls to the packet level while ensuring data integrity. It also offers real-time, end-to-end protection of chat and video conferencing content, and integration with other platforms to secure data event streams from ingestion to consumption. OpenTDF intended to allow private data sharing “Virtru was built on the premise that people should have a basic right to determine what data they share and with whom,” said Virtru CEO John Ackerly. “There should be no back doors and no third-party access requirements. With this open implementation, customers and partners alike can incorporate industry-leading data control standards into their applications. We’re excited to see how developers worldwide will leverage OpenTDF to deliver innovative zero trust data solutions that advance trust and respect for the data their organizations produce and share.”“One of the world’s most important inventions, PDF was created by Adobe to facilitate sharing of documents between people using different computer operating systems, regardless of the application used to create the document,” said Will Ackerly. “Just as PDF helped accelerate digital document sharing, TDF is poised to become the standard method for securely sharing sensitive data. TDF keeps rightful owners in sovereign control of information they share regardless of file type, application of origin, or authentication mechanisms.” Related content interview Strong CIO-CISO relations fuel success at Ally CIO Sathish Muthukrishnan and CISO Donna Hart have forged a partnership steeped in Ally’s culture of radical candor that keeps the financial services firm secure and innovative. By Dan Roberts May 09, 2024 9 mins CIO CSO and CISO IT Leadership news Zscaler shuts down exposed system after rumors of a cyberattack Initially dismissing rumors, Zscaler now says it did have a system exposed but nothing important has been accessed. By Shweta Sharma May 09, 2024 3 mins Data Breach Cyberattacks news Palo Alto launches AI-powered solutions to fight AI-generated cyberthreats The suite is powered by Palo Alto’s proprietary solution, Precision AI, which integrates machine learning, deep learning, and generative AI technologies. By Prasanth Aby Thomas May 09, 2024 3 mins Generative AI Security Software news F5 patches BIG-IP Next Central Manager flaws that could lead to device takeover Two high-risk vulnerabilities could allow attackers to gain full administrative control on devices via leaked password hashes. By Lucian Constantin May 08, 2024 5 mins Threat and Vulnerability Management Cloud Security Vulnerabilities PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe